Follow Us Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Technology Media and Telecom

The Anatomy of a Cyberattack: Step-by-Step

This article looks at each stage of a cyberattack, by way of a fictitious attack that took over a real estate agent’s email account.


Thank you for sharing!

Your article was successfully shared with the contacts you provided.

Consider this scenario: You’re a law firm accountant. Early one morning while reviewing emails, you see a message from the firm’s real estate agent stating that the landlord has agreed to your latest counteroffer and is ready to move forward on the rental of your new office space. You continue discussions to finalize the deal, work on signing the paperwork and are ready to send over your deposit. A new email from the agent at the last-minute mentions changing banks and encloses updated wiring instructions. The email has a sense of urgency to send the information quickly or the deal may fall through. Looking at the email, it appears legitimate, and you’ve done two other deals with this agent in the past, so you feel comfortable with the request. You reply to the message confirming the change, the response says to move forward. And all appears well.

This premium content is reserved for
Law Journal Press Subscribers.

Continue reading by getting
started with a subscription.

Subscribe Now For Unlimited Access

Read These Next