10202221 - Master - Cyber Pandemic Training Book.pdf

The Cyber Criminal Underworld – Exploiting Network Access

Sell Access Threat actor

Gain Access Threat actor breaches the network and works on escalating their access to administrator privileges and putting a value on the access. Buyer’s Choice Buyer now has network access and can plan and execute their attack. Examples include: Ransomware attack, data exfiltration, espionage, malware deployment, and phishing attacks.

markets the sale of the access on deep

and dark web markets and forums.

Borrowed Time The buyer is now

conducting their attack and it is a matter of time until they are located and their access revoked.

This can take minutes, days, or even years.

21

Made with FlippingBook - Online catalogs