Americas

  • United States

Asia

Oceania

by CSO staff

How cyber attacks work [Infographic]

Feature
Aug 19, 20161 min
CybercrimeData BreachIT Skills

How attackers get in, the tools they use, and how data is stolen.

hacking critical infrastructure security
Credit: Thinkstock

For their 2016 Cyber Weapons Report security startup LightCyber used network analysis to understand what tools hackers use “to expand their footprint,” that is, the tools they use to communicate with command and control servers, gain access privileges, and access new hosts.

Among the most commonly used hacker tools LightCyber found are some familiar names, including admin tools like VMware vSphere Client, Putty and Secure CRT and remote desktop tools like LogMeIn and TeamViewer (which made news recently when researchers discovered a backdoor).

Security consulting and services provider AIM Corporate Solutions compiled the following infographic showing the cyber attack sequence and highlighting the tools hackers commonly use at each step.