Common malicious website attack methods

Source: Internet
Author: User

Author Miao Diyu

Illegal download
Illegal download is a kind of computer code. It uses software errors in the Web browser to make the browser execute the operations that attackers want, such as running malicious code, crashing the browser, or reading data from the computer. Software errors that can be exploited by browser attacks are also known as vulnerabilities.
Phishing Attacks
When an attacker impersonates a trusted company to display a webpage or send an email, a webpage counterfeit attack occurs. These web pages or emails require customers without knowledge to provide sensitive information.
Spyware is any software package that tracks personal identity information or confidential information and sends the information to a third party.
A virus is a type of malicious code or software that is usually spread by other computers through email, download, or insecure websites.
Virus detected by inspiration
The virus detected by the heuristic method is detected based on the malicious behavior of the virus. These actions may include attempts to steal personal passwords, credit card numbers, and other sensitive information.
Worms are another type of malicious code or software. They are primarily intended to spread to other computer systems that are vulnerable to attacks. It is typically transmitted by sending copies of an email, instant message, or other service to another computer.
Unrequested browser changes
Requested browser changes refer to changes to the Web browser's behavior or settings without the user's consent. This may cause the homepage or search page to be changed to another website, which is usually designed to provide users with ads or other unwanted content.
Suspicious browser changes
Suspicious browser changes refer to attempts by the website to modify the list of trusted websites. The website may attempt to enable your Web browser to automatically download and install suspicious applications without your consent.
A dialup program can be any software package with the following features: Changing the modem configuration to call a high-cost paid phone number or requesting a payment to access specific content. As a result of such attacks, the telephone line owner pays for Unauthenticated services.
Tracking tools
Tracing software is any software package that tracks system activities, collects system information, or tracks customer habits and forwards the information to third-party organizations. The information collected by such programs is neither personal identity nor confidential information.
Hacker tools
Hacker tools are some programs that hackers or unauthorized users can use to initiate attacks, perform undesirable access to the PC, or perform fingerprint recognition on the PC. The system or network administrator can use some hacking tools for legal purposes, but the functions provided by the hacking tools may also be abused by unauthorized users.
Joke Program
A joke program is a program that can change or interrupt normal computer behavior, resulting in comprehensive confusion or damage. Joke programs are designed to perform various operations, such as opening a pc cd or DVD drive at will.
Security risks
Security risk is a condition in which computers are more vulnerable to attacks. This condition is generated when a legal program contains an error that may cause your computer security to degrade. These errors are usually unintentional. Using such programs increases the risk of your PC being attacked.
Suspicious Application
Suspicious applications are applications that may bring risks to computers. The behavior of such programs has been checked and determined to be unwanted or malicious.
Internet Domain preemptive Registration
Domain preemptive Registration refers to obtaining the site name to try to convince the user of the identity of the organization that runs the site. Domain preemptive registration uses fraudulent means to mimic trusted brands or confuse users in some other way. Similar domain preemptive registration is an internet domain preemptive registration form that uses a spelling variant of the name.
Difficult to uninstall
These programs are hard to uninstall. Files and registry keys are retained when you uninstall these programs. registry keys may cause the files to run after you uninstall the programs.
Computer threats
Items that are directly loaded to your computer and may be harmful to your computer, such as viruses and worms.
Identity threat
Items that attempt to steal personal information from your computer, such as spyware or key logging programs.
E-commerce security threats
Suspicious e-commerce activities, such as selling pirated goods.
Annoying factor
Not necessarily harmful but objectionable items, such as joke programs or counterfeit websites.
Click a paid advertising site
This indicates that a website name contains the brand name, but it is not the affiliate of the brand owner and mainly contains links to the advertisement or advertisement page.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.