10. Consider how an actor may carry out a cyber-attack (AC 2.7)
Answer:
Phishing Attack on a Healthcare Institution
First stepReconnaissance: The attacker find an employee on LinkedIn and discovers they often handle patient records via email.
Second stepWeaponisation: The attacker creates a phishing email, containing malicious link disguised as a login page for their patient management system.
Third stepDelivery: The email is sent to multiple employees, urging them to quickly log in to resolve an "urgent patient care issue".
Forth stepExploitation: An employee clicks the link, enters their credentials, unknowingly provides the attacker access to the system.
Fifth stepInstallation: The attacker installs malware on the network to maintain access.
Sixth stepCommand and Control: The malware communicates with the attacker's server, allowing them to browse the network.
Final stepAction on Objective: The Attacker exfiltrates (downloads) patient data and sells it on the dark web.