The cybersecurity world is filled with technical lingo and jargon. At TechCrunch, we’ve been writing about cybersecurity for years, and even we generally want a refresher on what precisely a particular phrase or expression means. That’s why we’ve created this glossary, which incorporates among the most typical — and never so widespread — phrases and expressions that we use in our articles, and explanations of how, and why, we use them.
It is a creating compendium, and we’ll replace it commonly.
Superior persistent menace (APT)
A sophisticated persistent menace (APT) is usually categorized as a hacker, or group of hackers, which beneficial properties and maintains unauthorized entry to a focused system. The primary purpose of an APT intruder is to stay undetected for lengthy durations of time, usually to conduct espionage and surveillance, to steal information, or sabotage important methods.
APTs are historically well-resourced hackers, together with the funding to pay for his or her malicious campaigns, and entry to hacking instruments sometimes reserved by governments. As such, lots of the long-running APT teams are related to nation states, like China, Iran, North Korea, and Russia. Lately, we’ve seen examples of non-nation state cybercriminal teams which can be financially motivated (equivalent to theft and cash laundering) finishing up cyberattacks related when it comes to persistence and capabilities as some conventional government-backed APT teams.
(See: Hacker)
The flexibility to run instructions or malicious code on an affected system, usually due to a safety vulnerability within the system’s software program. Arbitrary code execution might be achieved both remotely or with bodily entry to an affected system (equivalent to somebody’s gadget). Within the instances the place arbitrary code execution might be achieved over the web, safety researchers sometimes name this distant code execution.
Typically, code execution is used as a option to plant a again door for sustaining long-term and protracted entry to that system, or for working malware that can be utilized to entry deeper components of the system or different units on the identical community.
(See additionally: Distant code execution)
Botnets are networks of hijacked internet-connected units, equivalent to webcams and residential routers, which were compromised by malware (or generally weak or default passwords) for the needs of being utilized in cyberattacks. Botnets might be made up of a whole lot or hundreds of units and are sometimes managed by a command-and-control server that sends out instructions to ensnared units. Botnets can be utilized for a variety of malicious causes, like utilizing the distributed community of units to masks and protect the web site visitors of cybercriminals, ship malware, or harness their collective bandwidth to maliciously crash web sites and on-line companies with big quantities of junk web site visitors.
(See additionally: Command-and-control server; Distributed denial-of-service)
A bug is actually the reason for a software program glitch, equivalent to an error or an issue that causes the software program to crash or behave in an sudden method. In some instances, a bug may also be a safety vulnerability.
The time period “bug” originated in 1947, at a time when early computer systems have been the dimensions of rooms and made up of heavy mechanical and shifting tools. The primary identified incident of a bug present in a pc was when a moth disrupted the electronics of one in all these room-sized computer systems.
(See additionally: Vulnerability)
Command-and-control servers (also called C2 servers) are utilized by cybercriminals to remotely handle and management their fleets of compromised units and launch cyberattacks, equivalent to delivering malware over the web and launching distributed denial-of-service assaults.
(See additionally: Botnet; Distributed denial-of-service)
Cryptojacking is when a tool’s computational energy is used, with or with out the proprietor’s permission, to generate cryptocurrency. Builders generally bundle code in apps and on web sites, which then makes use of the gadget’s processors to finish advanced mathematical calculations wanted to create new cryptocurrency. The generated cryptocurrency is then deposited in digital wallets owned by the developer.
Some malicious hackers use malware to intentionally compromise massive numbers of unwitting computer systems to generate cryptocurrency on a big and distributed scale.
After we discuss information breaches, we finally imply the improper elimination of knowledge from the place it ought to have been. However the circumstances matter and might alter the terminology we use to explain a specific incident.
An information breach is when protected information was confirmed to have improperly left a system from the place it was initially saved and normally confirmed when somebody discovers the compromised information. As a rule, we’re referring to the exfiltration of knowledge by a malicious cyberattacker or in any other case detected because of an inadvertent publicity. Relying on what is thought concerning the incident, we might describe it in additional particular phrases the place particulars are identified.
(See additionally: Information publicity; Information leak)
An information publicity (a sort of knowledge breach) is when protected information is saved on a system that has no entry controls, equivalent to due to human error or a misconfiguration. This may embody instances the place a system or database is related to the web however and not using a password. Simply because information was uncovered doesn’t imply the information was actively found, however nonetheless may nonetheless be thought of an information breach.
An information leak (a sort of knowledge breach) is the place protected information is saved on a system in a method that it was allowed to flee, equivalent to as a consequence of a beforehand unknown vulnerability within the system or by the use of insider entry (equivalent to an worker). An information leak can imply that information may have been exfiltrated or in any other case collected, however there might not at all times be the technical means, equivalent to logs, to know for certain.
A distributed denial-of-service, or DDoS, is a type of cyberattack that entails flooding targets on the web with junk internet site visitors so as to overload and crash the servers and trigger the service, equivalent to a web site, on-line retailer, or gaming platform to go down.
DDoS assaults are launched by botnets, that are made up of networks of hacked internet-connected units (equivalent to residence routers and webcams) that may be remotely managed by a malicious operator, normally from a command-and-control server. Botnets might be made up of a whole lot or hundreds of hijacked units.
Whereas a DDoS is a type of cyberattack, these data-flooding assaults should not “hacks” in themselves, as they don’t contain the breach and exfiltration of knowledge from their targets, however as a substitute trigger a “denial of service” occasion to the affected service.
(See additionally: Botnet; Command-and-control server)
Encryption is the best way and means through which data, equivalent to information, paperwork, and personal messages, are scrambled to make the information unreadable to anybody apart from to its supposed proprietor or recipient. Encrypted information is often scrambled utilizing an encryption algorithm — basically a set of mathematical formulation that determines how the information needs to be encrypted — together with a non-public key, equivalent to a password, which can be utilized to unscramble (or “decrypt”) the protected information.
Almost all fashionable encryption algorithms in use as we speak are open supply, permitting anybody (together with safety professionals and cryptographers) to evaluate and verify the algorithm to ensure it’s freed from faults or flaws. Some encryption algorithms are stronger than others, which means information protected by some weaker algorithms might be decrypted by harnessing massive quantities of computational energy.
Encryption is totally different from encoding, which merely converts information into a distinct and standardized format, normally for the good thing about permitting computer systems to learn the information.
Finish-to-end encryption (or E2EE) is a safety function constructed into many messaging and file-sharing apps, and is extensively thought of one of many strongest methods of securing digital communications as they traverse the web.
E2EE scrambles the file or message on the sender’s gadget earlier than it’s despatched in a method that permits solely the supposed recipient to decrypt its contents, making it near-impossible for anybody — together with a malicious hacker, and even the app maker — to snoop inside on somebody’s non-public communications. Lately, E2EE has turn into the default safety commonplace for a lot of messaging apps, together with Apple’s iMessage, Fb Messenger, Sign, and WhatsApp.
E2EE has additionally turn into the topic of governmental frustration lately, as encryption makes it inconceivable for tech corporations or app suppliers to present over data that they themselves should not have entry to.
Most fashionable methods are protected with a number of layers of safety, together with the flexibility to set consumer accounts with extra restricted entry to the underlying system’s configurations and settings. This prevents these customers — or anybody with improper entry to one in all these consumer accounts — from tampering with the core underlying system. Nonetheless, an “escalation of privileges” occasion can contain exploiting a bug or tricking the system into granting the consumer extra entry rights than they need to have.
Malware also can reap the benefits of bugs or flaws brought on by escalation of privileges by gaining deeper entry to a tool or a related community, probably permitting the malware to unfold.
An exploit is the best way and means through which a vulnerability is abused or taken benefit of, normally so as to break right into a system.
(See additionally: Bug; Vulnerability)
Extortion
Normally phrases, extortion is the act of acquiring one thing, normally cash, by means of using pressure and intimidation. Cyber extortion isn’t any totally different, because it sometimes refers to a class of cybercrime whereby attackers demand cost from victims by threatening to wreck, disrupt, or expose their delicate data.
Extortion is usually utilized in ransomware assaults, the place hackers sometimes exfiltrate firm information earlier than demanding a ransom cost from the hacked sufferer. However extortion has rapidly turn into its personal class of cybercrime, with many, usually youthful, financially motivated hackers, opting to hold out extortion-only assaults, which snub using encryption in favor of easy information theft.
(Additionally see: Ransomware)
There isn’t a one single definition of “hacker.” The time period has its personal wealthy historical past, tradition, and which means inside the safety group. Some incorrectly conflate hackers, or hacking, with wrongdoing.
By our definition and use, we broadly discuss with a “hacker” as somebody who’s a “breaker of issues,” normally by altering how one thing works to make it carry out otherwise so as to meet their aims. In follow, that may be one thing so simple as repairing a machine with non-official components to make it operate otherwise as supposed, or work even higher.
Within the cybersecurity sense, a hacker is often somebody who breaks a system or breaks the safety of a system. That may very well be something from an internet-connected pc system to a easy door lock. However the individual’s intentions and motivations (if identified) matter in our reporting, and guides how we precisely describe the individual, or their exercise.
There are moral and authorized variations between a hacker who works as a safety researcher, who’s professionally tasked with breaking into an organization’s methods with their permission to establish safety weaknesses that may be fastened earlier than a malicious particular person has an opportunity to take advantage of them; and a malicious hacker who beneficial properties unauthorized entry to a system and steals information with out acquiring anybody’s permission.
As a result of the time period “hacker” is inherently impartial, we typically apply descriptors in our reporting to offer context about who we’re speaking about. If we all know that a person works for a authorities and is contracted to maliciously steal information from a rival authorities, we’re prone to describe them as a nation-state or authorities hacker (or, if acceptable, an superior persistent menace), for instance. If a gang is thought to make use of malware to steal funds from people’ financial institution accounts, we might describe them as financially motivated hackers, or if there may be proof of criminality or illegality (equivalent to an indictment), we might describe them merely as cybercriminals.
And, if we don’t know motivations or intentions, or an individual describes themselves as such, we might merely discuss with a topic neutrally as a “hacker,” the place acceptable.
(Additionally see: Superior persistent menace; Unauthorized)
Quick for “data safety,” another time period used to explain defensive cybersecurity targeted on the safety of knowledge and data. “Infosec” could also be the popular time period for trade veterans, whereas the time period “cybersecurity” has turn into extensively accepted. In fashionable occasions, the 2 phrases have turn into largely interchangeable.
Infostealers
Infostealers are malware able to stealing data from an individual’s pc or gadget. Infostealers are sometimes bundled in pirated software program, like Redline, which when put in will primarily search out passwords and different credentials saved within the individual’s browser or password supervisor, then surreptitiously add the sufferer’s passwords to the attacker’s methods. This lets the attacker sign up utilizing these stolen passwords. Some infostealers are additionally able to stealing session tokens from a consumer’s browser, which permit the attacker to sign up to an individual’s on-line account as in the event that they have been that consumer, however without having their password or multi-factor authentication code.
(See additionally: Malware)
Jailbreaking is utilized in a number of contexts to imply using exploits and different hacking strategies to avoid the safety of a tool, or eradicating the restrictions a producer places on {hardware} or software program. Within the context of iPhones, for instance, a jailbreak is a way to take away Apple’s restrictions on putting in apps outdoors of its “walled backyard” or to realize the flexibility to conduct safety analysis on Apple units, which is generally extremely restricted. Within the context of AI, jailbreaking means determining a option to get a chatbot to give out data that it’s not alleged to.
Malware is a broad umbrella time period that describes malicious software program. Malware can land in lots of types and be used to take advantage of methods in numerous methods. As such, malware that’s used for particular functions can usually be known as its personal subcategory. For instance, the kind of malware used for conducting surveillance on individuals’s units can also be referred to as “spyware and adware,” whereas malware that encrypts information and calls for cash from its victims is known as “ransomware.”
(See additionally: Infostealers; Ransomware; Spyware and adware)
Metadata is data about one thing digital, moderately than its contents. That may embody particulars concerning the measurement of a file or doc, who created it, and when, or within the case of digital pictures, the place the picture was taken and details about the gadget that took the picture. Metadata might not establish the contents of a file, however it may be helpful in figuring out the place a doc got here from or who authored it. Metadata also can discuss with details about an alternate, equivalent to who made a name or despatched a textual content message, however not the contents of the decision or the message.
Ransomware is a sort of malicious software program (or malware) that forestalls gadget homeowners from accessing its information, sometimes by encrypting the individual’s information. Ransomware is normally deployed by cybercriminal gangs who demand a ransom cost — normally cryptocurrency — in return for offering the non-public key to decrypt the individual’s information.
In some instances, ransomware gangs will steal the sufferer’s information earlier than encrypting it, permitting the criminals to extort the sufferer additional by threatening to publish the information on-line. Paying a ransomware gang isn’t any assure that the sufferer will get their stolen information again, or that the gang will delete the stolen information.
One of many first-ever ransomware assaults was documented in 1989, through which malware was distributed through floppy disk (an early type of detachable storage) to attendees of the World Well being Group’s AIDS convention. Since then, ransomware has advanced into a multi-billion greenback legal trade as attackers refine their techniques and hone in on big-name company victims.
(See additionally: Malware; Sanctions)
Distant code execution refers back to the skill to run instructions or malicious code (equivalent to malware) on a system from over a community, usually the web, with out requiring any human interplay from the goal. Distant code execution assaults can vary in complexity however might be extremely damaging when vulnerabilities are exploited.
(See additionally: Arbitrary code execution)
Sanctions
Cybersecurity-related sanctions work equally to conventional sanctions in that they make it unlawful for companies or people to transact with a sanctioned entity. Within the case of cyber sanctions, these entities are suspected of finishing up malicious cyber-enabled actions, equivalent to ransomware assaults or the laundering of ransom funds made to hackers.
The U.S. Treasury’s Workplace of Overseas Belongings Management (OFAC) administers sanctions. The Treasury’s Cyber-Associated Sanctions Program was established in 2015 as a part of the Obama administration’s response to cyberattacks focusing on U.S. authorities businesses and personal sector U.S. entities.
Whereas a comparatively new addition to the U.S. authorities’s bureaucratic armory towards ransomware teams, sanctions are more and more used to hamper and deter malicious state actors from conducting cyberattacks. Sanctions are sometimes used towards hackers who’re out of attain of U.S. indictments or arrest warrants, equivalent to ransomware crews based mostly in Russia.
A broad time period, like malware, that covers a variety of surveillance monitoring software program. Spyware and adware is often used to discuss with malware made by non-public corporations, equivalent to NSO Group’s Pegasus, Intellexa’s Predator, and Hacking Workforce’s Distant Management System, amongst others, which the businesses promote to authorities businesses. In additional generic phrases, a lot of these malware are like distant entry instruments, which permits their operators — normally authorities brokers — to spy and monitor their targets, giving them the flexibility to entry a tool’s digital camera and microphone or exfiltrate information. Spyware and adware can also be known as business or authorities spyware and adware, or mercenary spyware and adware.
(See additionally: Stalkerware)
Stalkerware is a type of surveillance malware (and a type of spyware and adware) that’s normally bought to strange shoppers beneath the guise of kid or worker monitoring software program however is usually used for the needs of spying on the telephones of unwitting people, oftentimes spouses and home companions. The spyware and adware grants entry to the goal’s messages, location, and extra. Stalkerware sometimes requires bodily entry to a goal’s gadget, which provides the attacker the flexibility to put in it straight on the goal’s gadget, actually because the attacker is aware of the goal’s passcode.
(See additionally: Spyware and adware)
What are you making an attempt to guard? Who’re you apprehensive about that would go after you or your information? How may these attackers get to the information? The solutions to those sorts of questions are what is going to lead you to create a menace mannequin. In different phrases, menace modeling is a course of that a corporation or a person has to undergo to design software program that’s safe, and devise strategies to safe it. A menace mannequin might be targeted and particular relying on the scenario. A human rights activist in an authoritarian nation has a distinct set of adversaries, and information, to guard than a big company in a democratic nation that’s apprehensive about ransomware, for instance.
After we describe “unauthorized” entry, we’re referring to the accessing of a pc system by breaking any of its security measures, equivalent to a login immediate or a password, which might be thought of unlawful beneath the U.S. Pc Fraud and Abuse Act, or the CFAA. The Supreme Court docket in 2021 clarified the CFAA, discovering that accessing a system missing any technique of authorization — for instance, a database with no password — just isn’t unlawful, as you can not break a safety function that isn’t there.
It’s price noting that “unauthorized” is a broadly used time period and infrequently utilized by corporations subjectively, and as such has been used to explain malicious hackers who steal somebody’s password to interrupt in by means of to incidents of insider entry or abuse by staff.
Digital non-public community (VPN)
A digital non-public community, or VPN, is a networking know-how that permits somebody to “nearly” entry a non-public community, equivalent to their office or residence, from wherever else on this planet. Many use a VPN supplier to browse the online, considering that this might help to keep away from on-line surveillance.
TechCrunch has a skeptics’ information to VPNs that may assist you to determine for those who assume a VPN is sensible for you. If it does, we’ll present you how you can arrange your personal non-public and encrypted VPN server that solely you management. And for those who don’t, we discover among the privateness instruments and different measures you possibly can take to meaningfully enhance your privateness on-line.
A vulnerability (additionally known as a safety flaw) is a sort of bug that causes software program to crash or behave in an sudden method that impacts the safety of the system or its information. Generally, two or extra vulnerabilities can be utilized at the side of one another — generally known as “vulnerability chaining” — to realize deeper entry to a focused system.
(See additionally: Bug; Exploit)
A zero-day is a particular sort of safety vulnerability that has been publicly disclosed or exploited however the vendor who makes the affected {hardware} or software program has not been given time (or “zero days”) to repair the issue. As such, there could also be no fast repair or mitigation to forestall an affected system from being compromised. This may be significantly problematic for internet-connected units.
(See additionally: Vulnerability)
Final up to date on November 5.