The internet is huge with billions of users and devices, so how does a hacker pick or select you for a Cyber attack?
There are some key discovery methods the Cyber Attackers use and they include:
- Automation Network Attack
- Bulk / Harvest Email Attack
- Google Search Attack
- Advertising Hack
- Targeted Attack
The Automation network attack starts with a known critical vulnerability, which is then automated with code to test every IP on the internet for this vulnerability. This is why it is important to make sure your systems are patched as most of these are vulnerabilities that have a patch to resolve the vulnerability. Sometimes they are zero-day vulnerabilities which is why it is important to harden the systems and avoid allowing direct internet access to systems.
The bulk / harvest email attack involves getting emails from data breaches, guessing them or harvesting them off linkedIn, then using these emails to send Malware or Phishing emails with the hope that someone clicks it. This is why Cyber Training for staff is very important. We would recommend Vertex Cyber Training for the team as well as other protections for email and devices that we provide.
The google search is as simple as searching for an industry or company type and then performing a manual attack. They typically search for industries, awards, company lists that are more likely to have funds or data to steal. We wont name any industries to give any clues to the hackers, but you should know if this is you. This is why if you are doing SEO for clients to find you, you are helping the hackers find you. We would recommend our Consultation service to help secure your business.
When a company advertises they are also advertising to the hacker as well as advertising that the business has “extra” money to spend on advertising. We see an increase in cyber attacks related to the advertising.
The google search is as simple as searching for an industry or company type and then performing a manual attack. They typically search for industries, awards, company lists that are more likely to have funds or data to steal. We wont name any industries to give any clues to the hackers, but you should know if this is you. This is why if you are doing SEO for clients to find you, you are helping the hackers find you. Once again we would recommend our Consultation service to help secure your business.
When a hacker is looking for a specific item such as blueprints for a drone they will target the specific business that holds this. This can be performed by hacker groups with a mission such as social or a nation state. If you store something of significant value to another country or social/political group then this could be your business. We would recommend our Consultation service to help secure your business.
Reach out to Vertex Cyber Security if you want to be protected from Cyber attacks.