Follow Us

Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Technology Media and Telecom

The Anatomy of a Cyberattack: Step-by-Step

This article looks at each stage of a cyberattack, by way of a fictitious attack that took over a real estate agent’s email account.

X

Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Consider this scenario: You’re a law firm accountant. Early one morning while reviewing emails, you see a message from the firm’s real estate agent stating that the landlord has agreed to your latest counteroffer and is ready to move forward on the rental of your new office space. You continue discussions to finalize the deal, work on signing the paperwork and are ready to send over your deposit. A new email from the agent at the last-minute mentions changing banks and encloses updated wiring instructions. The email has a sense of urgency to send the information quickly or the deal may fall through. Looking at the email, it appears legitimate, and you’ve done two other deals with this agent in the past, so you feel comfortable with the request. You reply to the message confirming the change, the response says to move forward. And all appears well.

This premium content is locked for Cybersecurity Law & Strategy subscribers only

Continue reading by getting
started with a subscription.

ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN CYBERSECURITY, PRIVACY, INFORMATION GOVERNANCE, LEGAL TECHNOLOGY AND E-DISCOVERY.
  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on cyber threats, data breaches, and legal technology
  • Tap into expert guidance from top legal tech lawyers and experts

SUBSCRIBE NOW

Subscribe Now For Unlimited Access

Read These Next