• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells from above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation
Home > Uncategorized > 2021 Attack Vectors Report

2021 Attack Vectors Report

October 20, 2021 By Daria Ryabogin

For many years, RSM has made a continuous effort to assist organizations in addressing cybersecurity challenges, provide tools to achieve a desired state of security, and deliver guidance for attack prevention. We perform security penetration testing to simulate attacks on internal networks and closely mimic security breaches within controlled environments. By conducting these assessments, we seek to determine the level of compromise that an attacker may achieve, while investigating the data accessible to malicious intruders.

Based on an analysis of our internal penetration tests from the past year, we have created the 2021 Attack Vectors Report, which examines 60 successfully compromised client reports. For each client, we tracked the attack vectors that allowed us to access target systems or sensitive information. These vectors have been compiled into walkthroughs and timelines, which we hope can be of use to readers interested in the “behind-the-scenes” of penetration testing.

Each vector is accompanied by an explanatory vulnerability linkage diagram, which illustrates the basic steps required for a successful attack. In addition, we have included 20 supplementary diagrams from existing reports in 2020-2021 for the reader’s reference.

The consequences of cyber-attacks typically range from unpleasant to severe—security incidents place considerable strain on organizational resources, invite lawsuits, incite reputational damage and interrupt business operations. Furthermore, mass data breaches can strip an organization of its property without enough evidence to guarantee a successful investigation. As such, from food delivery services to hospitals and education centers, any unprepared organization that handles social security numbers, card data, health information or even personal addresses is at risk of experiencing a significant loss.

If you have any questions regarding this report, please contact RSM US LLP. For additional information about our penetration testing services or reporting processes, please visit https://rsmus.com/what-we-do/services/risk-advisory/cybersecurity-data-privacy/security-testing/network-penetration-testing.html.

 

Primary Authors: Daria Ryabogin and Jonathan Slusar

Share this...
  • Reddit
  • Email
  • Facebook
  • Twitter
  • Linkedin

Daria Ryabogin

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 10.8k views
  • Sophos UTM Home Edition – 3 – The Setup 10.8k views
  • Leveraging MS16-032 with PowerShell Empire 10k views
  • Bypassing Gmail’s Malicious Macro Signatures 9.8k views
  • How to Bypass SEP with Admin Access 8.9k views

Footer

  • RSS
  • Twitter
  • Tools
  • About
  • RSM US LLP

+1 800 903 6264

1 S Wacker Dr Suite 800
Chicago, IL 60606

Copyright © 2023 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.