August 26, 2021

Does anyone know a good source for details about *how* cyber attacks occurred?

I read a lot of Threatpost and Cyberscoop but often the articles talk about what happens after a cybersecurity incident. I haven’t been able to find articles on how REvil compromised JBS for example. There are a lot of articles that say REvil compromised them… they encrypted some data and asked for some bitcoin, but it skips over the part that I’m most interested in.

Maybe that is information that they don’t want to disclose or isn’t known but it’s what I care the most about.

For example, I want to know how REvil compromised JBS. Anyone know? I also want to know more about how the Oldsmar Water Treatment attack used a waterhole. All I’ve read is “They used a watering hole with bad code in a word press website.” What does that even mean?

I hope there’s some podcast or something that I’m skipping over that goes really granularly into the details of how these things occur.

Comments

makersrocks73

Thumb through this site:
[attack.mitre.org](https://attack.mitre.org/)

You might not learn, step-by-step, exactly what was done or be lead exactly through an attack but you’ll gain a lot of insight into the TTPs.

ukanoldai

RemindMe! 1 day “how cyber attack occur”

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.