Adarma Cyber Insiders Vol 3 Digital spreads FINAL 2 - Flipbook - Page 45
THE ATTACKERS NEXT STEPS
W
hat happens after a
breach? The attacker’s
next steps and how
to trip them up.
BY CIAN HEASLEY,
THREAT TEAM LEAD AT ADARMA
“WE’VE BEEN HACKED,
is a phrase no executive or cybersecurity
professional wants to hear, but
unfortunately it happens and with
cybercrime on the rise it’s something
organisations need to take seriously.
So, what happens if an attacker penetrates
your systems and evades detection? Firstly,
do not panic, it is important to understand
that gaining initial access does not always
equate to success. Typically, after a
breach threat actors will lay low to avoid
detection, which is why it’s important that
we, as cyber defenders, understand their
motivations and tactics.
This understanding enables us to more
accurately predict an attacker’s next move,
which means we can implement preemptive strategies to stop them achieving
their objectives. It is possible that if your
defences are robust enough, an attacker
might be induced to give up due to
frustration. However, it should remain top
of mind, that the longer an attacker hides
within your system, the better they will
understand your network, processes and
how best to exploit them.
ADARMA CYBER INSIDERS
|
45