2. A Taxonomy of Cyber Attack Vectors
To effectively manage cyber risk, it is essential to understand the diverse methods and extended time attackers use to achieve their objectives. These vectors include exploiting predictable human behaviours and compromising complex technical infrastructure. Only by fully categorising these threats can organisations strategically align their defensive plans, resources and strategies to counter the worst-case points of vulnerability across their human and digital assets.
2.1. Attacks Exploiting Human Assets
- Phishing: Attackers use deceptive emails from seemingly trusted sources to trick recipients into clicking malicious links or opening attachments, which then install malware or steal credentials. The direct business impact is unauthorised access to systems and sensitive data, often serving as the entry point for larger breaches.
- Ransomware: After gaining access to a system, attackers deploy malware that encrypts critical data, rendering it inaccessible to the organisation. This attack culminates in financial extortion, as attackers demand a ransom payment in exchange for the decryption key.
2.2. Attacks Exploiting Digital Vulnerabilities
- Injection Attacks: Attackers insert malicious SQL/code into a (web) application through input fields, tricking the backend into executing unauthorised commands. The primary business impact is the theft, damage, modification, or destruction of sensitive data stored in the application.
- Confused Deputy and Cross-Site Scripting (XSS): An attacker elevates privileges by making malicious requests or injecting malicious code into a vulnerable application or website, which is executed by an unsuspecting, higher-privileged service or user. It leads to the theft of confidential information, such as session cookies or login credentials, compromising user accounts and privacy.
- Distributed Denial-of-Service (DDoS): By flooding a target system or network with an overwhelming volume of traffic, attackers exhaust its resources and render it unavailable to legitimate users. The immediate business impact is severe operational disruption, resulting in service outages and revenue losses.
- Man-in-the-Middle (MitM): Attackers intercept communications between two parties, often by exploiting unsecured Wi-Fi networks, to eavesdrop on or actively tamper with the data being exchanged. This results in the theft of sensitive credentials and confidential information, breaking the integrity of secure communications.
Defending against these common vectors is essential for basic cyber hygiene. Still, all this costly, complex overhead is insufficient because advanced malware turns the tables on the outdated binary computer architecture when attacked by superhuman AI-malware. A forward-looking risk strategy must account for attacks that leverage the binary footholds to deploy infinitely more sophisticated and evasive exploits that totally bypass traditional defences.
Comments