Across
- 3. this malware enables malicious actors to gain unauthorized access to data.
- 5. attackers send fraudulent correspondence that seems to come from legitimate sources, usually via email
- 7. prevents access to the data of the victim and threatens to delete or publish it unless a ransom is paid.
- 9. this phishing attack targets high-profile employees (whales), such as the chief executive officer (CEO) or chief financial officer (CFO).
- 10. occurs when a threat actor tricks a target into using a malicious device, placing a malware-infected physical device, like a USB, where the target can find it.
Down
- 1. a threat actor tricks the victim into thinking they inadvertently downloaded illegal content or that their computer is infected with malware.
- 2. online advertising controlled by hackers, which contains malicious code that infects a user’s computer when they click, or even just view the ad.
- 4. systems under hacker control that have been infected with malware.
- 5. an online fraud scheme during which a cybercriminal installs malicious code on a server or computer.
- 6. this malware is designed to exploit backdoors and vulnerabilities to gain unauthorized access to operating systems.
- 8. voice phishing (vishing) attacks use social engineering techniques to get targets to divulge financial or personal information over the phone.
