A cyber attack vector is a method of gaining unauthorized access to a private IT network. Cybercriminals exploit attack vectors to launch cyberattacks and inject malicious payloads.
Attack vectors can be digital, such as a software vulnerability, or analog, such as an employee that can be influenced to divulge private access credentials.
Third-party vendors are critical attack vectors since they have access to the private data of each business they’ve partnered with. Because of this, when a vendor is compromised, all of its clients often become compromised too.
This type of cyberattack is known as a supply chain attack and because of its efficiency, it’s quickly becoming the favourite choice amongst cybercriminals.
17 Most Common Attack Vectors
The 17 most common attack vectors are:
- Compromised Credentials
- Weak Credentials
- Uneducated Employees
- Insider Threats
- Poor Encryption
- Unpatched Software
- Security Vulnerabilities
- Third-party Vendors
- Phishing Attacks
- Ransomware
- Brute Force Attacks
- Distributed Denial of Service (DDoS) Attacks
- SQL Injections
- Trojans
- Session Hijacking
- Cross-Site Scripting (XSS)
- Man-in-the-Middle Attacks