On-Demand Webinar

From Phishing to the Dark Web: The Life Cycle of a Cyber Attack

Stefanie Ellis
AntiFraud Product Marketing Manager

Understanding the life cycle of a cyberattack – including how threat actors use social engineering & phishing lures to effectively collect credentials and other types of Personally Identifiable Information (PII), and how those credentials are then monetized and sold in bulk on the dark web – can provide useful data points in understanding possible safeguards for an organization and your customers.

Please tune in as MarkMonitor AntiFraud expert Stefanie Ellis walks through the cyberattack life cycle. She provides insights that reveal valuable intelligence that can help protect your organization.

During this webinar, you’ll learn the life cycle of planning and executing an attack, including:

  1. The hook: the social engineering tactics used to lure a victim
  2. The gold: what kind of data is stolen
  3. The endgame: how the threat actor monetizes their stolen data

US (800) 745 9229


Global +1 (628) 256 7175


Europe +44 (0) 1978 528 370

All Contact Information

Contact Us