Knowledge Is Power: Identify The 7 Stages Of Advanced Attacks

Stop Data Theft In Its Tracks

Recon1. Recon

Threat actors research their targets through analysis of publicly available information on trusted private, professional and social media sites.

Defenses


Lure2. Lure

Specially crafted lures aim to trick users into interacting with malicious emails, URLs and compromised websites.

Defenses


Redirect3. Redirect

Users are often redirected multiple times to put a layer of abstraction between the initial lure and the payload.

Defenses


Exploit Kit4. Exploit Kit

Web-based exploit code scans the target system to identify vulnerable software on the machine. The vulnerability is exploited in order to drop the malicious payload.

Defenses


Dropper File5. Dropper File

Dropper files gain a foothold into your network to commit data theft.

Defenses


Call Home6. Call Home

Infected systems establish an outbound communication channel to threat actor’s infrastructure to receive further instructions or tools and send stolen data.

Defenses


Data Theft7. Data Theft

Successful theft of intellectual property, Personally Identifiable Information (PII) or other valuable data for cybercriminals is used for financial gain or to support future attacks.

Defenses