Click to Skip Ad
Closing in...

These are the most common ways hackers will attack your computer

Published Feb 23rd, 2021 6:20PM EST
Data breach
Image: Minerva Studio/Adobe

If you buy through a BGR link, we may earn an affiliate commission, helping support our expert product labs.

  • Cybersecurity company Proofpoint is out with a new report analyzing the various techniques that are used by hackers to conduct data breaches, intrusions, and a variety of different cyber attacks.
  • One of the most common tools hackers employ is the use of social engineering.
  • Read on for a look at how these techniques work, and what you need to know to protect yourself.

Computer security has dominated tech news headlines in recent weeks, with reports of one hack and data breach after another as hackers get increasingly brazen and aggressive when it comes to different ways of stealing your information.

We’ve noted in previous posts some of the different steps you can take to make yourself less of a target in the next data breach, but in the meantime, researchers from the cybersecurity company Proofpoint have prepared a report that looks at some of the most common steps hackers take in order to break into your PC. They include phishing emails, whereby hackers trick users into opening messages and interacting with them in a way that triggers a malicious action. Indeed, the Proofpoint researchers warn in their report, for those of you not aware, that “email is by far the biggest channel for cyber attacks. We saw a wide range of email attack techniques in the fourth quarter, but almost all of them included some form of social engineering.”

These kinds of malicious emails can look like they come from your boss or a colleague, from a company you trust (these are some of the most likely to be impersonated, per ZDNet), as well as simply looking like a fake invoice or bill that you owe. A recent example: Some 10,000 Microsoft email users were recently caught up in a phishing attack, with messages that appeared to be from shippers like FedEx.

This is all a form of social engineering. Yes, there are technical components involved in the hack itself, but they are triggered by human error — such as by opening or clicking on a message you shouldn’t have. Social engineering is just a fancy way of saying that hackers tricked you, which is why IT teams at some big companies will often send out messages that look legitimate but are intended to trick employees into opening them. That lets the companies see how many employees would have been fooled if the threat had been real and serves as a training opportunity.

The Proofpoint team says that “social engineering,” if it was broken out as its own category, would easily be a component in 99% of all cyber attacks.

hand holding cell phone hacking
A hand is shown holding a cell phone against a background of computer code. Image source: terovesalainen/Adobe

Top “threat actors” according to Proofpoint, meanwhile, include:

  • State-sponsored attackers. This typically involves some degree of espionage on behalf of a government, and the goals could be diplomatic or military.
  • Cyber crime rings. These are group of hackers generally in it for the money, whether by stealing yours or performing some action for which a “ransom” is required to be paid.
  • Hacktivists. A much rarer kind of hacker, these are often looking to right perceived wrongs and to disclose secret information that the hacktivists believe should be made public.

The full Proofpoint report

is definitely worth a read to get a sense of how some of the hacking attacks work, on a technical level. An example of another such technique is by locking malicious files behind a password, which can help it evade malware-detection programs. Then, all the hacker needs to do is give the password to the recipient and trick them into unlocking the file.

Andy Meek Trending News Editor

Andy Meek is a reporter based in Memphis who has covered media, entertainment, and culture for over 20 years. His work has appeared in outlets including The Guardian, Forbes, and The Financial Times, and he’s written for BGR since 2015. Andy's coverage includes technology and entertainment, and he has a particular interest in all things streaming.

Over the years, he’s interviewed legendary figures in entertainment and tech that range from Stan Lee to John McAfee, Peter Thiel, and Reed Hastings.