7 things to know about the anatomy of a cyberattack

Cyberattacks are growing in frequency and cost. A new survey from WEDI, Perspectives on Cybersecurity in Healthcare June 2015, offers a closer look at how hackers execute cyberattacks.

Advertisement

Here are seven insights into the anatomy of a cyberattack.

1. Reconnaissance. Hackers study a network, user behavior and system vulnerabilities.
2. Weaponize. Hackers will build a malicious code designed to exploit any weaknesses and enter a system undetected.
3. Delivery. Hackers select the optimal way to deliver the malicious code, whether through phishing, infected websites or malvertising.
4. Exploitation. An exploit is delivered via a user browser or system once a malicious link has been clicked or a vulnerability allows execution of malware.  
5. Command and control. Malware will communicate back to command and control services, while hackers harvest information.
6. Internal reconnaissance. Once in a system, hackers may attempt to gain administrative rights for access to the entire network.
7. Maintain. Hackers will attempt to maintain undetected access to the network for as long as possible.

More articles on health IT:
HSX taps Mirth for electronic patient data exchange
Tech companies to spend 1% to 5% of revenue on security
Epic, Nebraska Medicine use Apple Watch for patient engagement

Advertisement

Next Up in Health IT

Advertisement

Comments are closed.