How a BOT Works
Perpetrators of BOTs look for companies that use IT systems that are easy to do reconnaissance on and that are easily exploitable. Attacks begin with a scan of the network from the infected endpoint to locate the asset and services an attacker wants to target.
Attivo Solutions are effective in the Reconnaissance (Recon) and Delivery phases when the attackers are identifying the assets to target and beginning their attack.