Saturday, April 4, 2015

The Anatomy of Cyber Atttacks

Cyber criminals are stepping up and becoming professionals in their field. As the use of technology increases everyday, then hackers keep improving by the minute. Cyber criminals learning how to break through every code and devices as the development of technology come on stream. Therefore, hackers and virus are far more persistent and advanced which can lead to serious damages and destroy an entire firm. Furthermore, it has been a challenge for businesses to develop cyber security in order for these criminals to determine.

In order for users to know how to stop cyber attack, then users need to know how really work.

According to https://www.fireeye.com/current-threats/anatomy-of-a-cyber-attack.html here are six steps describing the anatomy of a cyber attack:

  • The cyber criminal, or threat actor, gains entry through an email, network, file, or application vulnerability and inserts malware into an organizations network. The target is now compromised.
  •   The advanced malware probes for additional network access, vulnerabilities, or communicates with command and control (CnC) websites to receive additional instructions and/or malicious code.
  •   The malware typically establishes additional breach points to ensure that the cyber attack can continue if one point is closed.
  •   Once a threat actor has established network access he/she begins to gather data, such as account names and passwords. Once the attacker cracks the passwords, he/she can now can identify and access data.
  •  Data is collected on a staging server, then the data is exfiltrated. A data breach is now occurring.
  •   Evidence of the cyber attack is removed, but the organization is still compromised and the cyber criminal can return at any time to continue the data breach.

1 comment:

  1. These are some real good points to help with cyber attack anatomy

    ReplyDelete