Modelling Threat Actor Phishing Behaviour

Modelling Threat Actor Phishing Behaviour – “you’re only as strong as your weakest link!”

This whitepaper focuses on the reconnaisance phase of a simulated attack. It will discuss how likely targets are identified within an organisation and why certain individuals are chosen. The reconnaisance phase will typically involve open source intelligence (OSINT), cyber intelligence (CYBINT) and human intelligence (HUMINT).

Careful consideration is given to the selection of the individual and the whole success of the campaign can rest on these individuals. Certain individuals have more appeal to the threat actor than others and the paper will discuss this in detail how they are identified, discovered and the profile of these individuals.

The paper will also go into what strategies organisations can put in place to improve resilience as well as sources of information to gain support in this area.

Download whitepaper

Further resources:

Infographic: Warning against phishing

Whitepaper: Cyber red-teaming business critical systems while managing operational risk

Presentation: Phishing Stories

Social Engineering services

Call us before you need us.

Our experts will help you.

Get in touch
%d bloggers like this: