top of page
  • Writer's pictureMegan Haybyrne

How do Cyber Attacks Work?

Cyberattacks can differ in many ways such as type of attack, size and results.

However, there is a basic structure that cyber criminals follow when carrying out cybercrimes. The steps used are listed below.

  • Survey, or alternatively called Reconnaissance is the starting point for most attacks. It consists of a series of actions to investigate and analyse available information about the target in order to identify potential vulnerabilities.

  • Delivery - getting to the point in a system where you have an initial foothold, usually in the form of some malware or a backdoor into a system. In other words, you have gotten past the defenses and are within the corporate environment. Think of it like a burglar.

  • Breach - exploiting the vulnerability/vulnerabilities to gain some form of unauthorised access.

  • Affect - carrying out activities within a system that achieve the attacker’s goal.

  • The goal, or reward may be monetary or destructive, depending on the motivation of the attack.

1 view0 comments

Recent Posts

See All


bottom of page