Page 2 - NC Triangle Vol 7 No 2
P. 2

ANATOMY OF A SPEAR PHISHING ATTACK
1. Hacker makes a list of key personnel in the law firm having the confidential data he wants.
2. He looks up the employees on Facebook and other social media to glean their interests.
4. Targeted employee gets the e-mail clicks on the attachment because it’s a subject matter that is of interest.
3. Hacker crafts an e-mail with a malware infected attachment or link that is most likely to pique the interest of the targeted employee.
5. The malware is released into her computer and it starts e-mailing copies of all documents and other data on it to the hacker.
6. Hacker who may be in another country, receives the stolen information.
VISIT :
FreePhishTest.com
CALL :
919-422-2607


































































































   1   2   3   4   5