Targeted Cyber Attacks
Multi-staged Attacks Driven by Exploits and Malware
- Aditya Sood, Aditya K. Sood, Ph.D., senior security researcher and consultant.
- Richard Enbody, Richard J. Enbody, Ph.D., associate professor of Computer Science & Engineering at Michigan State University.
Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
Audienceinformation security and information technology professionals, as well as students studying cyber-security
- Published: April 2014
- Imprint: SYNGRESS
- ISBN: 978-0-12-800604-7
"â¦the book provides a good introduction to the topic with significant amounts of background information. It provides a mid- to high-level overview of the topic."--
"Dr. Aditya K Sood and Dr. Richard J Enbody have done an excellent job of taking the very complex subject of targeted attacks and breaking it down systematically so we can understand the attack techniques, tactics and procedures and build defensive mitigation strategies around them. "Targeted Cyber Attacks" provides insights into common indicators of compromise, so your security teams can react as fast as possible and distinguish anomalous behavior from everyday normal user behavior." -Stephan Chenette, CTO at AttackIQ, Inc. "Sood and Enbody have taken a systematic, step by step approach to break down a pretty complex topic into bite-sized chunks that are easily digestible. They cover everything from the basics and âneed to knowâ of targeted attacks to the more advanced insights into the world of exploit packs, attack techniques and more." -Dhillon Andrew Kannabhiran, Founder/Chief Executive Officer, Hack In The Box "Targeted Cyber Attacks is by far the perfect manual to dive into the dark borders of cybercrime. The book thoroughly describes the model and the mechanisms used by criminals to achieve the cyber attack to exfiltrate information or steal money. From a pen-testerâs perspective, the ethical hackers will certainly find the fundamental factors to prepare a better approach to conduct high level penetration testing. Aditya and Richard deliver the secrets used by cyber-criminals to get inside the most secured companies. I learned a lot from this stunning publication authored by a BlackHat Arsenal Jedi." -Nabil Ouchn, Founder of ToolsWatch.org and Organizer of BlackHat Arsenal "I have always been a fan of the articles that have been published by Dr. Sood and Dr. Enbody in the past - and this book reflects that same quality of work we have come to enjoy here at CrossTalk. I found the information to be a very extensive, compelling read for anyone interested in modern cyber-attack methodologies. The information flows from chapter-to-chapter in a very logical sequence and is easily understandable by even those with limited knowledge in the cyber-security realm. I found the work to be extremely interesting and the writing style is active and enjoyable at all points. The work presented should be read by not only those in the software realm, but also the casual user who has an interest in privacy and security for themselves." -Justin Hill, Executive Publisher of CrossTalk, the Journal of Defense Software Engineering "Targeted attacks are one of the most virulent, dangerous cyber threats of our time. Every company, large and small, should be factoring these in as a major risk. This book brings readers up to speed, and helps them get in front of the threat, so that they can take action before they are targeted." -Danny Bradbury, Cyber Security Journalist and Editor
Table of Contents
Chapter 1: Introduction
Chapter 2: Intelligence Gathering
Chapter 3: Infecting the Target
Chapter 4: System Exploitation
Chapter 5: Data Exfiltration Mechanisms
Chapter 6: Maintaining Control and Lateral Movement
Chapter 7: Why are Targeted Cyber Attacks Easy to Conduct?
Chapter 8: Challenges and Countermeasures
Chapter 9: Conclusion