Cyberattacks are growing in frequency and cost. A new survey from WEDI, Perspectives on Cybersecurity in Healthcare June 2015, offers a closer look at how hackers execute cyberattacks.
Here are seven insights into the anatomy of a cyberattack.
1. Reconnaissance. Hackers study a network, user behavior and system vulnerabilities.
2. Weaponize. Hackers will build a malicious code designed to exploit any weaknesses and enter a system undetected.
3. Delivery. Hackers select the optimal way to deliver the malicious code, whether through phishing, infected websites or malvertising.
4. Exploitation. An exploit is delivered via a user browser or system once a malicious link has been clicked or a vulnerability allows execution of malware.
5. Command and control. Malware will communicate back to command and control services, while hackers harvest information.
6. Internal reconnaissance. Once in a system, hackers may attempt to gain administrative rights for access to the entire network.
7. Maintain. Hackers will attempt to maintain undetected access to the network for as long as possible.