top of page
Search

Understanding the Anatomy of a cyber attack

Writer's picture: delhitrainingcoursdelhitrainingcours

Updated: Apr 15, 2020



Today's cyberattacks are malicious, advanced, and persistent. From cyber criminals looking for financial and intellectual property information to state-sponsored cyberattacks to steal data and compromise infrastructure, today's malware is so sophisticated and persistent that it can cause significant damage to your business. Likewise, there are so many attack vectors and entry points that a competent and determined cybercriminal can enter your network in just a few minutes, to install malware that will go unnoticed for months. These advanced persistent threats or APTs (Advanced Persistent Threats) represent a real challenge for companies,

More Cool Tips and Tricks can be found at : Hacking Tips and Tricks

The anatomy of a six-step cyber attack

Neutralizing a cyberattack requires a good understanding of how it works. A cyber attack takes place in six stages:

  1. The cybercriminal, or attacker, uses an email, a file, a vulnerability in an application or in the network configuration to infiltrate the enterprise and install malicious software, or malware. The target is then compromised.

  2. The malware probes the network for other vulnerabilities or potential access points, or communicates with command and control websites to receive further instructions and / or malicious code.

  3. Very often, it creates new entry points to continue the attack in the event of the closure of one of its accesses.

  4. Once infiltrated into the network, the hacker begins to collect data such as usernames and passwords. When he has cracked the passwords, he can then identify himself and access the data.

  5. The data collected is first stored on a relay server, then exfiltrated. The data breach is therefore established.

  6. The hacker then erases all traces of the cyber attack, but the business remains compromised. Cybercriminals can therefore access their network at any time to commit other violations.


The article is associated with DICC offers ethical hacking course in delhi.

32 views0 comments

Recent Posts

See All

Comments


bottom of page