From: thepipeline_xyz

Attackers typically target three core things during cyber attacks [00:00:00].

Funds

The primary target for attackers is often an individual’s funds, including anything stored on-chain, on exchanges (CEXes), or in wallets [00:00:04].

Access

Attackers seek access to use an individual as an “interception point” to reach others around them [00:00:09]. This can include colleagues, friends, family, or anyone within a company [00:00:16]. For public figures, gaining access to their account could allow attackers to leverage that access in a spear fishing campaign to target others, such as by sending malicious meeting invitations or similar fraudulent communications [00:00:25].

Data

Sensitive credentials and other data are also key targets [00:00:38]. Any location where sensitive credentials are stored must be rigorously audited [00:00:41].

Mitigation Strategies

To protect against these attacks, it is crucial to understand all potential points of failure in one’s digital life [00:00:46]. This involves inventorying assets and vulnerabilities [00:00:53], and beginning to create an attack surface map to identify all areas of concern [00:00:55]. Once identified, these issues can be tweaked and mitigated [00:01:00].