Cyber criminals are stepping up and becoming professionals
in their field. As the use of technology increases everyday, then hackers keep
improving by the minute. Cyber criminals learning how to break through every
code and devices as the development of technology come on stream. Therefore,
hackers and virus are far more persistent and advanced which can lead to
serious damages and destroy an entire firm. Furthermore, it has been a
challenge for businesses to develop cyber security in order for these criminals
to determine.
In order for users to know how to stop cyber attack, then users
need to know how really work.
According to https://www.fireeye.com/current-threats/anatomy-of-a-cyber-attack.html
here are six steps describing the anatomy of a cyber attack:
- The cyber criminal, or threat actor, gains entry through an email, network, file, or application vulnerability and inserts malware into an organizations network. The target is now compromised.
- The advanced malware probes for additional network access, vulnerabilities, or communicates with command and control (CnC) websites to receive additional instructions and/or malicious code.
- The malware typically establishes additional breach points to ensure that the cyber attack can continue if one point is closed.
- Once a threat actor has established network access he/she begins to gather data, such as account names and passwords. Once the attacker cracks the passwords, he/she can now can identify and access data.
- Data is collected on a staging server, then the data is exfiltrated. A data breach is now occurring.
- Evidence of the cyber attack is removed, but the organization is still compromised and the cyber criminal can return at any time to continue the data breach.
These are some real good points to help with cyber attack anatomy
ReplyDelete