An attack vector is a method or pathway that cybercriminals use to gain unauthorized access to networks, systems, or data. Attack vectors are the specific techniques attackers use to exploit vulnerabilities—the "how" of a cyberattack—whether through malware hidden in an attachment, credentials stolen through a fake login page, or vulnerabilities in unpatched software.
Distinction from Attack Surface: An attack surface is the collection of all possible entry points into a system, while an attack vector is the specific path or technique used by a threat actor to exploit one of those entry points during an actual attack.
Common Attack Vectors
Phishing: The most reliable entry point because humans are easier to compromise than hardened systems. Attackers craft messages mimicking trusted brands or colleagues, pushing targets to click spoofed links, open malicious attachments, or authorize fraudulent payments. Phishing is the initial attack vector in the majority of successful breaches.
Compromised Credentials: Stolen usernames and passwords obtained through phishing, credential stuffing, or purchasing from dark web markets, used to gain authenticated access to systems and cloud services.
Unpatched Vulnerabilities: Known security flaws in software, operating systems, or network devices that have not been patched, allowing attackers to exploit them for initial access or privilege escalation.
Social Engineering: Manipulating individuals through deception, impersonation, or psychological pressure to take actions that compromise security, such as transferring funds or sharing credentials.
Malicious Insider: Employees, contractors, or partners who misuse legitimate access to steal data, sabotage systems, or facilitate external attacks.
Supply Chain Compromise: Attacking less-secure vendors or software suppliers to gain access to their customers, as demonstrated by incidents like the SolarWinds attack.
Drive-By Downloads: Compromising websites to automatically deliver malware to visitors, exploiting browser or plugin vulnerabilities without requiring user interaction.
Pangratis protects against the most prevalent attack vector—email—by detecting and blocking phishing, business email compromise, malware delivery, and other email-based attack techniques before they can be used to gain a foothold in the organization.