CHAPTER
6
Threat (Attacker) Tradecraft
image
 
Now we will dive into the tradecraft used by threats (your adversaries). They come in many forms and will use many guises to remain persistent.
In this chapter, we are going to cover not only some of the vectors of attack, but also the state of the threat’s underground economy and some of the more interesting methods and tactics used by threats to distribute their “booty and bling” from your enterprise to make the most bang for their buck. Some of the more persistent criminal groups will even use tactics similar to those of the more advanced SSCTs, simply to maintain access to your resources.
Threat Categories ...

Get Reverse Deception: Organized Cyber Threat Counter-Exploitation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.