Unmasking Cyber Threats: Understanding the Digital Storm

Table of contents

WEEK 2 AT ALTSCHOOL
What Are Cyber Threats?
A cyber threat is when there’s a possibility that something bad might happen to your computer, phone, or anything connected to the internet. It’s like when you hear thunder, it hasn’t rained yet, but it might.
Cyber threats don’t always mean something has happened, they are warnings or signs that something could happen. These threats usually come from hackers, viruses, or even fake messages online.
What is a Cyber Attack?
A cyber attack is when those threats actually happen. It’s not just thunder now it’s raining!
This is when a hacker or bad person does something like:
- Stealing your data or passwords
- Changing how your system works
- Crashing your website or game.
Sources of Cyber Threats
1. Hackers : they are individual that are technically skilled to breach defences, disrupt networks and exploit vulnerabilities. Note that not all hackers are cyber criminal or Threat actors, there are some that impersonate as the bad guys to help companies and businesses fund vulnerabilities in their system and network and protect them against any attacks. They are called the Ethical Hackers.
2. Nation State Actors: They are those that are fully funded and backed by Government to gather intelligence, disruption another country's system or steal sensitive data. There malicious activities often involve espionage that is secretly spying pr cyber warfare.
3. Insider Threats: insiders can include employees, 3rd party vendors, contractors or other bussiness associates who have legitimate access ro an organisation assets but abuse their privilege to steal information or damage electronics assets for economic or personal gain.
4. Hacktivists : are those using hacking techniques to promote or protest a social or political issue rather than for personal gain. Just like a group of students that change the school homepage to protest against school fees hike. Most are concerned with spreading propaganda rather than damaging ro disrupting services. They target industries, organisations or individuals.
Types of Cyber Attacks.
1. Malware
2. Distributed Denial Of Service ( DDOS)
3. Social Engineering
4. SQL Injection
5. Zero day Exploit.
Let's now explain it one after the other
1. What is Malware?
Malware is short for malicious software. It’s any kind of software (app, program, file) that’s made to harm your computer, phone, steal your data, or spy on you — without your permission.
Imagine someone secretly sneaking into your phone and messing things up — that’s what malware does.
Types of Malware.
A. Virus
A virus is a type of malware that attaches itself to clean files and spreads when the file is opened or shared.
A computer virus is like a digital sickness for your device. Just like a flu virus needs a person to spread, a computer virus needs a file or program to attach itself to — and when you open that file, *boom*, it starts spreading.
A Computer virus can:
- Damage files or your whole system
- Steal your information
- Slow down your device
- Spread to others (via USB, email, etc.)
The first computer virus was called Creeper in the 1970s on early networked systems. It just displayed the message “I’m the creeper, catch me if you can!” – it didn’t harm systems.
And in 1986 Brain which was the First Real PC Virus show up. This brain virus was crreated by two brothers in Pakistan. It spread through floppy disks and infected the boot sector.
We have also some various famous viruses like ILOVEYOU that happened in 2000 and Melissa Virus that happened in 1999 both spread via email. The two visruses spread through infected attachments, pirated software, USB drives, etc.
Types of Viruses:
● File Infector: they are viruses that Infects executable files (.exe, .com).
● Macro Virus Targets apps like MS Word or Excel using macros.
● Boot Sector Virus: Infects your hard drive’s boot area (used more in older PCs).
● Polymorphic Virus: Changes code to avoid antivirus detection.
B. Worms
A worm is like a sneaky thief that moves from one computer to another on its own, without needing you to click or open anything. Unlike viruses, worms don’t need a file to attach to — they just spread across networks silently.
Think of a worm like someone sneaking into one house, then using tunnels to enter all the other houses on the street.
How Is a Worm Different from a Virus?
Virus | Worm |
Needs a file or program to spread | Can spread by itself |
Often requires user action (click, open) | Spreads automatically |
May damage or corrupt files | Often clogs networks, causes slowdowns |
Brief History of Worms
1988 – The Morris Worm
First major worm to hit the internet.
Crashed thousands of computers in just hours.
Created accidentally by a student trying to test internet security.
2003 – SQL Slammer
- Spread in just 10 minutes and slowed down the whole internet!
2008 – Conficker
- Infected millions of Windows computers worldwide.
What Can a Worm Do?
Slow down or crash networks
Steal data
Create “backdoors” for hackers
- Send spam emails automatically
Some worms are harmless, just spreading for fun (called “joke worms”), while others are dangerous and carry malware with them.
Types of Worms
Email Worms
Spread through emails with infected links or attachments.
Example: ILOVEYOU (acts like both virus & worm).
Internet Worms
Spread by scanning the internet for vulnerable devices.
Example: Code Red, Blaster.
Instant Messaging Worms
- Spread through apps like WhatsApp, Messenger, etc., sending bad links to contacts.
File-Sharing Worms
- Hide in downloadable files from peer-to-peer networks like BitTorrent.
Mobile Worms
- Target smartphones through infected apps orlinks.
Insecure Wi-Fi or networks
Software with security holes
USB drives (some worms can jump on these too)
Clicking unknown links
Not updating your system
Real-Life Example: Conficker Worm
Infected over 10 million computers
Created a massive botnet (zombie computers)
Hard to remove and spread through USB drives & networks
How to Protect Yourself from Worms
Keep your system updated
Use a good antivirus and firewall
Don’t click on random links or downloads
C. Trojan Horse
A Trojan is like a fake gift — it looks useful or harmless, but once you accept or install it, it secretly does something dangerous behind your back.
It’s named after the Trojan Horse from Greek mythology, where the Greeks gave the city of Troy a big wooden horse as a “gift.” But inside the horse were soldiers hiding — once it was taken into the city, they came out and attacked.
In the same way, a Trojan program tricks you into letting it into your computer — but once inside, it can steal info, damage files, or even allow hackers to control your
In 1975 the first concept "ANIMAL" game acted like a harmless game but copied itself secretly in people's computer
AIDS Trojan occur in 1989 and it was sent through floppy disks claiming to give info on AIDS, but it encrypted files and demanded payment one of the first ransomware Trojans.
Since then, Trojans have evolved to be smarter, stealthier, and more dangerous often used by hackers and cybercriminals to steal data, spy on users, or hijack
Trojans don’t replicate like viruses or worms, but once installed, they can:
Steal your passwords and banking details
Watch what you type (keylogging)
Take control of your computer (remote access)
Encrypt your files and ask for ransom (ransomware)
Use your PC in a botnet (for spam or attacks)
Download and install more malware
Types of Trojan
Backdoor Trojan : These types of trojan gives the attacker remote access to your device and system. They can be able to control your files, spy on you, or install more malware.
They are also used in Advanced Persistent Threats (APTs) for long-term spying.
Banking Trojan: As the name implies they targets online banking, where by capturing your login credentials or modifying transactions.
- Example: Zeus Trojan – stole millions from bank accounts globally.
Downloader Trojan: Though this one doest do harm directly, but downloads other malware on your system (like ransomware, spyware, etc.) once inside.
Ransom Trojan (Ransomware): This one will encrypts your files and asks your for payment (ransom) to unlock them.
- Example: WannaCry, Locky.
Rootkit Trojan: They hides deep inside your system to avoid detection by antivirus. They arr often used to hide other malware.
Dropper Trojan: It carries a payload of malware and installs it silently on your machine. Often used as the first stage of big cyberattacks.
Spyware Trojan: Watches you — records keystrokes, takes screenshots, accesses webcam. It steals sensitive data like passwords and private messages.
Fake Antivirus Trojan (Scareware) : They pretends to be a legit antivirus but they are not they will scans and shows fake “viruses” to make you buy or install more malware.
SMS Trojan (Mobile)
- Affects mobile phones, secretly sends premium-rate SMS messages to drain your airtime.
How Trojan spread?
Fake software or games (especially cracked versions)
Phishing emails with attachments or links
Pop-ups or ads offering free downloads
USB drives carrying infected files
Social media links and DMs
Fake updates or system updates
Real world examples
Discovered in 2007
Used to steal banking credentials through fake forms
Spread via spam emails and phishing
Infected millions of computers and stole hundreds of millions of dollars
D. Spyware
Spyware is a type of malware designed to secretly monitor and collect information from your computer or device without your permission.
It “spies” on your online activity — what you type, the websites you visit, your passwords, conversations, and even your camera/microphone. Most of the time, you won’t know it’s there.
Spyware became popular in the ate 1990s - Early 2000s when companies started tracking user behavior for ads.
The term “Spyware” first gained attention in 2000 when a security company noticed programs secretly installing toolbars and tracking browsing behavior.
By 2004, major antivirus companies started treating spyware as a serious
How Can Spyware get into your system?
Free software or apps with bundled spyware
Clicking on fake ads or pop-ups
Downloading cracked software or cheat tools
Visiting unsafe websites
Opening infected email attachments
Once inside, spyware hides and begins collecting your data silently.
E. Ransomware
What it is:
Ransomware locks your files or computer and demands a payment (usually in crypto) to unlock them.
History:
First known case: AIDS Trojan (1989).
Modern famous ones: WannaCry (2017), REvil, LockBit.
Types:
Crypto ransomware: Encrypts files.
Locker ransomware: Locks entire device.
Scareware: Pretends to be ransomware but is just bluffing.
Prevention:
- Regular backups, don’t open suspicious links, update your
F. Rootkits
What it is:
Rootkits are deeply hidden malware that give hackers full control over your device.
History:
Used by cybercriminals and even governments. Sony was once caught hiding rootkits in CDs!
Features:
Hard to detect.
Can disable antivirus.
Used to hide other malware.
DDOS ATTACK
DDoS attack is like thousands of people trying to enter one door at the same time — the door (server/website) becomes overwhelmed and no one can get in.
Technically, it floods a target (website/server/network) with so much fake traffic that the system crashes, becomes slow, or completely shuts down, making it unavailable to real
Early 2000s: First major DDoS attacks hit companies like Yahoo and CNN.
2016: The Mirai botnet used infected IoT devices (like cameras, routers) to shut down huge portions of the internet (including Twitter, Netflix, etc.).
Today, DDoS is a common weapon used by cybercriminals, hacktivists, and even nation-state
How it works
Botnet Creation: Hackers spread malware to infect thousands of devices.
Control: These devices (called "zombies") are silently controlled by the hacker.
Launch: All devices send traffic to a specific target — at the same time.
Overload: The server or site can’t handle it, so it crashes or slows
Types of DDOS
Volume-Based Attacks
Example: UDP Flood, ICMP Flood.
Goal: Consume all bandwidth.
Floods the target with massive data traffic.
Protocol Attacks
Exploits server resources or network equipment.
Example: SYN Flood, Ping of Death.
Goal: Overload networking devices.
Application Layer Attacks (Layer 7 Attacks)
Targets the actual web app (like login pages or searches).
Example: HTTP Flood.
Goal: Crash the website by mimicking real user
WHY PEOPLE LAUNCH DDOS?
Revenge or Anger
Political/Hacktivism (e.g., Anonymous)
Extortion ("Pay us or we’ll crash your site!")
Competition Sabotage
Testing security (pen-testing)
DDoS Protection Techniques
Rate Limiting – Controls how much traffic is allowed.
Firewalls & Intrusion Detection Systems (IDS)
Content Delivery Networks (CDNs)
DDoS Mitigation Services (e.g., Cloudflare, Akamai)
Geofencing and IP
Real life Impacts
Millions of dollars in loss (sales, reputation, and trust).
Delays in services (banks, schools, e-commerce).
Even governments have suffered (Ukraine, Estonia, etc.).
- Social Engineering
Social engineering is when a bad person (the hacker) tricks people into giving away secrets — like passwords, bank info, or access to a computer system.
It’s not about hacking computers directly, it’s about hacking humans.
Imagine someone calling you and pretending to be your bank or school IT guy, asking,
"Can you please give me your password so I can fix your account?"
And you believe them… boom! That’s social engineering.
Why It’s Dangerous
Because even the best cybersecurity system can’t stop a person from accidentally giving away access.
A strong password, firewall, or antivirus is useless if you tell the attacker everything they need to know.
History of Social Engineering
This trick goes way back — before the internet.
Con artists used to pretend to be police, government agents, or rich people.
In the 1980s and 1990s, Kevin Mitnick, one of the world’s most famous hackers, used social engineering to access sensitive systems — just by calling employees and tricking them.
Common Social Engineering Techniques
Phishing
Fake emails or messages that look real.Example:
"Click this link to fix your ATM card now!"
Clicking it may lead to a fake website or install a virus.Vishing (Voice Phishing)
Phone calls pretending to be your bank or support team.
"Hello, we detected a problem in your account. Please confirm your PIN."Smishing (SMS Phishing)
Phishing but through SMS.
"You've won ₦100,000. Click here to claim!"Pretexting
The attacker makes up a fake story (a “pretext”) to get your trust.
Example:
Pretending to be your school’s IT staff needing your login for a "system upgrade".Baiting
Leaving infected USB drives in public, hoping someone picks one up and plugs it into their computer.
Boom — access granted to the attacker.Tailgating
When someone without access follows an employee into a secure building, pretending to be authorized.
Why People Fall for It
Trusting nature
Fear or urgency (e.g., “Your account will be blocked in 1 hour!”)
Curiosity (e.g., “Open this funny video”)
Greed (e.g., “You’ve won a free phone!”)
How to Protect Yourself
Never share passwords, even if someone sounds official.
Double-check emails, links, and callers.
Don’t click suspicious links or download unknown files.
Subscribe to my newsletter
Read articles from Muhammed Abdulakeem Akinpelumi directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
