White Paper Lifecycle of Email-Based Attacks Introduction
When cybercriminals intend to attack an organization for a number of purposes, i.e. to exfiltrate data, or lock the systems, they follow a series of phases that constitute an attack lifecycle. For cybercriminals to execute a successful attack, they must advance through each stage. Blocking them at any point in this cycle will destroy the chain of attack; therefore, prevention must occur at each stage to keep the criminals from infiltrating the organization. In this white paper, the different stages of the lifecycle of email-based attacks are described and remediations that should be applied to prevent an attack at any stage are elaborated.