Pillar 2 – Malware & cyber attacks explained

Cyber threats are evolving faster than ever. From advanced malware and exploit kits to innovative hardware attacks, today’s threat landscape is defined by speed, automation, and creativity.

This guide breaks down the core concepts of malware, exploits, and modern attack techniques, helping you understand how attackers operate—and how to defend against them.


What Is Malware?

Malware (malicious software) is any program designed to disrupt, damage, or gain unauthorized access to systems.

Common Types of Malware:

  • Ransomware – Encrypts files and demands payment
  • Spyware – Steals sensitive information
  • Trojans – Disguised as legitimate software
  • Botnets – Networks of infected devices used for attacks
  • Worms – Self-propagating malware

Modern malware is often:

  • Modular and adaptable
  • Delivered via multiple vectors
  • Designed to evade detection

What Are Exploits?

An exploit is a method or piece of code that takes advantage of a vulnerability in software or hardware.

Types of Exploits:

  • Zero-day exploits – Unknown vulnerabilities with no patch
  • N-day exploits – Known but unpatched vulnerabilities
  • Remote exploits – Executed over a network
  • Local exploits – Require prior access

Exploit development is now frequently packaged into exploit kits, making attacks scalable and accessible.


How Modern Attacks Work

Most cyberattacks follow a repeatable chain:

1. Initial Access

Attackers gain entry through:

  • Phishing
  • Exploit kits
  • Weak credentials
  • Exposed services

2. Execution & Persistence

Malicious code is executed and embedded into the system to maintain access.


3. Privilege Escalation

Attackers gain higher-level permissions to control systems.


4. Lateral Movement

The attack spreads across networks.


5. Impact

This could include:

  • Data theft
  • Ransomware deployment
  • System disruption

Key Threat Techniques (Real-World Examples)

Exploit Kits & Advanced Malware

Exploit kits automate the process of finding and exploiting vulnerabilities.

Example:

  • Coruna iOS exploit kit
    • Demonstrates how multiple vulnerabilities can be chained together
    • Targets mobile devices at scale

Network-Based Attacks (MITM & Traffic Interception)

Attackers intercept or manipulate network traffic to steal credentials or inject malicious content.

Example:


Hardware & Physical Attack Vectors

Not all attacks are purely software-based.

Example:

  • USB security risks
    • Malicious cables and devices can act as attack tools
    • Often used for initial access

Side-Channel & Signal-Based Attacks

These attacks exploit unintended data leakage.

Example:


Botnets & Distributed Threats

Botnets allow attackers to control large numbers of compromised devices.

Example:

  • KadNap botnet
    • Uses peer-to-peer communication
    • Enables stealthy and resilient operations

Why These Threats Matter

Modern cyberattacks are:

  • Multi-layered – combining multiple techniques
  • Automated – reducing attacker effort
  • Scalable – targeting thousands of victims
  • Stealthy – designed to evade detection

Understanding individual techniques is important—but understanding how they combine is critical.


How to Defend Against Modern Threats

Technical Defences

  • Keep systems patched and updated
  • Use endpoint detection and response (EDR)
  • Monitor logs and network traffic

Identity & Access Control

  • Enforce strong authentication (e.g., passkeys, MFA)
  • Limit privileges
  • Monitor account activity

Network Security

  • Segment networks
  • Use intrusion detection systems (IDS)
  • Restrict unnecessary services

Hardware Awareness

  • Avoid untrusted USB devices
  • Validate hardware sources
  • Monitor for unusual physical behaviour

The Future of Malware & Exploits

Expect to see:

  • AI-assisted attack development
  • Increased hardware-based attacks
  • More sophisticated exploit chains
  • Greater use of stealth and evasion techniques

Cybersecurity is no longer reactive—it must be proactive.


Final Thoughts

Malware and exploits are at the core of modern cyber threats. By understanding how they work – and how attackers combine techniques – you can better defend systems, networks, and users.

This page serves as your foundation. Use the linked posts as deep dives into each specific threat.