Types of Cyberattack, Specific Risks and How to Mitigate those Risks

Please note that the list of cyberattack types is distributed by the Canadian Centre for Cyber Security and the means to mitigate is provided by third parties. This information is not meant to be exhaustive and Skyway West is not responsible for omissions or mistakes.

  • What is exposed Ubiquiti, why is it a risk and how can you mitigate that risk?

    What is it? Ubiquiti produces routers, radios, switches, gateways and wireless access points. Why is it a risk? The AirOS firmware in these devices has a bug that can be exploited without any authentication. According to their advisory (link below) “Simply having a radio on outdated firmware and having its http/https interface exposed to the ...
  • What is exposed VNC, why is it a risk an how can you mitigate that risk?

    What is it? Virtual Network Computing (VNC) is a platform-independent remote desktop control system. There are numerous VNC implementations (LibVNC, TightVNC, UltraVNC, etc.) which run on Windows, Linux, macOS, iOS, Android and other operating systems. VNC uses port 5900 or 5800. VNC is used for work-from-home scenarios and for remote troubleshooting and maintenance ...
  • What is a Freak SSL attack, what is the risk and how can you mitigate that risk?

    What is it? Secure Sockets Layer (SSL), and the more modern Transport Layer Security (TLS) are encryption/decryption techniques used by computers when transferring data; https web sites use this technology. There are several algorithms that can be used to do the de/encryption. When a client computer contacts a server computer, they negotiate which algorithm ...
  • What is an Open Service FTP Vulnerability, what is the risk and how can you mitigate that risk?

    What is it? File Transfer Protocol (FTP), first introduced in 1971, is one of the oldest Internet protocols. It is used to transfer files from one computer to another on a network. FTP uses ports 20 and 21. FTP does not encrypt file transfers OR login credentials. Recently, major browser vendors have disabled ...
  • What is an SSL Poodle Attack, what is the risk and how can you mitigate that risk?

    What is it? Secure Sockets Layer (SSL), and the more modern Transport Layer Security (TLS) are encryption/decryption techniques used by computers when transferring data; https (“hypertext transfer protocol secure”) web sites use this technology. There are several algorithms that can be used to do the de/encryption. When a client computer contacts a server computer, ...
  • What is a Blocklist, what is the risk and how can you mitigate that risk?

    What is it? A blocklist (sometimes still referred to as a “blacklist”) is a list of Internet addresses and domain names that have been reported as sending out unsolicited advertising (aka “spam”), distributing malware, hosting botnets, hosting phishing websites, etc. Many e-mail services will not deliver mail from blocklisted servers. There are many public ...
  • What is a Botnet Drone, what is the risk and how can you mitigate that risk?

    A botnet is a network of infected computers that can be controlled remotely, forcing them to send spam, spread viruses, or stage DDoS (distributed denial of service) attacks. A Botnet Drone is a type of software that connects your device to a botnet. Source: Avast.com
  • What is a DNS Attack, what is the risk and how can you mitigate that risk?

    What is it? The Domain Name System (DNS) is a decentralized naming system for computers and other network resources. A computer uses DNS to translate an Uniform Resource Locator (URL, like www.google.com) to an Internet Protocol (IP, like 142.250.69.206) address. It’s roughly analogous to a traditional telephone book, except that lookups are coordinated over ...
  • What are NTP Service Mode 6 Queries, what is the risk and how can you mitigate that risk?

    The remote NTP server responds to mode 6 queries (Mode 6 is the recommended protocol used to get status information from a running ntpd to configure some of its behaviors on the fly). Devices that respond to these queries have the potential to be used in NTP amplification attacks. An attacker sends a massive amount ...
  • What is an SNMP Attack, what is the risk and how can you mitigate that risk?

    An SNMP attack is a type of Distributed Denial of Service (DDoS) attack. Instead of Domain Name Servers (DNS), SNMP attacks use the Simple Network Management Protocol (SNMP) – a common network management protocol used for configuring and collecting information from network devices like servers, hubs, switches, routers and printers. SNMP attacks can generate attack volumes of hundreds of ...
  • What is an RDP Service Exploit, what is the risk and how can you mitigate that risk?

    What is it? Remote Desktop Protocol (RDP) allows a remote computer to take control of a computer in your network. RDP comes pre-installed for Microsoft Windows but can also be used with Apple OSX computers. RDP is used by many to work-from-home; it’s also used by IT support departments to perform remote maintenance and ...
  • What is an SSDP Service Exploit, what is the risk and how can you mitigate that risk?

    What is it? Simple Service Discovery Protocol (SSDP) is used to discover what devices (and their capabilities) are available in a local area network. It is the basis of Universal Plug and Play (UPnP) devices like printers and scanners but it also helps locate network resources. SSDP uses port 1900. Attackers can exploit SSDP ...