'Job,      Education,      Career,      Health,      Family,      Relationship,      Marriage,      Technology,      Students,      Professions,      Management,      Leadership,      Psychology,      Law,      Finance,      Investment,      Sex,      Body Language,      Communication,      Food,      Children,      Entertainment      &      More'.

Tuesday, 3 April 2012

'Modus Operandi' of Cyber Attackers

Most cyberattacks are random. According to Symantec Anti Virus Group President, Francis Desouza, in 2011 there were 300 million cyberattacks. But some attackers know exactly who they want to reach and how to steal information. Here is their 'modus operandi':-
  • A hacker first chooses his target company which has vital information that he needs or to get access in to it.
  • The hacker identifies an employee or the person who has all vital data with valuable information. Mostly, he will do research on social networks like Facebook, Linkedin to know how best to target him.
  • The hacker then sends an email to the targeted person that appears to come from a friend or business associate.
  • It might include an attachment that looks legitimate but contains a malicious computer code that will give the hacker access to the target's computer.
  • The code is often original and of high enough quality that it is very difficult to detect the hacking.
  • The hacker then uses his acccess.
  • He steals data from the victim's computer or to root around the network for valuable information.
  • Most cybercrime is basically an online smash-and-grab job.
  • The hacker is likely to wait undetected for valuable information to steal, or to continuously steal information over time.