7 things to know about the anatomy of a cyberattack

Cyberattacks are growing in frequency and cost. A new survey from WEDI, Perspectives on Cybersecurity in Healthcare June 2015, offers a closer look at how hackers execute cyberattacks.

Here are seven insights into the anatomy of a cyberattack.

1. Reconnaissance. Hackers study a network, user behavior and system vulnerabilities.
2. Weaponize. Hackers will build a malicious code designed to exploit any weaknesses and enter a system undetected.
3. Delivery. Hackers select the optimal way to deliver the malicious code, whether through phishing, infected websites or malvertising.
4. Exploitation. An exploit is delivered via a user browser or system once a malicious link has been clicked or a vulnerability allows execution of malware.  
5. Command and control. Malware will communicate back to command and control services, while hackers harvest information.
6. Internal reconnaissance. Once in a system, hackers may attempt to gain administrative rights for access to the entire network.
7. Maintain. Hackers will attempt to maintain undetected access to the network for as long as possible.

Copyright © 2024 Becker's Healthcare. All Rights Reserved. Privacy Policy. Cookie Policy. Linking and Reprinting Policy.

 

Featured Whitepapers

Featured Webinars