Cyberattacks

Cyberattacks can cause major disruptions when an unauthorized user accesses or maliciously alters your computer code to compromise data or modify, destroy, delete or make key systems and resources unavailable. They can happen on computers, mobile phones, gaming systems, and other devices. Protect yourself from potential money loss, theft of personal information, and damage to your reputation and safety by knowing what to do before, during and after a cyberattack.

Terminology and Types
  • Malware is any software that is designed to give attackers access to your device to monitor or control your online activity or to steal your personal information. They include spyware, ransomware, viruses, Trojans and worms that often gain access when a user clicks a dangerous link or email attachment that then installs the malware. Once inside it can:
    • Block access to key components of the network (ransomware)
    • Install malware or additional harmful software
    • Covertly obtain information by transmitting data from the hard drive (spyware)
    • Disrupt certain components and renders the system inoperable
  • Ransomware prevents or limits users from accessing their system via malware. Ransomware asks you to pay a ransom using online payment typically including virtual currencies such as bitcoins to regain access to your system or data. Cyber criminals will request ransom for the private key used to encrypt and unencrypt your files.
  • In an imposter scam, a dishonest person lies and tricks you into sending money to them.
  • Social engineering includes things like imposter scams, where you receive an email or call from someone pretending to be someone else who asks you to pay taxes or fees or to help someone you care about.
  • Phishing attacks are a type of social engineering that involve attempts by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing a specific, usually well-known brand. Phishers attempt to trick users into disclosing personal data, such as credit card numbers, online banking credentials, and other sensitive information, which they may then use to commit fraudulent acts. This typically involves using email or malicious websites to infect your machine with malware and viruses to gain such information.
  • Vishing, short for “voice phishing ”, is a phishing technique that uses voice communication technology. Cybercriminals, also known as “vishers” when vishing, use fraudulent phone numbers, spoofed (fake) caller ID and voice altering software to trick people into sharing their sensitive information over the phone. They often impersonate government or law enforcement agencies, telemarketers, retailers, technical support employees or a family member in need.
  • Distributed Denial of Service (DDoS) Attacks make an online service unavailable by overwhelming it with excessive traffic from many locations and sources causing the website to slow down and prevent access. To do so, cyber criminals may develop large networks of infected computers called Botnets by planting malware. DDoS attacks may also be used as a distraction while other types of fraud and cyber intrusion are attempted.
  • A Structured Query Language (SQL) injection occurs when a cybercriminal inserts malicious code into a server that uses SQL and forces the server to reveal information it normally would not. Insufficient input validation (e.g. failure of sufficient whitelisting or blacklisting) and improper construction of SQL statements in web applications can expose them to SQL injection attacks.
  • Man-in-the-middle attacks or eavesdropping attacks occur where cybercriminals insert themselves into a two-party transaction to filter and steal data. They typically gain entry on unsecure public wi-fi between the visitor’s device and the network or through malware where software can then be inserted to process the victim’s information.
  • A zero-day exploit attack can occur after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability during this window of time.
Stay Informed
Stay up-to-date on the latest cybersecurity advisories and alerts by visiting the Canadian Centre for Cyber Security.
Before
  • Do not click on links in texts or emails from people you don’t know. Scammers can create fake links to websites. These can also appear from someone in your contact list, such as your colleague asking you to click a link to purchase a gift card for another colleague’s birthday. If the message it out of the ordinary it is likely spam.
  • Check the email of the sender to see if it is suspicious before replying.
  • Create strong passwords (>8 characters) by using upper and lower case letters, numbers and special characters. Change them regularly and do not share them.
  • Use a password manager, two methods of verification and biometric scans where possible to enhance your account security.
  • Keep software applications and operating systems up-to-date as they often include security improvements.
  • Back up your files regularly in an encrypted file or encrypted file storage device.
  • Limit the personal information you share online including changing privacy settings and not using location features.
  • Use a secure internet connection and wi-fi network. Do not use sites with invalid certificates. Virtual Private Networks (VPNs) can create a more secure connection.
During
  • If you notice strange activity, change all of your internet account passwords immediately to potentially limit the damage.
  • Check your credit card and bank statements for unrecognizable charges.
  • Check your credit reports for any new accounts or loans you didn’t open.
  • Be alert for emails and social media users that ask for private information.
  • Run a security scan on your device to make sure your system is not infected or acting more slowly or inefficiently.
  • Consider turning off the device that has been affected and taking it a professional to scan for potential viruses. Remember: A company will not call you and ask for control of your computer to fix it. This is a common scam.
  • If the attack involved your IT system at work or school, be sure to notify them of the incident.
  • Immediately contact banks, credit cards companies, and other financial institutions to report breaches, alert and file a report with authorities.
    • If you believe a cyber incident is an imminent threat to life or of a criminal nature (e.g. fraud, scam), please contact local police and The Canadian Anti-Fraud Centre using their Online Reporting System or by phone at 1-888-495-8501.
    • Visit the Canadian Centre for Cyber Security to report a cyber incident. Note, this will not launch an immediate law enforcement response, such as investigating cybercrime or other criminal offences.
After
  • Stop shopping, banking, and doing other things online that involve usernames, passwords, or other sensitive information — until you get your device cleared of any malware.
  • If you have to reinstall your operating system (like Windows or Mac OS), visit your device manufacturer’s website. Reinstalling your system is the safest way to clean an infected device, but you’ll lose all of the data stored on the device that you haven’t backed up.
Additional Resources