〈   Governance and cyber risks
Timeline of a cyberattack

Chapter 2.2


The attacker tricks a user into running malware to compromise the latter’s device or gain unauthorised network access by sending a phishing email and/or malicious social media messages.

Time scale

Hours – days

Tactics used

  • Targeted phishing emails
  • Social engineering

2023 © Trust Valley. All rights reserved.