How cyberattacks work [Infographic]

How attackers get in, the tools they use, and how data is stolen.

Become An Insider

Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more.

For their 2016 Cyber Weapons Report security startup LightCyber used network analysis to understand what tools hackers use "to expand their footprint," that is, the tools they use to communicate with command and control servers, gain access privileges, and access new hosts.

Among the most commonly used hacker tools LightCyber found are some familiar names, including admin tools like VMware vSphere Client, Putty and Secure CRT and remote desktop tools like LogMeIn and TeamViewer (which made news recently when researchers discovered a backdoor).

Security consulting and services provider AIM Corporate Solutions compiled the following infographic showing the cyber attack sequence and highlighting the tools hackers commonly use at each step.

To continue reading this article register now

Notice to our Readers
We're now using social media to take your comments and feedback. Learn more about this here.