The attack is just the final stage of a cybercriminal's effort. Organizations must understand the four stages of an attack to defend proactively, instead of waiting for it to happen. Adversary Infrastructure refers to the interconnected and purpose-built components that malicious actors assemble and utilize to conduct cyber attacks.

Some of that infrastructure includes:
○    C2, C&C or Command and Control Servers:  These servers act as the central hub for a threat actor where they can manage and control malware, compromised devices etc. 
○    Malware: Malicious code or software designed to infiltrate, damage or exploit a device. 
○    Domain Names: Threat actors use domain names to host malicious content such as C2 servers, phishing kits. 
○    Proxy Servers & VPN’s: Used to conceal their identity and location, threat actors often route their traffic through VPNs and Proxy Servers. 
○    Phishing Kits: Tools set up for phishing attacks like deceptive websites, email campaigns, social engineering etc. 

Watch the video above to see how it all works!