Skip to main content
    BeginnerLes 1 van 5·Foundations

    How Attackers Think — The Mindset Behind Every Modern Cyber Attack

    Most attackers are not in your office targeting you personally. They are running a business: cheap reconnaissance, automated targeting, and a profit motive. Understanding the four steps they follow — recon, lure, exploit, monetise — is the foundation every awareness lesson builds on.

    Reviewed by the HackersHub team — updated 13 May 20266 min readVrij te gebruiken — CC-BY-ND 4.0

    Het scenario

    On a Wednesday afternoon a junior accountant at a 60-person Dutch logistics firm posts a photo on LinkedIn of her new desk: 'Excited to start at FastFreight BV! 🚚'. Visible behind her: a sticky note with her temporary password, a printed list of internal IBAN numbers, and the back of her laptop showing the company VPN client. By Thursday morning an attacker — who has never heard of FastFreight before — has scraped the photo via an automated LinkedIn watcher that flags new-hire posts at SME companies. The password is in clear text. The IBANs feed a targeted invoice-fraud lure. The VPN brand tells the attacker which off-the-shelf exploit kit to run. By Friday a €38,000 wire has been redirected from a real supplier payment. None of this was personal. It was assembly-line work — and the assembly line found her photo first.

    Hoe de aanval werkt

    Most cyber attacks follow a four-step pattern. Step one is reconnaissance: the attacker collects public information about people and organisations from LinkedIn, company websites, leaked breach data, press releases, social media, GitHub, news articles. Tools like Maltego and theHarvester automate this, processing thousands of targets per hour. Step two is the lure: based on the recon, the attacker writes a credible pretext — an email, a phone call, a fake LinkedIn message — that names real people, real projects, real suppliers. Step three is exploitation: the lure gets the victim to do something useful for the attacker — click a credential-stealing link, transfer money, install software, give up an MFA code. Step four is monetisation: stolen credentials get sold on dark-market forums, stolen money gets routed through mule accounts, ransomware gets paid, intellectual property gets resold. The whole pipeline is industrialised. Generic mass-attacks (NotPetya, WannaCry) hit millions of systems indiscriminately. Targeted attacks (BEC, APT) target specific organisations only after the recon shows enough public information to make the lure work. Either way, the attacker rarely knows you personally — they know your role, your patterns, your suppliers, and your most-likely vulnerabilities, all assembled from public sources.

    Waar je op moet letten

    • Your own public footprint — LinkedIn, public posts, company-bio pages, photo backgrounds with sensitive info visible
    • Information about your colleagues that any stranger could see online and use to impersonate them to you
    • Any unsolicited contact that mentions real internal context — that context came from somewhere public
    • Unexpected attention paid to your role specifically — the more useful you are to an attacker, the more reconnaissance you'll attract

    Wat te doen

    1. Audit what you publish about your workEvery LinkedIn post, every team photo, every 'first day at X' announcement is reconnaissance fuel. Default to less.
    2. Assume the attacker already knows your name, role and reporting lineThose are basically public. Don't rely on 'they wouldn't know who I am' as a defence.
    3. Apply the verify-out-of-band reflex to any unusual requestIf the attacker is running an industrial pipeline, your single act of verification breaks their economics for this target.
    4. Report unusual contact — it tells security where the attacker has reconnaissanceOne report identifies a campaign that is also targeting your colleagues.

    Verdediging — voor IT en beleid

    Technische controles

    • Limit what your public domain leaks — minimise email-address publication, employee-listing pages, file-server indexable content
    • DMARC enforcement (p=reject) on your domain so attackers cannot freely spoof you
    • Phishing-resistant MFA across the company — closes the most common exploitation step

    Beleidscontroles

    • Social-media guidance for staff: what's safe to post, what's not
    • Onboarding briefing covers attacker mindset before it covers controls — context first
    • No-blame reporting culture — every report tells security something they need to know

    Trainingsfrequentie

    This lesson is best paired with a 'see what's public about you' exercise once a year: each employee googles themselves + their employer + their role and reports back what they found.

    Korte check

    Vijf vragen. Antwoorden en toelichting verschijnen na inzenden.

    1. Q1.

      Why does an attacker most often have detailed information about your role and colleagues before contacting you?

    2. Q2.

      What is the four-step pattern most attacks follow?

    3. Q3.

      True or false: most cyber attacks against your company are personal.

    4. Q4.

      What is the single highest-leverage personal defence against the attacker mindset?

    5. Q5.

      Your photo shows a sticky note with a temporary password. The post gets 200 likes. Most likely outcome?

    Bronnen & verdere lectuur

    Verwante modules

    Wil je een echte aanvaller in je omgeving testen?

    HackersHub voert betaalde red-team-engagements uit.

    Praat met een expert

    Deze module is door HackersHub goedgekeurd in exact deze vorm, inclusief watermerk. Gratis onder CC-BY-ND 4.0. Wil je de inhoud aanpassen? Verwijder dan eerst ons watermerk. — Het HackersHub-team Bekijk licentievoorwaarden.