Chapter 3

Anatomy of an Attack

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

—Sun Tzu

Learning Objectives

  • Identify the key activities associated with a cyber extortion incident

  • Understand common technical methods that cyber extortion gangs use to gain access to victim networks

  • Describe tools and tactics that adversaries use to gain entry, expand, appraise, prime the environment, and gain leverage over their victims

  • Identify opportunities for detection at each phase

A cyber extortion attack is never just a cyber extortion attack. There is always an escalation in activities from the adversary’s initial entry, expansion throughout the environment, and ultimately the extortion threat.

While every ...

Get Ransomware and Cyber Extortion: Response and Prevention now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.