Cyberattacks
Cyber attacks: what are the main ones and how to protect yourself from them?
Digital Cybersecurity Internet
In a digital world, the number of cyber-attacks is on the rise. In fact, according to Kaspersky, a leading cybersecurity company, in 2024 up 28% from 2023. As a consequence, so does concern and investment in protection systems. These attacks can compromise all kinds of information, putting companies and individuals at risk. Below, we review some of them and how to protect yourself against them.
![The number of cyberattacks has been steadily increasing since the start of the COVID-19 pandemic.](/documents/20125/413939/Ciberataques_746x419.jpg/9ee0e001-f777-32ed-5b8c-992d2e763d0f?t=1635307987430)
Is the digital era also the era of cyberattacks?
Would you like someone to tell you about it? Listen to this article. For those who want to change the world.
The 21st century is the century of digitalisation. The constant technological evolution of artificial intelligence and big data, among other tools, and the development of the Fourth Industrial Revolution have many pros, but also cons. This totally digitalised world is vulnerable. Cyberattacks are increasingly becoming the order of the day, and can expose sensitive information on individuals, companies and governments.
Definition of cyberattack
A cyberattack is a set of actions directed against information systems, such as databases or computer networks, with the aim of harming people, institutions or companies. This type of action can target both the equipment and systems that operate on the network, cancelling their services, and the databases that store information, which can be spied on, stolen or even used for extortion.
Today, cyberwarfare is more likely to occur than traditional warfare, as experts Alec Ross and Keren Elazari noted in the March 2021 Shapes. In fact, more and more criminal organisations are turning to cyberattacks. This is because they are highly cost-effective and require a less complex infrastructure, as well as being extremely difficult to track and therefore to detect.
For Elazari, "states and corporations alike have redrawn the battle lines, which are now virtual". In 2024, cybercrime and its constant attacks – nine out of ten organisations suffered a cyberattack during the year – put the predicted costs related to cybercrime at $10.5 T a year by 2025, according to the World Economic Forum.
Artificial Intelligence (AI) has helped to prevent these attacks, but also to carry them out, making it very difficult for companies to protect themselves. From 2024 to 2032 there is expected to be an increase of up to 32% in the number of tech workers.
Types of cyberattacks
Not all cyberattacks are the same. There are several types depending on how they are executed, their purpose, their victim, etc. Here, from Kaspersky, a leading cybersecurity company, we summarise the most common ones:
Phishing
Phishing is the sending of fraudulent messages, usually via email, that appear to come from trusted and secure sources. The main objective of this type of cyberattack is to steal highly sensitive personal data, such as login information or credit card details, among others.
Malware
This refers to malicious software that includes viruses and worms. Basically, it exploits vulnerabilities to breach networks and typically attacks when a user clicks on a link or email attachment. Its impact ranges from installing malicious software to blocking access to key network components (ransomware) or stealing information (spyware).
SQL injection
A Structured Query Language (SQL) injection occurs when a hacker inserts malicious code into a server that uses SQL, forcing it to reveal information that is protected or that it would not normally reveal. The hacker can do this by simply submitting malicious code into a search box from a vulnerable website.
Denial of Service attack
This cyberattack results in the saturation of systems, servers and even networks with traffic in order to exhaust resources and bandwidth. Hackers often use a variety of devices specifically prepared to launch the attack and the consequences result in the inability to complete legitimate requests.
These are some of the best known and most widely used cyberattacks, but there are others, such as man-in-the-middle attacks, zero-day attacks, DNS tunneling, etc.
![Why do you need a cybersecurity network?](/documents/20125/4823064/ciberataques-746-EN.jpg/46c6cd3c-8ebe-1089-fc37-6926237d50ea?t=1734969179014)
How to protect yourself from a cyberattack
Cyberattacks pose a serious threat to our current way of life. Therefore, here are some keys to protect ourselves from cyberattacks:
Examples of cyberattacks (famous cases)
Since the beginning of the 21st century, there have been many cyber-attacks that have left their mark in different ways, such as their scope, their economic impact and even the panic they have generated:
Wannacry
In 2017, a large number of computers across Europe had their systems compromised, their files encrypted and all user access blocked. Thousands of companies were paralysed in a matter of minutes by ransomware distributed on the network (WannaCryptor). This attack is remembered for the enormous economic losses it caused.
Conficker
In 2008, a complex worm infiltrated vulnerable Windows systems (2000, XP, Vista, Server 2003 and Server 2008). The attack had a massive reach - 10 million infected computers in 190 countries - and its sheer complexity set off alarm bells. The speed at which it spread led to it being classified as a military threat.
Stuxnet
In the summer of 2010, one of the most sophisticated cyber spies emerged. Its aim was to attack critical infrastructures and industrial environments, including nuclear power plants, for example in Iran, and panic ensued. This virus would hack into systems, steal sensitive information and then order their self-destruction.
Petya
In 2016, a ransomware appeared with the ability to infect computers and encrypt their data, making it totally impossible for the user to use them. This virus basically affected Windows systems through an executable PDF that the victim opened himself. The most sinister aspect of this cyber-attack was that the computer screens displayed a skull.
Lockbit
In February 2024, a group of law enforcement agencies from 10 countries dismantled the world's largest ransomware group: Lockbit. It was responsible for high-profile cyberattacks on organisations around the world.
Operation Cronos (as the mission was called) was led by the UK's National Crime Agency and the US FBI, and dismantled the cyber group's entire operations (public darkweb leak site and technical infrastructure) as well as making two arrests. It was described by Europol as a "significant breakthrough in the fight against cybercrime".
![](/documents/20125/4177471/que-es-ciberseguridad-130x190.jpg/990d7e55-8abb-d5bc-1ad5-dc40cf4450ee?t=1715773657395)
What is cybersecurity?
Any individual or company is a potential target for cyber attack.
![](/documents/20125/3439497/vishing-130x190.jpg/4f873063-d2c2-830d-9e6e-883c743a8f76?t=1715008084720)
Vishing: protect your personal information
Find out what it involves, what types exist and how to avoid data spoofing.
![](/documents/20125/3470438/smishing-130x190.jpg/b0a08617-6a27-c3b0-6cad-6a4cd1ef11e5?t=1715008147819)
Smishing, what you need to know with advice from Iberdrola
Find out what it involves, what types exist and how to avoid falling victim to this scam.