Skip to content
geeksforgeeks
  • Tutorials
    • Python
    • Java
    • DSA
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps
    • Software and Tools
    • School Learning
    • Practice Coding Problems
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • Go Premium
  • DSA
  • Practice Problems
  • C
  • C++
  • Java
  • Python
  • JavaScript
  • Data Science
  • Machine Learning
  • Courses
  • Linux
  • DevOps
  • SQL
  • Web Development
  • System Design
  • Aptitude
  • GfG Premium
Open In App

Supply Chain Security

Last Updated : 23 Jul, 2025
Comments
Improve
Suggest changes
Like Article
Like
Report

Supply chain security plays a crucial role in safeguarding businesses against cyber attacks, physical security breaches, and supply chain disruption. Ransomware attacks of software companies, API exposure, third-party vendor data breaches, or hijacked shipments are some of the risks brought by an insecure supply chain. An insecure supply chain will result in lost sales, reputation loss, or business collapse.

To avoid supply chain attacks and vulnerabilities, companies need to incorporate cybersecurity into supply chain operations, supply chain physical security, and third-party risk management practices.

This article discusses the necessity of supply chain security, best practice, risk management solutions, and actual case studies to render global supply chains secure for businesses.

What is Supply Chain Security?

Supply chain security refers to the defense of the entire supply chain, such as suppliers, manufacturers, logistics, IT infrastructure, and third-party suppliers, against cybersecurity threats, physical threats, and operational disruptions.

The importance of supply chain security has skyrocketed in recent years, as we’ve witnessed a surge in supply chain cyber attacks. One study found that over four-fifths (81%) of organizations experienced a cyber breach through their supply chain in just a one-year period​. These indirect attacks are growing fast – by some counts, supply chain attacks have increased four- to five-fold (a 431% spike since 2021!)​. Gartner, a leading research firm, predicts that by 2025, 45% of organizations worldwide will have been targeted by software supply chain attacks, a threefold increase from 2021​. In short, supply chain threats are no longer a distant worry; they’re happening here and now, and to almost everyone.

  • Supply chain cybersecurity: Protecting digital assets, avoiding data breaches, and avoiding cyber threats such as ransomware and API vulnerabilities.
  • Physical supply chain security: Avoiding cargo theft, tampering, and supply chain disruptions that affect business operations.
  • Supply chain risk management: Revealing supply chain vulnerabilities, making the supply chain resilient, and protecting global supply chains against threats and disruptions.
  • Third-party risk management: Third-party vendor monitoring, security audits of the supply chain, and supply chain security best practices.

Read: What is a Supply Chain Attack?

Supply Chain Security Examples

Many high-profile breaches and cyberattacks have occurred because attackers compromised a business through its supply chain or partners. Here are some notable examples across various industries:

1. Target Data Breach (2013, Retail)

One of the most infamous supply chain breaches hit Target stores during the 2013 holiday shopping season. Hackers first broke into Target’s network using login credentials stolen from an HVAC third-party vendor that serviced the stores. This indirect access let attackers install malware on Target’s payment system, ultimately stealing data from 40 million credit and debit cards and personal information of 70 million customers​. The breach was traced back to the compromised vendor connection, illustrating how a weak link in the supply chain (in this case, a heating and cooling contractor) opened the door to a massive retail cyberattack​. Target later paid an $18.5 million settlement and estimated the total cost of the breach at around $202 million​.

2. NotPetya Malware Outbreak (2017, Global Manufacturing/Logistics)

The NotPetya attack was a destructive cyber threat in supply chains that started in Eastern Europe and quickly spread globally. It began when attackers compromised a popular Ukrainian tax accounting software, inserting malware into a routine software update – a classic software supply chain attack. When companies in Ukraine (including local offices of global firms) installed the tainted update, the malware exploded outwards. Victims included shipping giant Maersk, pharmaceutical company Merck, snack maker Mondelēz, and others across manufacturing and logistics. NotPetya paralyzed operations worldwide – for instance, Maersk had to reinstall thousands of servers and computers, temporarily halting its shipping terminals. The financial damage was enormous: Merck suffered $870 million in losses, FedEx’s European subsidiary lost about $400 million, and Mondelēz nearly $190 million​. A White House assessment put the total global damage at around $10 billion​.

3. UnitedHealth/Change Healthcare Ransomware (2023, Healthcare)

Healthcare organizations are increasingly hit by supply chain cyber threats, and a recent example involves one of the largest U.S. health insurance companies. In 2023, a ransomware attack struck Change Healthcare, a payment processing firm owned by UnitedHealth Group, which is deeply embedded in the healthcare supply chain​. The attack shut down the nation’s largest healthcare payment system for many days, meaning hospitals and clinics couldn’t get insurance claims processed or paid​. This in turn delayed services like distributing medical supplies and scheduling surgeries – a stark reminder that cyber attacks can put patient care at risk. To resolve the incident, the hackers were reportedly paid a $22 million Bitcoin ransom. The breach not only exposed sensitive health data but also demonstrated how an attack on a third-party service provider can ripple through the healthcare system, affecting many connected organizations and patients.

Working of supply chain Security

Supply chain security operates through a multi-layered system consisting of cybersecurity, risk assessment, compliance monitoring, and vendor management. It operates as follows:

1. Risk Identification & Assessment

Companies need to identify vulnerabilities and vulnerabilities that hackers can take advantage of before securing the supply chain.It includes:

  • Supplier Risk Assessment – Making sure suppliers comply with industry-best cybersecurity practices, secure IT environments, and meet standards such as ISO 27001, GDPR, and HIPAA.
  • Third-Party Risk Assessment – Evaluating if vendors use legacy software, are unencrypted, or have suffered security breaches in the past.
  • Cyber Threat Assessment – Identifying threats such as malware-laden software updates, phishing, or unencrypted cloud services used by suppliers.

Note: 81% of companies have been the victims of a cyber attack as a result of vulnerabilities in the supply chain that have been introduced by third parties. (BlueVoyant, 2023)

2. Implementing Cybersecurity Controls

Organizations use tight cybersecurity controls to defend the supply chain against cyber attacks, including:

  • Zero Trust Architecture – Suppliers and vendors have to authenticate before they can access corporate systems (multi-factor authentication, role-based access control).
  • Software Bill of Materials (SBOM) – An in-depth listing of all software utilized within a product to prevent any backdoor loopholes.
  • Scheduled Security Audits – Keeping tabs on suppliers to ensure they are using cybersecurity best practice.
  • Encryption & Secure Data Transfers – Securing data transfers between suppliers and businesses so that they cannot leak.

Note: The 2020 SolarWinds hack was precipitated by hackers inserting malware into software updates, affecting 18,000 companies, including US government agencies and Fortune 500 companies.

3. Vendor & Third-Party Risk Management

Given that most supply chain threats are third-party vendor-related, companies need to make vendors adhere to strong security practices before they hire them. Methods include:

  • Background Checks – Verifying a vendor's security track record and validating past data breaches.
  • Setting Security Standards in Contracts – Vendors are forced to adhere to security standards by contracts and Service Level Agreements (SLAs).
  • Real-time Monitoring – Real-time monitoring of the security posture of the suppliers and sending alerts if their security posture deteriorates.

Note: 66% of organizations fail to monitor their suppliers for security threats because they do not have continuous monitoring, and thus become susceptible to cyber attacks.

4. Supply Chain Visibility & Tracking

Supply chain security also entails monitoring data streams, shipments, and goods in real-time to identify security threats. These include:

  • GPS Tracking & IoT Sensors – Preventing theft or tampering of shipments during transit.
  • AI-Powered Risk Prediction – Using artificial intelligence to identify patterns of hack, counterfeiting, or fraud in supply chain data.
  • Blockchain for Secure Transactions – Firms are applying blockchain to record product movements securely and secure the supply chain against fraud.

Note: Maersk (2017) lost $300 million on a NotPetya cyber attack that froze its shipping units for weeks. Track-and-trace systems were eradicated, bringing about colossal delivery delays.

5. Compliance & Regulatory Standards

To avoid security breaches, corporations need to be in line with international supply chain compliance and cyber security law, including:

  • ISO 28000 – Global supply chain security management standard.
  • NIST Cybersecurity Framework – U.S. standards to protect third-party vendors along the supply chain.
  • CMMC (Cybersecurity Maturity Model Certification) – Compulsory for businesses handling business with the U.S. Department of Defense.
  • GDPR & HIPAA – Compliance for businesses handling customer information and health records.

Note: Strict framework-driven compliance businesses have 40% fewer security breach than non-compliance businesses.

Major Supply Chain Security Threats

1. Cybersecurity Threats

As companies became increasingly reliant on digital solutions, supply chain security has been a major concern. Supply chain attacks, API-based threats, and third-party security threats are increasing, and it is exposing companies to disruptions in operations and finances.

  • Ransomware attacks such as the Colonial Pipeline attack took down critical services, which led to mass supply chain disruptions.
  • Software supply chain attacks (such as the SolarWinds attack) introduce malware into software updates for hackers to attack critical systems.
  • API vulnerabilities pose a particularly dangerous threat, enabling attackers to reach critical infrastructure and sensitive business data.
  • Third-party risk management failures result in data breaches spilling confidential information through third-party vendors with weak security controls.

2. Physical Security Threats

Supply chain safety goes beyond cybersecurity—physical supply chain safety risks attack logistics, warehouses, and distribution channels as well

  • In-transit or warehousing cargo theft can mean huge monetary loss
  • Counterfeiting inserted into the supply chain and sabotage compromise product integrity and customer confidence
  • Geopolitical events and natural disasters destroy international supply chains, causing delays, shortages, and monetary loss.

Case Study: SolarWinds Supply Chain Attack

The SolarWinds supply chain attack in 2020 is perhaps the most infamous software supply chain breach ever. SolarWinds' Orion platform was penetrated by hackers, who added malicious code to legitimate software updates. The supply chain attack affected government agencies, Fortune 500 firms, and thousands of companies globally, highlighting fundamental flaws in third-party risk management and software supply chain security.

How the SolarWinds Attack Happened

  • Malicious Code Injection: Backdoor (SUNBURST malware) was embedded by hackers in Orion's software updates for remote access to sensitive networks.
  • Supply Chain Exploitation: Users automatically trusted the compromised software updates once they were deployed, resulting in nation-state cyber intelligence.
  • Extended Dwell Time: Attackers took months to be detected, exploiting supply chain vulnerabilities and gathering classified information.

Impact of the Attack

  • Government Agencies Impacted: U.S. Treasury, Department of Homeland Security, and cybersecurity companies.
  • Firms Impacted: Microsoft, Intel, Cisco, and thousands of other firms across the world.
  • Severe Supply Chain Disruption: The incident ran up the bill in terms of billions of damages and put under scrutiny fundamental vulnerabilities of third-party risk management.

Strengthening Supply Chain Security

Securing the supply chain might sound like trying to secure something you don’t fully control. There’s some truth to that – you can’t directly manage another company’s security as you do your own. However, supply chain security risk management is all about reducing the risk to an acceptable level through smart practices, due diligence, and continuous oversight. Here’s how organizations work to keep their supply chain secure:

1. Identify Your Suppliers and Map the Risks

The first step is to take inventory of all the third-party vendors and suppliers that have access to your systems or data, or that are critical to your operations. This might include IT service providers, software vendors, hardware suppliers, contractors, cloud services, payment processors, etc.

Once you have the list, categorize suppliers by risk level – e.g. a vendor that processes sensitive customer data or has network access poses a higher risk than one who provides office supplies. This helps prioritize where to focus.

2. Set Clear Security Requirements

Managing supplier risk isn’t a passive affair; you need to actively set expectations. Companies typically establish security requirements for their suppliers. For example, you might require that any vendor connecting to your network uses multi-factor authentication and meets certain encryption standards, or that they notify you within X hours if they have a breach. These requirements should be written into contracts and service level agreements (SLAs).

Additionally, many organizations only work with vendors who have recognized security certifications or compliance attestation. For example, you might prefer a cloud provider that is ISO 27001 certified or SOC 2 audited (demonstrating they follow good security practices), or a supplier that complies with NIST cybersecurity standards

3. Verify and Continuously Monitor Supplier Security

It’s not enough to trust a vendor’s word or one-time assessment. Continuous monitoring is key because cybersecurity is dynamic – new threats and vulnerabilities pop up all the time. Companies are increasingly investing in ongoing oversight of third-party security postures. This can include:

  • Regular Security Assessments or Audits
  • Automated Security Ratings and Alerts
  • Access Controls and Network Segmentation
  • Supply Chain Visibility Tools

4. Build Strong Relationships and Incident Response Plans

Another aspect of supply chain security is building strong communication with suppliers about security matters. If you treat vendors as true partners, you can work together on security. For example, some companies provide their smaller vendors with security training or resources, recognizing that helping a vendor improve is beneficial to both parties.

In fact, in a positive twist after SolarWinds, 81% of surveyed organizations said they’re now more likely to share cybersecurity best practices with peers and partners​ collaboration is increasing as everyone realizes we’re in this together.

Additionally, consider cyber insurance that covers third-party incidents. Some insurance policies now explicitly ask about your third-party risk management practices and may provide coverage if a vendor’s breach causes you losses (though they might expect you to subrogate and seek damages from the vendor later).

5. Leverage Frameworks and Compliance Standards

The field of supply chain security has matured to where there are established frameworks and guidelines to follow. Organizations don’t have to reinvent the wheel; they can lean on expert guidance:

  • NIST Guidelines
  • ISO Standards
  • Zero Trust Approach

Also Read:

  • Introduction to Supply Chain Management
  • What is Supply Chain Management and How it Works?
  • How To Counter Insider Threats in Software Supply Chain?

Conclusion

Supply chain security risk management may sound complex, but at its heart it’s about protecting your business by ensuring your partners and suppliers uphold good cybersecurity hygiene. We’ve seen how a lapse at one supplier can cascade into a full-blown crisis for many – from Target’s costly breach via an HVAC contractor to the SolarWinds saga that taught the world a hard lesson about trusting software updates. The stakes are high, but by proactively managing third-party risks, organizations can turn the supply chain from a security Achilles’ heel into a strength.

In plain terms, companies need to vet their suppliers, set the rules of engagement (security expectations), continuously watch for trouble, and be ready to respond if something goes wrong. It’s a continuous process – sort of like regular health check-ups for your vendor relationships. And much like personal health, prevention is better (and cheaper) than cure. Investing in supply chain security up front – through robust risk assessments, better monitoring tools, and building a culture of security with your partners – pays off by avoiding those nightmare scenarios that make headlines.


S

shudhanshu5j5r
Improve
Article Tags :
  • Ethical Hacking
  • Cyber-security
  • Ethical Hacking

Similar Reads

    Ethical Hacking Tutorial
    This Ethical Hacking tutorial covers both basic and advanced concepts of Ethical Hacking. Whether you are a beginner or an experienced cybersecurity professional, this tutorial is the perfect resource to learn how to tackle vulnerabilities and weaknesses in systems before malicious hackers can explo
    13 min read

    Introduction to Ethical Hacking

    What is Hacktivism ?
    Now people use social media to protest and raise their voices about political or social issues instead of marching on the street. This is what hacktivism perfectly displays. Hacktivism combines ‘hacking’ with ‘activism’, where a person or organization uses hacking to fulfill a political or social ag
    11 min read
    The Hackers Methodology
    A hacker is someone skilled in computer systems, networking, and programming who uses their expertise to exploit vulnerabilities in a digital system to carry out actions as per their will. The term 'hacker can be used in both positive and negative ways, depending on the hacker's intent. Ethical hack
    4 min read
    Remote Access in Ethical Hacking
    Remote access is a vulnerability through which attackers can control any device. Most commonly, payloads are used for remote control. Payloads are sent through social engineering or phishing attacks. Once the payload is injected, the actual attack begins. The payload will provide a reverse connectio
    5 min read
    Information Gathering Tools for Kali Linux
    Information Gathering means gathering different kinds of information about the target. It is basically, the first step or the beginning stage of Ethical Hacking, where the penetration testers or hackers (both black hat or white hat) tries to gather all the information about the target, in order to u
    5 min read
    ARIN in Ethical Hacking
    ARIN is the American Registry for Internet Numbers, a non-profit corporation that assigns IP addresses to organizations in North America and beyond. ARIN stands for the American Registry for Internet Numbers, a non-profit corporation that assigns IP addresses to organizations in North America and be
    3 min read
    Characteristics of Computer Networks
    Computer networks are a system of interconnected computers and other devices that allow for the sharing of information and resources. They can range in size from a few connected devices in a small office to millions of devices spread out across the globe. In this article, we are going to discuss som
    5 min read

    Foot Printing and Reconnaissance

    What is DNS Footprinting?
    DNS footprinting is a reconnaissance technique used to gather information about a target's DNS infrastructure. It helps attackers, penetration testers, and ethical hackers understand network topology and identify vulnerabilities. DNS acts as the internet’s "phone book," translating domain names (e.g
    6 min read
    Footprinting Through Search Engines
    A footprint is a digital trace of your activity that you leave behind on the Internet. It is like the footprint you leave behind in the sand at the beach. These footprints can be innocuous, such as an e-mail account that you have forgotten about in Hotmail, or they can give away highly sensitive inf
    5 min read
    What is Whois Footprinting?
    Whois Footprinting is an ethical hacking practice that collects data about targets and their condition. This is the pre-attack phase and the activities performed will be stealthed and best efforts will be made to prevent the target from tracking you. The footprinting is then the first significant ad
    4 min read
    Footprinting Using Social Engineering Method
    Prerequisites: How to Install Social Engineering Toolkit in Kali Linux? Social engineering is the act of manipulating people into giving up private or confidential information by appearing to be a likely insiders. For example, asking a person for help with your car and saying you know someone who ca
    4 min read

    Scanning Networks

    What is Credentialed Vulnerability Scan?
    Scanning is the second phase in the hacking methodology and plays an important role in identifying critical vulnerabilities within a system or organization. An effective scanning process helps by detecting weaknesses that can be patched before attackers have a chance to exploit them. However, do vul
    4 min read
    What are Scanning Attacks?
    Scanning in ethical hacking is a network exploration technique used to identify the systems connected to an organization's network. It provides information about the accessible systems, services, and resources on a target system. Some may refer to this type of scan as an active scan because it can p
    7 min read
    Malware Scan in Ethical Hacking
    In ethical hacking, malware scanning is not like finding a virus—it's about locating deeply hidden threats that traditional antivirus programs often miss. Malware scans are critical for security professionals who must protect confidential data from new threats like spyware, rootkits, keyloggers, and
    5 min read
    What is Running of a Malware Scan?
    There are so many types of malware out there that it can be hard to know which ones you should be taking extra precautions for. One type of malware is known as a rootkit, and these are extremely difficult to detect. A rootkit is usually installed on the Windows operating system when an unsuspecting
    5 min read
    WAScan - web application security scanner in Kali Linux
    WAScan stands for Web Application Scanner. It is an open-source web application vulnerability scanner. The tool uses the technique of black-box to find various vulnerabilities. This technique will not scan the whole source code of a web application but work like a fuzzer Which means it scans the pag
    2 min read
    What is TCP-ACK Scanning?
    TCP-ACK is a third step of the TCP 3-Way Handshake process (SYN, SYN-ACK, ACK). In TCP-ACK, the client acknowledges the response of the Server, and establish a connection to proceed with the data transfer and any other communication processes. TCP-ACK Scanning: In this scan, the ACK packets are sent
    2 min read
    Port Scanning Techniques By Using Nmap
    Nmap is a security auditing tool used in the security field to actively enumerate a target system/network. It is one of the most extensively used tools by network administrators and conversely attackers for reconnaissance (enumeration), the first step in the 5 phases of hacking. Nmap is used to acti
    5 min read
    What is SYN Scanning?
    Internet and its usage have evolved over the years. The Internet has become an integral part of daily human activities, and it becomes hard to imagine life without the Internet. The Cyber world has become so fascinating that it is often the soft target of cyberattackers and hackers to steal personal
    3 min read
    What is UDP Scanning?
    UDP scanning is a process in which we scan for the UDP services that are being deployed on the target system or are currently in a running state. UDP is a connectionless protocol, hence it is hard to probe as compared to TCP. Working of UDP scan:In UDP scan usually, we take advantage of any UDP serv
    2 min read

    Enumeration

    Cyber Security - Types of Enumeration
    Enumeration is fundamentally checking. An attacker sets up a functioning associated with the objective host. The weaknesses are then tallied and evaluated. It is done mostly to look for assaults and dangers to the objective framework. Enumeration is utilized to gather usernames, hostname, IP address
    15+ min read
    What is DNS Enumeration?
    In this article, we will learn about DNS Enumeration and the process of DNS enumeration with a practical approach. Domain Name System(DNS) is nothing but a program that converts or translates a website name into an IP address and vice versa. Example: A user enters www.geeksforgeeks.org in a browser,
    2 min read
    SMTP Enumeration
    SMTP (Simple Mail Transfer Protocol) is a set of communication guidelines that allow web applications to perform communication tasks over the internet, including emails. It is a part of the TCP/IP protocol and works on moving emails across the network. SMTP enumeration allows us to identify valid us
    2 min read
    LDAP Enumeration
    Before continuing reading, read about LDAP in general. Lightweight Directory Access Protocol (LDAP) is an Internet protocol that works on TCP/IP, used to access information from directories. The LDAP protocol is used to access an Active Directory. LDAP enumeration is a method of enumeration of the A
    6 min read
    What is NTP Enumeration?
    NTP Enumeration is a process by which an attacker can discover NTP servers on the network. This information can then be used to find vulnerable NTP servers, or simply to further enumerate the network. Servers that are allowed access from the internet usually have a much higher chance of being exploi
    4 min read
    What is IPsec Enumeration?
    In the world of computer hacking, IPsec enumeration is a process by which attackers are able to perform authentication on an IPsec system. It can allow them to gain access to the network and gather information. IPsec Enumeration: IPsec's enumeration is the process of gaining access to security keys
    4 min read
    What is NetBIOS Enumeration?
    NetBIOS is an acronym that stands for Network Basic Input Output System. It enables computer communication over a LAN and the sharing of files and printers. TCP/IP network devices are identified using NetBIOS names (Windows). It must be network-unique and limited to 16 characters, with 15 reserved f
    5 min read
    SNMP Enumeration
    Simple Network Management Protocol (SNMP) is an application-layer protocol that operates over UDP to manage and monitor network devices, such as routers, hubs, and switches.SNMP is widely used across various operating systems such as Windows Server and Linux.It is also implemented on network devices
    7 min read
    What is Security Testing in Enumeration?
    Security Testing in Enumeration is when a tester repeatedly performs the same task on a system to see if vulnerabilities exist. One way that a tester might do this is by creating scripts or programs to test for the existence of security issues in the system's software code. A good example of this ty
    4 min read

    System Hacking

    What is System Hacking in Ethical Hacking?
    System hacking is the process of exploiting vulnerabilities in electronic systems for the purpose of gaining unauthorized access to those systems. Hackers use a variety of techniques and methods to access electronic systems, including phishing, social engineering, and password guessing. Purpose of S
    2 min read
    What is Windows Hacking ?
    Windows OS is a graphical user interface (GUI) operating system developed by Microsoft. It was first released in 1985 as an add-on for MS-DOS, which was the most popular version of MS-DOS at that time. In its early days, Windows OS was known as “Microsoft DOS” or “MS-DOS” and later on it became know
    6 min read
    Importance of Physical Security in Ethical Hacking
    Physical security is the security of personnel, hardware, software, networks, and data from physical actions and events that could cause loss or serious damage to a business organization, federal agency, or social group. This includes protection against fire, flood, natural disaster, theft, vandalis
    3 min read
    What is Non-Electronic Password Attack on a System?
    Non-electronic password attacks are forms of hacking that seek to bypass any form of authentication or authentication system. Typically, a non-electronic password attack will use an automated script to probe for passwords on the network. One way this may be done is by placing port scanning software
    3 min read
    What is Password Guessing Attack?
    There are a number of methods to crack a user's password, but the most prominent one is a Password Guessing Attack. Basically, this is a process of attempting to gain the system's access by trying on all the possible passwords (guessing passwords). If the attacker manages to guess the correct one, h
    4 min read
    Credential Stuffing in Ethical Hacking
    Credential Stuffing is a cyberattack in which the attacker uses the list of credentials that are publicly available and then breaks into the system with various types of custom bots and other automation along with IP spoofing to prevent getting blocked. But as per the reports, only a small fraction
    2 min read
    Reverse Brute Force Attack in System Hacking
    The well-known and frequently utilized method of breaking into a system is brute force. The Reverse Brute Force attack is a different method from Brute Force in certain aspects but is very close to it overall. But first, we must comprehend the former (Brute Force) in order to comprehend the latter.
    4 min read
    Brute Force Attack
    A Brute force attack is a well known breaking technique, by certain records, brute force attacks represented five percent of affirmed security ruptures. A brute force attack includes 'speculating' username and passwords to increase unapproved access to a framework. Brute force is a straightforward a
    3 min read
    What is a Default Password Attack Threat?
    The term “attack” is used here to denote performing a variety of hacks, including brute force and social engineering, that require access to the target's computer system or network. Here are some terms and processes related to this skill boot camp: Brute ForcingPassword HashingCapture The Flag (CTF)
    3 min read
    USB Drop Attack in System Hacking
    The USB drop attack is a client-side attack in system hacking. This means that an attacker must be physically near the victim and plug a malicious USB device into the victim's computer to launch this type of attack. This type of cybersecurity hack is often used by cybercriminals to steal data or ins
    5 min read
    What is Sniffing Attack in System Hacking?
    A sniffing attack in system hacking is a form of denial-of-service attack which is carried out by sniffing or capturing packets on the network, and then either sending them repeatedly to a victim machine or replaying them back to the sender with modifications. Sniffers are often used in system hacki
    4 min read
    How to Prevent Man In the Middle Attack?
    In a web application, there are two things usually: the client and the server. The third entity that remains unnoticed most of the time is the communication channel. This channel can be a wired connection or a wireless connection. There can be one or more servers in the way forwarding your request t
    9 min read
    How To Generate Rainbow Table Using WinRTGen?
    Rainbow Tables are a large set of pre-computed hashes that are used for reversing cryptographic hash functions generally used for password cracking. It makes password cracking easy. Rainbow tables can be used to recover many types of password hashes for example MD4, MD5, SHA1, etc. In simpler terms,
    4 min read
    What is Elcomsoft Distributed Password Recovery?
    Elcomsoft Distributed Password Recovery is software to help you break the password on various types of computers, including standard Windows and Linux PCs. In order to use Elcomsoft Distributed Password Recovery, you will need a Home Agent application installed on your computer. The Home Agent is a
    4 min read
    pwdump7 in System Hacking
    Hackers gain access to specific computers on a network through system hacking. System hacking is the process of exploiting vulnerabilities in electronic systems with the goal of gaining unauthorized access to those systems. Hackers use a variety of techniques and methods to gain access to electronic
    3 min read
    FGDUMP in System Hacking
    Fgdump in system hacking in Ethical hacking is a tool and technique used by the ethical hacker that helps the intruder gain full access to the operating system of a remote machine. This tool can be quite useful when you are trying to find vulnerabilities within a company's computer systems, or if yo
    5 min read
    Password Auditing With L0phtcrack 7 Tool
    In essence, password auditing programs make guesses about the credentials being used on your network. They accomplish this using a combination of brute force and dictionary assaults, among other techniques, and then inform you of any other ways the passwords may be compromised, such as by being pwne
    5 min read
    What is Salted Password Hashing?
    Salted password hashing can be used to improve password security by adding additional layers of randomness on top of the hashing process. Salt is a cryptographically secure random string that is added to a password before it's hashed, and the salt should be stored with the hash, making it difficult
    4 min read
    How to Defend Against Password Cracking of Systems?
    To Defend against Password Cracking of systems in Ethical Hacking, you need to know how password cracking functions. Password cracking is the act of using a computer program to try to guess an inputted password. There are many forms of attacks that can be used in this process, but they all result in
    6 min read
    How to Defend Against Wi-Fi Pineapple?
    A Hack Wi-Fi Pineapple is a wireless auditing platform that enables network security managers to do penetration testing. Penetration tests are a sort of ethical hacking in which white hat hackers look for security flaws that a black hat attacker may exploit. A Wi-Fi Pineapple resembles a typical Wi-
    6 min read
    What is DLL Hijacking?
    Each Windows program relies on small assistive files named DLLs (Dynamic Link Libraries). These provide applications with functionality for simple activities such as printing, saving a file, or going online. When a malicious DLL is hidden inside by a hacker with the same name, the application picks
    8 min read
    How to Prevent Privilege Escalation?
    Privilege escalation is the process of exploiting a bug or design flaw in an operating system and obtaining elevated privileges to access information, change data, or exploit vulnerabilities. This blog post explores some common ways privilege escalation could be mitigated. Prevent Privilege Escalati
    4 min read

    Malware Analysis

    Most Popular Methods Used By Hackers to Spread Ransomware
    Ransomware is a malicious malware code usually designed to deny users access to their own systems until a ransom payment is paid to the creator of ransomware to achieve a decryption key. Ransomware is far more dangerous than normal malware, it is spread through many ways like phishing emails that co
    3 min read
    What is Malvertising? Working and Examples
    Cyber attacks are extremely dangerous attacks executed on the Internet. Cyber attacks give unauthorized access to hackers/ cyber criminals of the users or the organizations of the computer system. Modern times have recorded a huge increase in cyber attacks conducted every second. MalvertisingCyber a
    8 min read
    How to Find Trojan on Computers?
    A Trojan virus, or Trojan malware, is actually malicious code or software that looks legitimate to the victim but can take full control over the victim's computer. It is designed to steal, manipulate, disrupt, damage, or do some other destructive action on your data, network, and computer system. It
    4 min read
    Malwares - Malicious Software
    Malware is malicious software and refers to any software that is designed to cause harm to computer systems, networks, or users. Malware can take many forms. Individuals and organizations need to be aware of the different types of malware and take steps to protect their systems, such as using antivi
    8 min read
    What is WannaCry and How does WannaCry ransomware works
    In May 2017, a massive cyberattack shook the world when the WannaCry ransomware outbreak spread rapidly across hundreds of thousands of computers in more than 150 countries. This ransomware targeted organizations ranging from government agencies to healthcare providers, including the UK’s National H
    5 min read
    Working of Stuxnet Virus
    Stuxnet is a powerful and malicious computer worm that first appeared in 2010. It is also reported to be the largest and most expensive malware of this type. It exploited a previously unknown Windows zero-day vulnerability to infect the targeted system and spread to other systems. The virus primaril
    6 min read
    CryptoLocker Ransomware Attack
    Ransomware is a malicious malware code specifically designed to deny users access to their own systems until a ransom payment is paid to the ransomware creator to obtain a decryption key. Far more dangerous than normal malware, ransomware is spread through phishing emails with malicious files, links
    4 min read
    Storm Worm
    In this article we will know about the one of biggest malware attacks in 2007, It actually brings a change to the world of cyber security, It is known as Storm Worm. Storm Worm:Storm Worm in technical terms is a trojan horse that pretends itself to be a legit program. This malware is so dangerous th
    3 min read
    What is Zeus Malware?
    Malware is a malicious program designed to gain access to a computer system without the user's permission. Malware includes various types of unwanted programs such as computer viruses, worms, Trojans, ransomware, spyware, etc.You’re browsing the internet, and suddenly your computer starts acting str
    8 min read
    What is SQL Slammer Virus?
    The SQL Slammer is a computer virus that began in January 2003 and caused a denial of service on some Internet hosts, significantly slowing general Internet traffic. It spread rapidly and within 10 minutes he infected most of his 75,000 victims. Although the program is called the “SQL Slammer Worm”,
    2 min read
    How to Install Trojan Virus on Any Computer?
    A Trojan virus, or Trojan malware, is actually malicious code or software that looks legitimate to the victim but can take full control over the victim's computer. It is designed to steal, manipulate, disrupt, damage, or do some other destructive action on your data, network, and computer system. It
    5 min read
    Different Ways to Remove Trojan Horse Malware
    A Trojan virus, or Trojan malware, is actually malicious code or software that looks legitimate to the victim but can take full control over the victim's computer. It is designed to steal, manipulate, disrupt, damage, or do some other destructive action on your data, network, and computer system. Ma
    5 min read
    How to Defend Against Botnets ?
    A botnet is a network of computers or devices that have been compromised and are controlled by an attacker, without the knowledge of the owners. These devices, once infected with malware, are controlled by the attacker to carry out activities, such as sending spam emails, launching distributed denia
    5 min read
    What is Proxy Trojan?
    A proxy Trojan is a type of computer virus that disguises itself as something else, such as a harmless file or website. When a user accesses it, the proxy Trojan hijacks their browser and sends the user to bogus websites or downloads malicious files. Proxy Trojans can be used in two ways: for steali
    3 min read
    What are Banking Trojans?
    A banking Trojan is a piece of malware that is used primarily to steal banking credentials by remotely installing malicious software on a victim's computer system. Banking Trojans are tailored to specific types of computers and may use the Windows registry for installation. On the infected computer,
    3 min read
    What is a Computer Virus?
    A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its code. When this replication succeeds, the affected areas are then said to be "infected". Viruses can spread to other computers and files
    9 min read
    Virus Hoax
    Virus hoaxes are warning messages of viruses that are distributed via pop-ups, emails, and spam messages, the main objective of the virus hoax is to create fear and doubts in the user's mind. When the user panics, they usually fall into the trap of a virus hoax and get infected with phishing or rans
    2 min read
    Difference between Worms and Virus
    Two of the most common and often misunderstood types of malware are worms and viruses. Although they are sometimes confused with each other, they function in different ways. Both can cause serious damage to computers or compromise personal data. Understanding the differences between them is importan
    5 min read
    Port Scanning Attack
    Prerequisite: What is scanning attacks? Cyber-Attackers use various different methods to carry out the execution of Cyber-Attacks on the computer network, depending on the ease through which the computer network can be attacked on its vulnerability. Each type of Cyber-Attack is risky and harmful in
    3 min read
    What is System Integrity Check?
    A system integrity check is a part of the system hardening process to confirm that we have taken all the necessary measures to prevent any unauthorized access to our systems and files. System integrity check verifies the integrity of different system components, such as operating systems, applicatio
    6 min read
    Code Emulation Technique For Computer Virus Detection
    Code emulation is a technique for detecting technical events that are attributable to computer viruses. The technique is used in antivirus software and in intrusion detection systems. It compares an executable file or memory dump from one system with an archival copy of the same that has been saved
    5 min read
    Heuristic Virus
    A heuristic virus is a type of computer virus that replicates by guessing. It does this by analyzing what it perceives as the user's behavior and creating an infection that tries to mirror it. The aim of viruses like these is to make the user feel as if their data are being collected, so they could
    6 min read
    How to Prevent Backdoor Attacks?
    Cyber security or security of the web deals with the security mechanism of the cyber world. Cyber security is extremely necessary as it is important that computer networks have strong cyber security mechanisms set up to prevent any form of attack that may lead to compromise of computer network secur
    3 min read

    Sniffing

    What are Active Sniffing Attacks?
    Active Sniffing Attacks in Ethical Hacking can lead to using the intercepted data for malicious purposes. The most common use of sniffing is to steal passwords, credit card numbers, and other sensitive data. Sniffers are software programs that let you intercept network traffic in a convert way witho
    6 min read
    What is Protocol Analyzer?
    The network protocol is a set of rules that regulates the communication and exchange of data over the internet or network. Both the sender and receiver should follow the same protocols in order to communicate and exchange the data. Whenever we access a website or exchange some data with another devi
    3 min read
    What is MAC Spoofing Attack?
    MAC Spoofing is a type of attack used to exploit flaws in the authentication mechanism implemented by wired and wireless networking hardware. In layman’s terms, MAC spoofing is when someone or something intercepts, manipulate or otherwise tampers with the control messages exchanged between a network
    5 min read
    How to Prevent MAC Flooding?
    A flood of MAC addresses is a serious concern for ethical hackers because it can leave your system vulnerable to attack. In order to prevent this from happening, consider some of the following precautions: Use secure passwords.Install and use antivirus software.Update your operating system on a regu
    4 min read
    What is Port Stealing?
    Cyber security is the security of the web and related services related to the web. Cyber security is the way to prevent many cyber attacks from taking place. Cyber security ensures that awareness of the cyber-attacks along with the different forms of cyber attacks are well-known to people so that th
    3 min read
    Dynamic Host Configuration Protocol (DHCP)
    Dynamic Host Configuration Protocol is a network protocol used to automate the process of assigning IP addresses and other network configuration parameters to devices (such as computers, smartphones and printers) on a network. Instead of manually configuring each device with an IP address, DHCP allo
    12 min read
    DHCP Starvation Attack
    DHCP (Dynamic Host Configuration Protocol) is used to assign IP addresses to machines within any network automatically. It is also known as zeroconf protocol, as network administrators don't need to assign IP addresses to machines manually. To assign IP addresses, DHCP makes use of DORA packets whic
    4 min read
    What is Rogue DHCP Server Attack?
    Rogue DHCP server attacks are gaining popularity but can be mitigated. The hacker sets up a rogue DHCP server and creates an IP address conflict by broadcasting a duplicate IP address. Hackers infiltrate a network by attacking the wireless router, which they do with ARP poisoning in order to inject
    4 min read
    What is ARP Spoofing Attack?
    Spoofing is a type of attack in which hackers gain access to the victim's system by gaining the trust of the victim (target user) to spread the malicious code of the malware and steal data such as passwords and PINs stored in the system.In Spoofing, psychologically manipulating the victim is the mai
    3 min read
    How to Prevent DNS Poisoning and Spoofing?
    The domain name system, or DNS, is a naming system for computers, services, and other internet resources that is hierarchical in nature. It's essentially the internet's phone book. Each domain name has a corresponding set of ten or so numbers that make up the domain name's IP address. Simple, user-f
    6 min read
    DNS Spoofing or DNS Cache poisoning
    Prerequisite - Domain Name Server Before Discussing DNS Spoofing, First, discuss what is DNS.A Domain Name System (DNS) converts a human-readable name (such as www.geeksforgeeks.org) to a numeric IP address. The DNS system responds to one or more IP-address by which your computer connects to a websi
    3 min read
    How to Detect Sniffer in Your Network?
    Sniffers are software or hardware devices that can be used for wiretapping over a computer network, such as LAN or WAN. They are used to collect data by listening and capturing IP packets. These devices usually have the ability of recording data which includes email, chat, web browsing, and informat
    5 min read
    Mitigation of DHCP Starvation Attack
    In a DHCP starvation attack, an attacker creates spoofed DHCP requests with the goal of consuming all available IP addresses that a DHCP server can allocate. This attack targets DHCP servers. The attack could deny service to authorized network users. In other words, a malicious cyberattack that targ
    5 min read

    Social Engineering

    What is Social Engineering? Working, Types, Prevention and Impact
    Social Engineering is an umbrella term for multiple malicious activities done by cyber criminals over the internet through human interaction. It doesn't involve the use of technical hacking techniques. Attackers use psychology and manipulation to trick users into performing actions that could compro
    8 min read
    What is Insider Attack?
    Cyber attacks on organizations are increasing both in number and magnitude. Often carried out by attackers with intentions to harm an organization, gain financial benefits, pursue political motives, spread terror, etc., these attacks always cost organizations in one form or another. Cyber security i
    6 min read
    What is an Impersonation Attack?
    An impersonation attack is a threat where hackers impersonate trusted people or organizations—such as your boss, bank, or a well-known service used by companies, to the trick victims so that they can give sensitive information, funds, or access to systems. Unlike classical malware-based attacks (e.g
    6 min read
    What are Tailgating?
    Tailgating is a term that refers to the practice of parking along the side of a road, usually by an open field or parking lot. Tailgaters are not only prohibited from entering the highway itself, but also have no right to drive on it at all. The term “tailgater” comes from tail-end Charlie, which me
    5 min read
    How Hackers Use Social Engineering to Get Passwords on Facebook?
    Social engineering is a powerful method for hackers to exploit computer systems without the use of malware or computer hacking tools. To carry out a successful social engineering hack, ethical hackers need to understand how to effectively use social media and human interaction to obtain sensitive in
    4 min read
    Pretexting in Social Engineering
    Pretexting is a social engineering technique that's used by hackers, spammers, and pranksters to assume and exploit the trust of an individual. It's been defined as the act of taking on an identity (usually those of a trusted person, such as a customer service representative) for the purpose of gain
    4 min read
    Credit Card Frauds
    This era belongs to technology where technology becomes a basic part of our lives whether in business or home which requires connectivity with the internet and it is a big challenge to secure these units from being a sufferer of cyber-crime. Wireless credit card processing is a tremendously new serv
    2 min read
    Active Social Engineering Defense (ASED)
    A proactive tactic called Active Social Engineering Defense (ASED) is used to lessen the risk of being the target of social engineers. We must first comprehend social engineering in order better to comprehend active social engineering defense (ASED). Social Engineering Attack:Without the use of malw
    6 min read
    Cyber Crime - Identity Theft
    Identity Theft also called Identity Fraud is a crime that is being committed by a huge number nowadays. Identity theft happens when someone steals your personal information to commit fraud. This theft is committed in many ways by gathering personal information such as transactional information of an
    5 min read
    Penetration Testing - Software Engineering
    Penetration testing, or pen testing, is a practice where a simulated cyber attack is conducted on your computer systems to find and fix any weak spots before real attackers can exploit them. It focuses on web application security, where testers try to breach parts like APIs and servers to uncover vu
    9 min read

    Denial-of-Service

    Distributed Denial of Service DDoS attack
    Imagine a scenario where you are visiting some websites and one of them seems to be a little slow. You might blame their servers for improving their scalability as they might be experiencing a lot of user traffic on their site. Most of the sites already take this issue into account beforehand. Chanc
    6 min read
    What are Bandwidth Attacks?
    Bandwidth attacks in ethical hacking target a network's bandwidth, and by extension, its available computing resources. A hacker can overload a network by sending a high number of packets to the computer or server at once. The processing power and memory in the system is limited and once it reaches
    6 min read
    HTTP Flood Attack
    Cyber crimes are increasing with the growing demand for the internet. With an increasing number of cybercrime cases reported each year, awareness of cyberattacks is very important. Cyber crimes/cyberattacks are done by hackers who unethically want to breach user data and steal sensitive information
    9 min read
    ICMP Flood DDoS Attack
    In today's world, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have become a major threat to present computer networks. DDoS is a kind of attack in which an attacker targets the victim's network resources such as bandwidth or memory so that the victim may stop responding
    12 min read
    Ping Flood Attack
    A Ping Flood Attack, or ICMP Attack (Internet Control Message Protocol Attack), is a type of offensive cyberattack utilized to attack the targeted device—computer, server, or network—with a flood of false requests. It is a Denial of Service (DoS) attack, as it is intended to disrupt normal operation
    6 min read
    What is a Permanent DoS (PDoS) Attack?
    In today's modern world, we often come across the term Cybercrime or Cyberattacks very frequently. With the increasing demand for the internet, cybercrime occurrence has taken a great spike. Cyber crimes are crimes involving cyber technology/computer networks. Cyberattacks are extremely dangerous as
    6 min read
    What is Phlashing?
    Phlashing is a type of Denial of Service (DoS) Attack, also known as a Permanent Denial of Service Attack (PDoS) which is very severe because there is no way to undo this attack's consequences as it damages/corrupts the system to such an extreme level that there is no other way except to replace or
    4 min read
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Campus Training Program
  • Explore
  • POTD
  • Job-A-Thon
  • Community
  • Videos
  • Blogs
  • Nation Skill Up
  • Tutorials
  • Programming Languages
  • DSA
  • Web Technology
  • AI, ML & Data Science
  • DevOps
  • CS Core Subjects
  • Interview Preparation
  • GATE
  • Software and Tools
  • Courses
  • IBM Certification
  • DSA and Placements
  • Web Development
  • Programming Languages
  • DevOps & Cloud
  • GATE
  • Trending Technologies
  • Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
  • Preparation Corner
  • Aptitude
  • Puzzles
  • GfG 160
  • DSA 360
  • System Design
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences