A Quick Glossary of Attack Types
| Category | Attack Type | Description |
|---|---|---|
| Social Engineering & Identity | Business Email Compromise (BEC) | Impersonating executives/suppliers via email to divert payments or steal sensitive data. |
| Social Engineering & Identity | Phishing | Deceptive emails or sites trick users into entering credentials or downloading malware. |
| Social Engineering & Identity | Smishing | Phishing via SMS messages. |
| Social Engineering & Identity | Vishing | Phishing via voice calls or phone menus. |
| Social Engineering & Identity | Callback Phishing | Email or SMS lures victims to call a fake support number to install tools or pay fees. |
| Social Engineering & Identity | Quishing (QR Phishing) | Malicious QR codes lead users to credential theft or malware. |
| Social Engineering & Identity | MFA Fatigue / Push Bombing | Attackers spam login approvals until a user taps ‘Approve’. |
| Social Engineering & Identity | OAuth Consent Phishing | Users are lured to grant a rogue cloud app access to mail/files via OAuth. |
| Social Engineering & Identity | Email Spoofing | Forged sender addresses to appear as trusted parties (often abusing weak DMARC/SPF/DKIM). |
| Social Engineering & Identity | Email Forwarding Rule Abuse | Covert auto-forward rules exfiltrate mail or hide attacker messages. |
| Social Engineering & Identity | Credential Stuffing | Using leaked username/password pairs to log into other services. |
| Social Engineering & Identity | Password Spraying | Trying common passwords across many accounts to avoid lockouts. |
| Social Engineering & Identity | Brute Force | Trying many passwords against one account. |
| Social Engineering & Identity | SIM Swap | Hijacking a phone number to intercept SMS codes and reset accounts. |
| Social Engineering & Identity | Account Pre-Hijacking | Creating or linking accounts ahead of a target to take control when they register or SSO. |
| Social Engineering & Identity | Deepfake Impersonation | AI-generated voice/video used to mimic leaders and approve payments or access. |
| Social Engineering & Identity | Session Hijacking | Stealing session tokens/cookies to take over accounts. |
| Social Engineering & Identity | Golden SAML | Forging SAML tokens using stolen signing keys to access cloud services. |
| Social Engineering & Identity | OAuth Token Theft/Replay | Stealing and reusing bearer tokens to impersonate users. |
| Web & Application | SQL Injection | Malicious input forces a database to reveal or alter data. |
| Web & Application | Cross-Site Scripting (XSS) | Injected script runs in a victims browser via a trusted site. |
| Web & Application | Cross-Site Request Forgery (CSRF) | Tricking a logged-in users browser to perform unintended actions. |
| Web & Application | Server-Side Request Forgery (SSRF) | Forcing a server to fetch attacker-chosen URLs, often internal metadata. |
| Web & Application | Insecure Deserialization | Abusing object parsing to run code on the server. |
| Web & Application | IDOR / BOLA | Insecure direct object access manipulating IDs to view others data. |
| Web & Application | Path Traversal | Manipulating file paths to access files outside intended folders. |
| Web & Application | Clickjacking | Invisible overlays trick users into clicking hidden UI elements. |
| Web & Application | API Abuse / Broken Authentication | Flaws in APIs enable bypassing authentication or enumerating data. |
| Web & Application | Watering-Hole | Booby-trapping a site employees frequent to infect visitors. |
| Web & Application | Drive-By Download | A malicious page silently drops malware on visit. |
| Web & Application | Malvertising | Malicious ads on legitimate sites deliver exploits or redirects. |
| Web & Application | Domain Impersonation / Typosquatting | Look-alike domains mimic brands to capture traffic or credentials. |
| Web & Application | Subdomain Takeover | Claiming an unconfigured/abandoned subdomain to host malicious content. |
| Web & Application | HTTP Request Smuggling | Desynchronizing front-end/back-end parsing to bypass security controls. |
| Web & Application | Prototype Pollution | Poisoning object prototypes in JS apps to change application behavior. |
| Web & Application | Web Cache Poisoning | Manipulating cached responses so many users get malicious content. |
| Web & Application | Magecart / Web Skimming / Formjacking | Injecting code to capture payment/PII from checkout forms. |
| Endpoint & Malware | Malware (umbrella) | Malicious software: viruses, worms, Trojans, spyware, keyloggers, RATs. |
| Endpoint & Malware | Ransomware (Double/Triple Extortion) | Encrypting data; also threatening leaks and/or DDoS for pressure. |
| Endpoint & Malware | Data-Extortion-Only | Stealing and threatening to leak data without encrypting systems. |
| Endpoint & Malware | Wiper / Sabotage | Malware that destroys data or devices to disrupt operations. |
| Endpoint & Malware | Cryptojacking | Hijacking systems to mine cryptocurrency. |
| Endpoint & Malware | Web Shells | Backdoor scripts on servers for remote control. |
| Endpoint & Malware | Living-off-the-Land (LotL) | Using built-in tools (e.g., PowerShell) to evade detection. |
| Endpoint & Malware | UEFI / Bootkits | Malware that loads before the OS for deep persistence. |
| Endpoint & Malware | BYOVD | Using a vulnerable driver to disable defenses and escalate privileges. |
| Endpoint & Malware | DLL Sideloading / Hijacking | Planting a fake library a trusted app loads. |
| Endpoint & Malware | Process/Thread Injection | Running malicious code inside legitimate processes. |
| Endpoint & Malware | Keylogging / Screen Capturing | Recording keystrokes or screens to steal secrets. |
| Endpoint & Malware | PoS / Card Skimming Malware | Stealing card data from point-of-sale systems. |
| Network & Infrastructure | DDoS (Distributed Denial-of-Service) | Overwhelming services with traffic to knock them offline. |
| Network & Infrastructure | Man-in-the-Middle (MitM) | Intercepting or altering network traffic between parties. |
| Network & Infrastructure | Rogue AP / Evil Twin (Wi-Fi) | Fake Wi-Fi hotspots that capture logins and inspect traffic. |
| Network & Infrastructure | DNS Tunneling | Smuggling data/commands through DNS queries/responses. |
| Network & Infrastructure | BGP Hijacking | Mis-routing internet traffic by abusing routing announcements. |
| Network & Infrastructure | Command-and-Control (C2) / Beaconing | Infected hosts reach out to attacker servers for commands. |
| Network & Infrastructure | Data Exfiltration | Unauthorized transfer of data out of the organization. |
| Network & Infrastructure | Lateral Movement | Hopping from one system to others inside the network. |
| Network & Infrastructure | Privilege Escalation | Gaining higher permissions than intended. |
| Network & Infrastructure | Fast Flux / Domain Shadowing | Rapidly changing DNS/infra to evade takedowns. |
| Network & Infrastructure | Bulletproof Hosting | Crime-friendly hosting that resists abuse complaints. |
| Cloud, SaaS & DevOps | Supply Chain Attack | Compromising a trusted vendor, update, library, or CI/CD to reach you. |
| Cloud, SaaS & DevOps | Dependency Confusion / Typosquatted Packages | Poisoning builds with malicious packages named like internal ones. |
| Cloud, SaaS & DevOps | Cloud Misconfiguration Exploitation | Public buckets, open admin consoles, weak IAM policies. |
| Cloud, SaaS & DevOps | Leaked Secrets / Keys | API keys/tokens exposed in code, repos, tickets, or logs. |
| Cloud, SaaS & DevOps | CI/CD Pipeline Compromise | Hijacking build/deploy systems to insert backdoors. |
| Cloud, SaaS & DevOps | Container Escape | Breaking from a container into the host or other containers. |
| Cloud, SaaS & DevOps | Kubernetes Abuse | Abusing kubelet/API permissions, secrets, or exposed dashboards. |
| Cloud, SaaS & DevOps | Code Signing Certificate Theft | Stealing certs to sign malware as if it were legitimate. |
| Cloud, SaaS & DevOps | Shadow IT SaaS Takeover | Compromising unsanctioned apps linked to corporate identities. |
| Enterprise Identity (AD/Entra) | Credential Theft (Pass-the-Hash/Ticket) | Reusing captured hashes or Kerberos tickets to impersonate users. |
| Enterprise Identity (AD/Entra) | Kerberoasting / AS-REP Roasting | Extracting crackable material from AD to recover service or user keys. |
| Enterprise Identity (AD/Entra) | Ticket Forgery (Golden/Silver) | Creating valid-looking Kerberos tickets with stolen keys. |
| Enterprise Identity (AD/Entra) | DCSync / DCShadow | Emulating a domain controller to read or set credentials. |
| Enterprise Identity (AD/Entra) | Delegation Abuse (RBCD) | Misusing AD delegation to impersonate accounts. |
| Enterprise Identity (AD/Entra) | AD CS Abuse | Exploiting certificate services to mint sign-in certificates. |
| Enterprise Identity (AD/Entra) | RDP Compromise | Breaking into Remote Desktop to access servers directly. |
| Fraud & Process | Business Process Compromise (BPC) | Abusing legitimate workflows (e.g., invoice rules) to siphon funds. |
| Fraud & Process | Invoice / Payment Redirection Fraud | Altering beneficiary details to reroute payments. |
| OT/IoT | ICS/SCADA Intrusions | Targeting industrial control systems to manipulate physical processes. |
| OT/IoT | IoT Device Takeover | Exploiting weakly secured smart devices for access or botnets. |
| Emerging / Specialized | Adversarial ML (Model Evasion/Poisoning) | Manipulating ML inputs or training data to degrade or subvert models. |
| Emerging / Specialized | Data Integrity Attacks | Quietly altering data to change decisions or reports without detection. |
| Emerging / Specialized | Insider Threat (Malicious/Negligent) | Employees or partners abusing access or mishandling data. |

Leave a comment