• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia

Exclusive

An hour in the Oval Office with President Trump Fortune Editor-in-Chief: Alyson Shontell sat down with President Trump in the Oval Office for an hour. Tariffs, Intel, AI, Boeing, Iran—and the question every CEO eventually has to answer: who's next?

An hour in the Oval Office with President Trump Fortune Editor-in-Chief: Alyson Shontell sat down with President Trump in the Oval Office for an hour. Tariffs, Intel, AI, Boeing, Iran—and the question every CEO eventually has to answer: who's next?

An hour in the Oval Office with President Trump Fortune Editor-in-Chief: Alyson Shontell sat down with President Trump in the Oval Office for an hour. Tariffs, Intel, AI, Boeing, Iran—and the question every CEO eventually has to answer: who's next?

An hour in the Oval Office with President Trump Fortune Editor-in-Chief: Alyson Shontell sat down with President Trump in the Oval Office for an hour. Tariffs, Intel, AI, Boeing, Iran—and the question every CEO eventually has to answer: who's next?

An hour in the Oval Office with President Trump Fortune Editor-in-Chief: Alyson Shontell sat down with President Trump in the Oval Office for an hour. Tariffs, Intel, AI, Boeing, Iran—and the question every CEO eventually has to answer: who's next?

An hour in the Oval Office with President Trump Fortune Editor-in-Chief: Alyson Shontell sat down with President Trump in the Oval Office for an hour. Tariffs, Intel, AI, Boeing, Iran—and the question every CEO eventually has to answer: who's next?

An hour in the Oval Office with President Trump Fortune Editor-in-Chief: Alyson Shontell sat down with President Trump in the Oval Office for an hour. Tariffs, Intel, AI, Boeing, Iran—and the question every CEO eventually has to answer: who's next?

An hour in the Oval Office with President Trump Fortune Editor-in-Chief: Alyson Shontell sat down with President Trump in the Oval Office for an hour. Tariffs, Intel, AI, Boeing, Iran—and the question every CEO eventually has to answer: who's next?

An hour in the Oval Office with President Trump Fortune Editor-in-Chief: Alyson Shontell sat down with President Trump in the Oval Office for an hour. Tariffs, Intel, AI, Boeing, Iran—and the question every CEO eventually has to answer: who's next?

An hour in the Oval Office with President Trump Fortune Editor-in-Chief: Alyson Shontell sat down with President Trump in the Oval Office for an hour. Tariffs, Intel, AI, Boeing, Iran—and the question every CEO eventually has to answer: who's next?

TechChanging Face of Security

How Hackers Plan Attacks and Hide Their Tracks

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
August 12, 2016, 2:18 AM ET
Travel Destination: North Sea Coast Of Germany
WENNINGSTEDT, GERMANY - JULY 19: Incoming waves wash away footprints left by visitors in the sand along a beach on Sylt Island on July 19, 2016 near Wenningstedt, Germany. Sylt Island, with its long stretches of sand beaches and its protected dune landscapes, is among the most popular holiday destinations, especially for wealthy visitors, along Germany's North Sea coast. Many Germans, unsettled by the recent terror attacks in countries like France and Turkey, are choosing to vacation in Germany this summer. (Photo by Sean Gallup/Getty Images)Sean Gallup—Getty Images

Oftentimes, priority no. 1 for a hacker preparing to launch a cyberattack is finding a suitable launchpad. The goal: to obfuscate the origin of an attack.

To mask themselves, attackers generally compromise computer servers and networks operated by other organizations. These nodes then serve as unwitting springboards for further electronic assaults.

“The important thing is to recognize how an attacker works,” Oren Falkowitz, co-founder and CEO of Area 1 Security, a cybersecurity startup based in Redwood City, Calif., tells Fortune. “Consistently, what they’re doing is setting up shadow infrastructure—what we describe as relays or proxies.”

Get Data Sheet, Fortune’s technology newsletter.

The vast majority of cyberattacks use spoofed email messages or bogus websites to try to dupe unsuspecting employees into downloading malicious software or giving up login credentials. Such ploys are designed to trick their victims—but they don’t go very far when the booby-trapped messages arrive from addresses handled by known bad actors. That tends to raise an alarm.

So the attackers disguise themselves, burrowing into seemingly innocuous networks. Computer security experts call this approach a “stepping stone attack,” given all the intermediary hops involved.

“They want to have a mechanism to hide their activity, and to make their attacks and traffic blend with general network behavior,” Falkowitz, an NSA alum, says.

See also: Can three ex-NSA snoops stop the worst hacks before they start?

That’s where Area 1 comes in. The company installs sensors on compromised machines—with their owners’ permission—in order to surveil adversaries’ traffic, gather intelligence, and funnel that information to cybersecurity companies that can then better preempt attacks.

Area 1 shared a copy of a new report with Fortune that describes several incidents drawn from real-life experiences demonstrating hackers’ tactics. Below are four archetypal ways that attackers attempt to conceal their digital tracks, according to the report.

  1. Through small businesses

In one illustrative example, foreign nation state-backed hackers took over outdated Windows 2003 servers run by a saddle-maker, moved laterally onto other servers, and used those to send spear-phishing emails to more than a hundred targets, including contractors of the U.S. Department of Defense.

“People think only large ISPs like Verizon and Google provide the only infrastructure for attackers to leverage,” Falkowitz says. “These attacks can come from anywhere.”

(By the way, here’s a good example of a welding shop used as an attack intermediary in this New York Times story about Area 1 from earlier this year.)

2. Through public schools

Earlier this year, attackers exploited a vulnerable web application on public school servers and broke into them. After bouncing around the networks and installing backdoors, the gang used the school’s computers to launch even more attacks. “Just another example of machines that are typically unprotected and appear innocuous,” Falkowitz says.

3. Through social clubs

In this case, frequenters of a certain watering hole got hit with, well, a “watering hole attack.” Having breached the network, the attackers were able to distribute malware to anyone who connected to the club’s Wi-Fi.

“They lured users into a space where they’re prone to go to for social reasons,” Falkowitz says. Hackers then piggybacked into their corporate networks later on. Falkowitz says Area 1 has seen less than a dozen of these kinds of attacks in the wild, so to speak.

4. Through SCADA facilities

Earlier this year, an unnamed industrial equipment manufacturer fell victim to a hacking. After absconding with oodles of data, the attackers recycled their access into the network as part of a “supply chain attack,” sending emails to targets at other companies since people are likelier to open emails from supposedly trusted sources, like their business relations.

Falkowitz says Area 1 has seen “somewhere between 50 and 80 machines at different organizations” targeted this way.

The upshot? Attackers will use whatever computing resources they can lay their hands on, so long as it will cloak their activities and offer a staging ground for their next attack.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

altman
CommentarySam Altman
Musk vs. Altman: AI safety cannot be one man’s job
By Stavros GadinisMay 18, 2026
8 hours ago
Pope Leo launches an AI commission days before he releases a papal letter alongside Anthropic cofounder Christopher Olah
AIPope
Pope Leo launches an AI commission days before he releases a papal letter alongside Anthropic cofounder Christopher Olah
By Catherina GioinoMay 18, 2026
8 hours ago
John Ketchum, CEO of NextEra Energy, speaks during BlackRock's 2026 Infrastructure Summit in Washington, DC, on March 11, 2026. Photographer: Daniel Heuer/Bloomberg via Getty Images
EnergyNextEra Energy
NextEra’s $67 billion Dominion takeover creates the world’s largest utility—just in time to win the AI data-center power surge
By Jordan BlumMay 18, 2026
9 hours ago
Harvard University banners hang in front of a building
CryptoCryptocurrency
Harvard sold off its entire $87 million Ethereum stake just one quarter after buying it
By Jack KubinecMay 18, 2026
9 hours ago
Not the Allbirds effect: Japan’s top bidet maker Toto has been quietly making chip supplies for decades, and the stock market finally noticed
AIChips
Not the Allbirds effect: Japan’s top bidet maker Toto has been quietly making chip supplies for decades, and the stock market finally noticed
By Catherina GioinoMay 18, 2026
10 hours ago
monet
CybersecuritySocial Media
6.7 million people thought they were ripping apart an AI-generated Monet painting. But it was real
By Nick LichtenbergMay 18, 2026
10 hours ago

Most Popular

The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
Politics
The Bezos family just donated $100 million to help achieve one of Mayor Zohran Mamdani’s top campaign promises
By Jake AngeloMay 12, 2026
6 days ago
While Trump insisted the Iran war would end ‘soon,’ an account in his name was buying millions in oil, defense and gold
Economy
While Trump insisted the Iran war would end ‘soon,’ an account in his name was buying millions in oil, defense and gold
By Eva RoytburgMay 18, 2026
11 hours ago
Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI
AI
Microsoft AI chief gives it 18 months—for all white-collar work to be automated by AI
By Jake AngeloMay 16, 2026
3 days ago
EXCLUSIVE: An hour in the Oval Office with the CEO-in-Chief, President Trump
Politics
EXCLUSIVE: An hour in the Oval Office with the CEO-in-Chief, President Trump
By Alyson ShontellMay 18, 2026
22 hours ago
Current price of oil as of May 18, 2026
Personal Finance
Current price of oil as of May 18, 2026
By Joseph HostetlerMay 18, 2026
16 hours ago
The top foreign holders of U.S. debt may soon dump Treasury bonds and bring their money back home, potentially spiking borrowing costs
Economy
The top foreign holders of U.S. debt may soon dump Treasury bonds and bring their money back home, potentially spiking borrowing costs
By Jason MaMay 17, 2026
2 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.