A report exposes attackers’ shadowy tactics.
Oftentimes, priority no. 1 for a hacker preparing to launch a cyberattack is finding a suitable launchpad. The goal: to obfuscate the origin of an attack.
To mask themselves, attackers generally compromise computer servers and networks operated by other organizations. These nodes then serve as unwitting springboards for further electronic assaults.
« The important thing is to recognize how an attacker works, » Oren Falkowitz, co-founder and CEO of Area 1 Security, a cybersecurity startup based in Redwood City, Calif., tells Fortune. « Consistently, what they’re doing is setting up shadow infrastructure—what we describe as relays or proxies. »
- Through small businesses
- Through public schools
- Through social clubs
- Through SCADA facilities
Get Data Sheet, Fortune’s technology newsletter.