An attack vector is the means by which a hacker is able to break into a computer system or network to launch an attack. A simple analogy would be that of a mosquito bite that spreads disease by injecting its victims with the virus that it carries.
In computing terms, an attack vector would take the form of malware such as Trojans that hackers use to deliver malicious code to their victims. Other popular examples are infected email attachments, malicious links, and pop-up ads.
Attack vectors target vulnerabilities in the computer system as well as people’s susceptibility to social manipulation and impersonation.
Read More about “Attack Vector”
An attack vector refers to how cybercriminals or threat actors gain a foothold or unauthorized entry or access into victims’ systems or networks.
Once they are in, they can perform various types of malicious activities such as installing malware and stealing confidential corporate data, along with employees’ personally identifiable information (PII). As with other threats, the stolen data from compromised systems and networks can be used in more harmful attacks against their owners or sold in underground markets in the Dark Web. In some cases, attackers turn affected computers into bots for use in attacks against other companies, typically those that do business with the victims.
We listed down some of the most common attack vectors that threat actors use to wreak havoc online.
Common Attack Vectors
- Malware or malicious files that, when installed on your computer or device, can change its settings so attackers can manipulate it with or without your knowledge
- Spam or harmful email messages that typically carry malicious file attachments (malware in disguise) or have embedded malicious links
- Malicious links that point to malware hosts or phishing and other harmful websites
- Exploits for unpatched vulnerabilities in both software and hardware
Cybercriminals and other threat actors may have varying motives for launching attacks via the vectors mentioned above. Some of these are listed below.
- Financial gain: This drives most cybercriminals who launch phishing, spam, ransomware, business email compromise (BEC), and similar attacks. Their primary goal is to obtain as much money from their victims as possible.
- Espionage: This drives threat actors who infiltrate a victim’s computer to get into his/her organization’s network. Typical examples of espionage-motivated attacks are advanced persistent threats (APTs). These allow attackers to move from one computer to another within the target network to obtain confidential information. Some use the stolen data to gain a competitive edge or take intellectual property. More sinister attacks, meanwhile, aim to destroy the reputation or shut down the operation of the target organization.
Cyber attackers do not discriminate when it comes to choosing targets. Individuals and companies alike are fair game so long as they have money or information that threat actors can use. And so we listed down some ways to stay safe from threats below.