Message-based threat vectors leverage various forms of communication.
Email-based attacks target users through email communication.
Example: Phishing emails attempting to steal login credentials.
SMS-based threats involve malicious messages sent via SMS.
Example: Receiving SMS with a link to a malicious app.
IM-based threats exploit vulnerabilities in instant messaging platforms.
Example: Malware spread through a compromised IM account.
Image-based threat vectors involve manipulating image files to carry out attacks.
Example: Embedding malicious code within image files to exploit software vulnerabilities.
File-based threat vectors exploit various file formats to deliver malware.
Example: Malicious attachments in email messages that deliver malware when opened.
Voice call-based threats involve exploiting vulnerabilities in voice communication.
Example: Voice phishing (vishing) attacks that trick users into revealing sensitive information over the phone.
Threats related to removable devices involve malicious actions using external storage media.
Example: Plugging in an infected USB drive that spreads malware upon connection.
Threat vectors related to vulnerable software exploit weaknesses in software applications.
Example: Exploiting known vulnerabilities in outdated web browsers.
Threat vectors may vary based on whether client-based or agentless methods are used.
Example: Malware delivered through client-based software vulnerabilities vs. agentless web exploits.
Threat vectors targeting unsupported systems and applications take advantage of their lack of updates and security patches.
Example: Exploiting vulnerabilities in an old and unsupported operating system.
Threat vectors related to unsecure networks include various network types like wireless, wired, and Bluetooth.
Example: Intercepting data on an unsecured public Wi-Fi network.
Threat vectors specific to wireless networks.
Example: Unauthorized access to an open Wi-Fi network.
Threat vectors specific to wired networks.
Example: Physical network tap for eavesdropping.
Threat vectors related to Bluetooth connections.
Example: Bluetooth device spoofing to gain unauthorized access.
Threat vectors related to open service ports involve exploiting publicly accessible network services.
Example: Scanning for open ports and exploiting vulnerabilities in exposed services.
Threat vectors involving default credentials exploit systems or devices that still use factory-default login credentials.
Example: Gaining unauthorized access to a router using default username and password.
Threat vectors in the supply chain involve exploiting vulnerabilities within the production and distribution process.
Example: Compromising software updates from a managed service provider.
Threat vectors specific to managed service providers.
Example: Targeting vulnerabilities in services provided by an MSP.
Threat vectors related to vulnerabilities in products or services provided by vendors.
Example: Exploiting vulnerabilities in vendor-supplied software.
Threat vectors related to vulnerabilities within the supply chain from suppliers.
Example: Compromising components supplied by a third-party vendor.
Threat vectors involving social engineering techniques that manipulate individuals into divulging confidential information or performing actions that compromise security.
Example: Executing a phishing attack to trick a user into revealing login credentials.
Threat vectors related to deceptive attempts to obtain sensitive information.
Example: Sending fraudulent emails impersonating a trusted entity to steal login credentials.
Threat vectors involving voice-based social engineering attacks.
Example: Manipulating individuals over phone calls to reveal confidential information.
Threat vectors involving SMS-based social engineering attacks.
Example: Sending deceptive text messages to trick users into taking malicious actions.
Threat vectors involving spreading false or misleading information.
Example: Creating fake news or false narratives to manipulate public opinion.
Threat vectors involving impersonating individuals or entities for malicious purposes.
Example: Posing as a colleague to deceive an employee into revealing sensitive information.
Threat vectors involving compromising business email accounts for fraudulent activities.
Example: Gaining unauthorized access to a CEO's email account to initiate fraudulent wire transfers.
Threat vectors involving creating a fabricated scenario or pretext to deceive individuals.
Example: Pretending to be an IT technician to gain physical access to a secure facility.
Threat vectors involving compromising websites frequently visited by targeted individuals or groups.
Example: Injecting malware into a legitimate website frequented by a specific organization's employees.
Threat vectors involving impersonating trusted brands for malicious purposes.
Example: Creating fake websites that mimic reputable brands to steal user information.
Threat vectors involving registering domain names similar to legitimate ones to deceive users.
Example: Registering a domain with a slight misspelling of a popular website to capture user traffic.