Search
Using an attack scenario observed “in the wild” by our Unit 42® researchers, this infographic breaks down how a SIM-swap scam escalated into a large-scale data leak.
From initial access to the dark web, we break down the attack into Tactics, Techniques and Procedures (TTPs), following MITRE's Cloud ATT&CK Matrix. The order of the tactics also corresponds to the path of the attack, as observed by our researchers.
Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports