Cyber threats

12345678910
Across
  1. 3. this malware enables malicious actors to gain unauthorized access to data.
  2. 5. attackers send fraudulent correspondence that seems to come from legitimate sources, usually via email
  3. 7. prevents access to the data of the victim and threatens to delete or publish it unless a ransom is paid.
  4. 9. this phishing attack targets high-profile employees (whales), such as the chief executive officer (CEO) or chief financial officer (CFO).
  5. 10. occurs when a threat actor tricks a target into using a malicious device, placing a malware-infected physical device, like a USB, where the target can find it.
Down
  1. 1. a threat actor tricks the victim into thinking they inadvertently downloaded illegal content or that their computer is infected with malware.
  2. 2. online advertising controlled by hackers, which contains malicious code that infects a user’s computer when they click, or even just view the ad.
  3. 4. systems under hacker control that have been infected with malware.
  4. 5. an online fraud scheme during which a cybercriminal installs malicious code on a server or computer.
  5. 6. this malware is designed to exploit backdoors and vulnerabilities to gain unauthorized access to operating systems.
  6. 8. voice phishing (vishing) attacks use social engineering techniques to get targets to divulge financial or personal information over the phone.