Malware
Ever wonder how Malware makes it way around the world wide web and finds its way to your computer? This flowchart which is described in detail below it,
- From adversary space, malicious agent leverages operational infrastructure in neutral space, to then
- Craft an email with malicious link, which is then
- Sent to a recipient in the victim space, who then
- Clicks on link and in neutral space enters credentials for a website that looks legitimate, but really
- Website gathers credentials to feed back to operational infrastructure, which then
- Uses credentials to access targeted systems in victim space, where it will
- Install malicious files, which
- Move through system structure to
- Gather data of interest, which is then
- Exfiltrated through the operational structure in neutral space
Photo by Unknown Author is licensed under CC BY-SA