top of page

You Should Know – The Life Cycle of a Cyber Attack

  • Aug 20, 2025
  • 2 min read

You Should Know what a cyber attack looks like.

 

Understanding how these attacks unfold is key to protecting yourself and your organization. Here's a simple breakdown of the typical life cycle of a cyber attack.

 

Reconnaissance

Crafting the Attack 

Delivery

Exploitation

Installation

Command and Control

Execution of Goals


Stay Alert. Stay Safe.

 

 

 

Reconnaissance:

The attacker starts by gathering information. They search public websites, social media, and other open sources to learn about their target – this is called Open Source Intelligence Gathering. The more they know, the more convincing their attack can be.

 

Crafting the Attack:  

Once they have the information, the attacker builds the trap. Common tricks include:

  • Urgent language (e.g., "Your account will be closed!")

  • Spoofed email addresses that look legitimate

  • Infected attachments (like PDFs or Word docs)

  • Links that lead to malicious websites

 

Delivery:

The attack reaches you through everyday channels like:

  • Email

  • Social media

  • Text messages (SMS)

  • Phone calls (voice phishing or "vishing")

 

Exploitation:

This is when the attack is triggered. The victim might:

  • Open the message

  • Click the bad link

  • Download or open an infected file

This action activates the malicious software – often without the victim even realizing it.

 

Installation:

The malware installs itself on the victim’s device. This gives the attacker long-term access, allowing them to return later without being detected.

 

Command and Control:

Now the attacker is in. They can:

  • Communicate with the infected system remotely

  • Steal files and sensitive data

  • Capture keystrokes (including passwords)

  • Gain access to higher-level system controls

 

Execution of Goals:

Finally, the attacker achieves what they came for:

  • Demands a ransom to unlock your files

  • Steals sensitive data like personal info, financial records, or intellectual property

 Recognizing these stages helps you stop an attack before it starts. When something feels off – whether it’s an odd email or an urgent request – pause and think before you click.

 

Contact us at Sales@securicom.co.za to see how we can change the way you see security. 

 
 
 

Comments


bottom of page