Search GSSD

How Cybercriminals Change Tactics During Their Cyber Attacks

Abstract: 
The amount of cyberattacks is constantly rising throughout the world. The author tackles the question, “How these threats are continuously spreading?” by looking at the tactics employed by hackers. This article describes the transition from old-age malware hackers to cybercriminals who employ advanced technological tools such as attack vectors enabling higher intrusion and havoc. For example, attackers exploited Window’s operating system by implementing an attack with an extremely low detection rate, that spurred the spread of the attack through a network of connected computers. This article goes through the four stages of a cyberattack: 1) Identifying Vulnerabilities, 2) Scanning and Testing, 3) Gaining Access, and 4) Maintaining Access. Acute skills and thorough knowledge about networks and systems is the fundamental basis to even understand what these stages mean. A lot of cyberattacks occur after new releases of software when vulnerabilities can be exploited. Many new tactics such as switching type of malware during an attack, impersonating legitimate entities such as Dropbox emails, and more, are being employed to find someway around existing securities. Keywords: Cyberattack, strategy, hackers, hacking, tactics, education
Author: 
Ioana Rijnetu
Institution: 
Heimdal Security
Year: 
2019
Input By: 
Anurag Golla
Affiliation: 
MIT
Domains-Issue Area: 
Region(s): 
Industry Focus: 
Internet & Cyberspace
Country: 
United States
Datatype(s): 
Case Studies
Events
Models
Organizations
Theory/Definition