preview

Weaponized Attack: A Case Study

Decent Essays

As mentioned previously, we believe that the APT involved in our attack is in the weaponized phase of an attack. In this phase, the APT will used the information he or she obtained from the reconnaissance phase to develop a weapon (i.e. malware with an additional payload) specifically designed to target our weaknesses. The common method for delivery is email; however, it could be a fake website that users are redirected to. For example, users access their social media accounts, such as Facebook, Twitter, or even the previously mentioned LinkenIn) and they open a private message with an attachment or link to the fake website where the user inadvertently launches the cleverly designed attack. In creating the weaponized attack, APTs have access

Get Access