5 steps of cyber attack at RSA

The hackers appear to have followed five easy steps, Federal Computer Week reports.

The post mortem is in on the cyber hack into the network at security firm RSA – and the hackers appear to have followed five easy steps, Federal Computer Week reports.

First, they performed reconnaissance and prepared for the attack.

Second, they used a phishing attack to penetrate RSA’s defenses.

Third, they planted malware and explored the areas they could access.

Fourth, they gathered the information they wanted, and stole it.

Finally, they exploited the stolen information to penetrate other networks. According to FCW, Lockheed Martin and L-3 Communications both had cyber attacks related to information stolen in the RSA breach.

This story is part of Federal News Radio’s daily Cybersecurity Update. For more cybersecurity news, click here.

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

    Getty Images/iStockphoto/SIphotographyretirement

    How to make sure you outlive your investments after you retire

    Read more
    (Getty Images/iStockphoto/metamorworks)Medical technology concept.

    Pentagon’s reproductive healthcare policy used 12 times from June to December

    Read more