〈   Governance and cyber risks
Timeline of a cyberattack

Chapter 2.4

Execution and anti-forensics

Finally, the attacker executes the attack quickly and then removes the evidence to avoid being identified by the target and ensure that the latter cannot guard against future attacks.

Time scale

Hours – days

Tactics used

  • Data extraction
  • Financial fraud
  • Denial of Service (DoS)

2023 © Trust Valley. All rights reserved.