You Should Know – The Life Cycle of a Cyber Attack
- Aug 20, 2025
- 2 min read

You Should Know what a cyber attack looks like.
Understanding how these attacks unfold is key to protecting yourself and your organization. Here's a simple breakdown of the typical life cycle of a cyber attack.
Reconnaissance
Crafting the Attack
Delivery
Exploitation
Installation
Command and Control
Execution of Goals
Stay Alert. Stay Safe.
Reconnaissance:
The attacker starts by gathering information. They search public websites, social media, and other open sources to learn about their target – this is called Open Source Intelligence Gathering. The more they know, the more convincing their attack can be.
Crafting the Attack:
Once they have the information, the attacker builds the trap. Common tricks include:
Urgent language (e.g., "Your account will be closed!")
Spoofed email addresses that look legitimate
Infected attachments (like PDFs or Word docs)
Links that lead to malicious websites
Delivery:
The attack reaches you through everyday channels like:
Email
Social media
Text messages (SMS)
Phone calls (voice phishing or "vishing")
Exploitation:
This is when the attack is triggered. The victim might:
Open the message
Click the bad link
Download or open an infected file
This action activates the malicious software – often without the victim even realizing it.
Installation:
The malware installs itself on the victim’s device. This gives the attacker long-term access, allowing them to return later without being detected.
Command and Control:
Now the attacker is in. They can:
Communicate with the infected system remotely
Steal files and sensitive data
Capture keystrokes (including passwords)
Gain access to higher-level system controls
Execution of Goals:
Finally, the attacker achieves what they came for:
Demands a ransom to unlock your files
Steals sensitive data like personal info, financial records, or intellectual property
Recognizing these stages helps you stop an attack before it starts. When something feels off – whether it’s an odd email or an urgent request – pause and think before you click.
Contact us at Sales@securicom.co.za to see how we can change the way you see security.



Comments