Salami Attack In Cyber Security

 

Salami Attack In Cyber Security

Ok friends,

In this one, we are talking about Salami Attacks.

You can watch the full video here: 



Yes, you heard me, Salami. That’s right.

Just to let you know, this is the common term.

But, from a technical cyber security point of view, the attack is referred to as the Salami Slicing Attack or the Salami Technique.

Look, I can’t find the image for a salami right now, but let’s imagine that this is a Salami.

Basically, The Salami Slicing Attack is a method used by cybercriminals to steal small amounts of money or resources from a large number of transactions or accounts over time.

The whole idea is to make the theft go unnoticed by taking only a tiny fraction from each transaction.

Cyber criminals can only hope that the victims or security systems won’t detect these small losses.

In these situations, hackers usually follow a structured approach for executing such an attack.

By the way, you can support me and buy me coffee on the following link: Buymeacoffee

First, they need access to the system.

The hacker gains unauthorised access to a system, which is often a financial system, where transactions are taking place.

Then they start Identifying the Targets. Which usually happens by identifying a large number of transactions or accounts within the system that they can exploit.

Then they start taking Small transactions or slices, you know Salami Slicing Attack. Instead of stealing a noticeable amount from a one resource or transaction.

To execute this perfectly, they ensure they have Low Visibility: The key to the Salami Slicing Attack is the very tiny amount behind each transaction.

This starts to create a Cumulative Impact. Basically, what that means is Over time, as the hacker continues to siphon off these small amounts of money from numerous transactions or resources, the cumulative effect becomes significant.

The only challenge with this type of attack is detection.

Basically, the traditional security systems may struggle to detect these attacks because the amounts stolen are often within the margin of error or considered negligible.

But, hey, with the existence of artificial intelligence. This may no longer be challenge.

Than you for watching the video all the way to the end.

I hope you found it useful.

Stay safe and I will see you in the next one.

You can check more videos on my channel on the following link:

 My YouTube Channel


Comments

Popular posts from this blog

Bluebugging Attack

What Is Eavesdropping In Cyber Security

Fileless Malware Attacks In Cyber Security