How cyber attacks work [Infographic]

How attackers get in, the tools they use, and how data is stolen.

hacking critical infrastructure security

For their 2016 Cyber Weapons Report security startup LightCyber used network analysis to understand what tools hackers use "to expand their footprint," that is, the tools they use to communicate with command and control servers, gain access privileges, and access new hosts.

Among the most commonly used hacker tools LightCyber found are some familiar names, including admin tools like VMware vSphere Client, Putty and Secure CRT and remote desktop tools like LogMeIn and TeamViewer (which made news recently when researchers discovered a backdoor).

Security consulting and services provider AIM Corporate Solutions compiled the following infographic showing the cyber attack sequence and highlighting the tools hackers commonly use at each step.

To continue reading this article register now

Subscribe today! Get the best in cybersecurity, delivered to your inbox.