Chapter 3

Infecting the Target

This chapter discusses the various strategies opted by attackers to infect targets to download malware and compromise the system accordingly. The chapter talks about the most widely used infection strategies used in targeted attacks such as spear phishing, waterholing, Bring Your Own Device (BYOD) infection model, and direct attacks by exploiting vulnerabilities in networks and software. The sole motive behind infecting a target is to find a loophole which is exploited to plant a malware in order to take complete control over the system. Every model corresponds to a different path to trigger targeted attacks.

Keywords

Spear Phishing; Waterholing; Bring Your Own Device (BYOD); Targeted Campaigns

In this chapter, we discuss ...

Get Targeted Cyber Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.