Let's break down how a cyber attacker works, using the idea of a bank heist as a comparison, to understand the steps of a cyber attack, often called the Cyber Kill Chain.
This is like the planning phase of a heist, where the robbers scope out the bank, gathering as much information as they can. They look at the bank's layout, the security systems, and the timings of the guards. In the cyber world, attackers gather information about their target online, looking at social media, websites, and using tools to understand the organization's digital footprint, like what kind of software they use and who works there.
After finding out the bank's weaknesses, the robbers prepare their tools—maybe a drill for the safe, or a way to jam the security cameras. Similarly, cyber attackers prepare their attack by creating or obtaining malware or exploits designed to take advantage of the vulnerabilities they've found in their target's systems.
This is when the robbers actually go to the bank, maybe under the cover of night, and start their break-in. In a cyber attack, this is when the malware is sent to the target, possibly through phishing emails, infected USB drives, or malicious websites, to get the malware onto the target's system.
Once inside, the robbers get to work on opening the safe or getting into the vault. For cyber attackers, this stage is when the malware activates, exploiting the vulnerability to breach the system. This can give them unauthorized access to the organization's network.
In our heist, this would be like the robbers disabling the security cameras or erasing the video footage to cover their tracks. Cyber attackers do something similar by erasing logs, hiding their malware, and establishing a way to control the compromised system remotely, all to avoid detection.
Now that they have access to the vault, the robbers take the money or whatever they came for. In a cyber attack, this is when the attackers carry out their intended action, whether it's stealing data, encrypting files for ransom, or causing disruption.
Just like robbers making their getaway, cyber attackers try to leave without a trace. They might remove evidence of their presence or maintain access quietly for future attacks.