Threat Vectors: Understanding Attack Methods
1. Introduction to Threat Vectors
A threat vector (or attack vector) is the method an attacker uses to gain access to a system.
2. Messaging-Based Threat Vectors
2.1 Email Attacks
- Phishing emails with malicious links or attachments
- Fake login pages tricking users into entering credentials
- Invoice scams and cryptocurrency fraud
2.2 SMS & Instant Messaging Attacks
- Smishing (SMS phishing) with malicious links
- Direct message scams via messaging apps
3. File-Based Threat Vectors
- Malicious file formats like SVG, PDFs, ZIP, and Office macros
- Browser extensions containing harmful scripts
4. Call and Voice-Based Attacks
- Vishing (voice phishing) for stealing sensitive details
- Spam over VoIP and war dialing
- Denial-of-Service (DoS) attacks via messaging systems
5. Physical Device-Based Threat Vectors
- Malicious USB drives and disguised keyboards
- Data theft via USB on air-gapped networks
6. Software and System Vulnerabilities
- Unpatched software allowing exploits
- Unsupported systems with security risks
7. Network-Based Threat Vectors
- Wireless vulnerabilities (WPA2 vs. WPA3, rogue access points)
- Open ports and web service misconfigurations
- Default credentials making devices vulnerable
8. Supply Chain Attacks
- Third-party vendor risks (e.g., Managed Service Providers)
- Counterfeit hardware used for exploitation
9. Preventive Measures
- Regular software updates and patches
- Strong authentication and access controls
- Limiting open ports and using firewalls
- Employee training on phishing, smishing, and vishing threats