Targeted Attack Case Studies

Produced with the support of CPNI and based on real-life scenarios, these papers aim to help you understand how cyber attacks are conducted.

icon shield

Whilst all attacks will be tailored to the organisation being targeted, there will be similarities in how they’re orchestrated. We believe that understanding common attack methodologies is key to better protecting the network.

This is why, with the support of CPNI, we have selected and issued these case studies in order to help illustrate the reality of the modern cyber threat - and the subsequent need for investment in security measures. Based on real-life incidents handled by our cyber defence and incident response teams, the reports cover a wide range of the typical attack types from a number of threat actors, including nation state and cyber criminals.

Each case study provides the key information from the incident, including attacker methodologies, suspected threat actors, assets compromised, business impacts and the full timeline of the attack; covering targeting, compromise, exfiltration, discovery and containment.

This content is open for comments - please email

Case Studies Available for Download

  1. Application Layer Attack
  2. Brute Force Attack
  3. DDoS Attack
  4. Network Protocol Attack
  5. Known Vulnerability Exploitation
  6. Zero Day Exploitation
  7. Phishing for Credentials
  8. Phishing with Malware
  9. Rogue Update Attack
  10. Watering Hole Attack

Download resource


Accreditations & Certificates

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 9001 and 14001 in the UK, internationally accepted standards that outline how to put an effective quality and environmental management systems in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR is approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by NCSC for the services we provide to Her Majesty's Government.
MWR’s consultants hold Certified Simulated Attack Manager (CCSAM) and Certified Simulated Attack Specialist (CCSAS) qualifications and are authorized by CREST to perform STAR penetration testing services.