The main technique behind Operation Aurora and attack on RSA, APT or Advanced Persistent Threat takes control over the target as follows:
1. Identifies the target victim <u>having access that the attacker needs</u>
2. Sends malicious attachments through spoofed emails and and infects victims machines
3. Gathers intelligence of the network layout, strategic assets and individuals with higher access levels.
4. if needed elevates the authorization level by spear phishing or hacking into the administrative passwords
5. Installs malware, hijacks system, establishes backdoor route to communicate with command and control servers.
6. Attacker activates command and control server to steal and transmit sensitive information.
No comments:
Post a Comment