Targeted Cyber Attacks

1st Edition

Multi-staged Attacks Driven by Exploits and Malware

Print ISBN: 9780128006047
eBook ISBN: 9780128006191
Imprint: Syngress
Published Date: 18th April 2014
Page Count: 158
23.95 + applicable tax
18.99 + applicable tax
29.95 + applicable tax
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.

Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.

Key Features

  • A well-structured introduction into the world of targeted cyber-attacks
  • Includes analysis of real-world attacks
  • Written by cyber-security researchers and experts


information security and information technology professionals, as well as students studying cyber-security

Table of Contents

  • A Few Words About Targeted Cyber Attacks
  • Acknowledgments
  • About the Authors
  • Overview
  • Chapter 1. Introduction

    • References
  • Chapter 2. Intelligence Gathering

    • 2.1 Intelligence Gathering Process
    • 2.2 OSINT, CYBINT, and HUMINT
    • 2.3 OSNs: A Case Study
    • References
  • Chapter 3. Infecting the Target

    • 3.1 Elements Used in Incursion
    • 3.2 Model A: Spear Phishing Attack: Malicious Attachments
    • 3.3 Model B: Spear Phishing Attack: Embedded Malicious Links
    • 3.4 Model C: Waterholing Attack
    • 3.5 Model D: BYOD as Infection Carriers: USB
    • 3.6 Model E: Direct Incursion: Network Exploitation
    • References
  • Chapter 4. System Exploitation

    • 4.1 Modeling Exploits in Targeted Attacks
    • 4.2 Elements Supporting System Exploitation
    • 4.3 Defense Mechanisms and Existing Mitigations
    • 4.4 Anatomy of Exploitation Techniques
    • 4.5 Browser Exploitation Paradigm
    • 4.6 Drive-By Download Attack Model
    • 4.7 Stealth Malware Design and Tactics
    • References
  • Chapter 5. Data Exfiltration Mechanisms

    • 5.1 Phase 1: Data Gathering Mechanisms
    • 5.2 Phase 2: Data Transmission
    • References
  • Chapter 6. Maintaining Control and Lateral Movement

    • 6.1 Maintaining Control
    • 6.2 Lateral Movement and Network Reconnaissance
    • References
  • Chapter 7. Why Targeted Cyber Attacks Are Easy to Conduct?

    • 7.1 Step 1: Building Targeted Attack Infrastructure
    • 7.2 Step 2: Exploring or Purchasing Stolen Information About Targets
    • 7.3 Step 3: Exploits Selection
    • 7.4 Step 4: Malware Selection
    • 7.5 Step 5: Initiating the Attack
    • 7.6 Role of Freely Available Tools
    • References
  • Chapter 8. Challenges and Countermeasu


No. of pages:
© Syngress 2014
eBook ISBN:
Paperback ISBN:


"…the book provides a good introduction to the topic with significant amounts of background information.  It provides a mid- to high-level overview of the topic.", 22-Sep-14

"…the book works its way through how attacks are planned and executed, following by a description of protective measures and concluding with a bit of myth-busting in order to leave readers with a clear and accurate picture of what the threat really means for them…you get a very sharp sense of how and why these attacks are possible."--Network Security, June 2014

"The most complete text in targeted cyber attacks to date. Dr. Sood and Dr. Enbody are able to present the topic in an easy to read format that introduces the reader into the basics of targeted cyber attacks, how the attackers gather information about their target, what strategies are used to compromise a system, and how information is being exfiltrated out from the target systems. The book then concludes on how to build multi-layer defenses to protect against cyber attacks. In other words, the book describes the problem and presents a solution. If you are new to targeted attacks or a seasoned professional who wants to sharpen his or her skills, then this book is for you."

—Christopher Elisan, Principal Malware Scientist, RSA –The Division of EMC


"As targeted attacks become ever more prevalent, sophisticated and harmful, it’s important that we understand them clearly, learn to detect them and know how to mitigate their effects. With this book, Aditya Sood and Richard Enbody have provided us with the tools to do this. Their clear, technically detailed analysis helps cut through the fear, uncertainty, doubt and hype surrounding this subject, to help us understand what’s really going on and what to do about it."

—Steve Mansfield-Devine, Editor, Network Security, Computer Fraud & S