The Five Stages Of A Cyber Attack

In my line of work, I find a good proportion of people who are surprised by just how long a single cyber attack can take to carry out, from beginning to end.

When the average dwell time of an intruder in an IT ecosystem has increased to more than 9 months, it begs the question why malicious actors seem to be given the luxury of time.

To understand how this all works, let’s review the five stages of a cyber attack.

1. Getting to know the victim

Adversaries start by identifying target organisations and collecting information about them. Key focuses include what valuable data they might be able to steal, how big a payoff they could get from a ransomware attack, and how difficult the mission is likely to be. Reconnaissance can be passive, which involves using public sources such as tax records, job postings and social media to discover what systems and applications the organisation uses, the names of its employees, and so on. Reconnaissance can also involve active techniques like network and port scanning to understand the target organisation’s network architecture, firewalls and intrusion detection programs, operating systems and applications, and the services hosted on its ports.

2. Planning

Next, the attacker determines which attack method to use. Examples include exploiting a zero-day vulnerability, launching a phishing campaign, or bribing an employee to provide log in details or deploy malware.

3. Initial Breach

The adversary then uses the chosen attack method to attempt to breach the organisation’s network. For instance, the adversary might succeed in guessing an employee’s user ID and password, gain entry through an unpatched or misconfigured system, or trick an employee into launching malware hidden in a malicious attachment to a phishing email.

4. Choosing An Attack Path

Once inside the network, the adversary will seek to escalate their privileges and compromise additional systems to locate sensitive data or reach other critical resources. They also want to maintain their access. To achieve this, they might create new user accounts, modify settings or even install backdoors.

This is where attack paths come into play. By leveraging an attack path, an adversary can escalate their privileges from ordinary user to administrator and even to Domain Admin, which gives them unlimited power in the domain. We’ll revisit this later.

By compromising authorised user and admin accounts, adversaries can make their activity difficult to spot. And once they have claimed sufficient privileges, they can further evade detection by causing systems to falsely report that everything is working normally.

5. Cleaning Up The Mess

Last, the adversary steals or encrypts the organisation’s data, or perhaps corrupts systems to disrupt business operations. In addition, they often also try to cover their tracks in order to thwart investigations and keep the organisation from enhancing their defences against future attacks. Techniques include uninstalling programs used in the attack, deleting any folders or accounts that they created, and modifying or deleting any trace they were there.

Where To Focus?

This 5-stage process offers several opportunities for defenders to disrupt the attack. Whilst there is merit in trying to ensure that the initial intrusion is prevented, I often find that too many organisations aren’t focusing enough on that crucial 4th stage: disrupting the attack path where the attacker is able to escalate their privileges and take full control.

Attack paths are a chain of actions that could enable an attacker who compromises a user account to gain administrative privileges, or even full control of the IT environment. It can start with something as simple as a phishing attack. When looking at attack paths, there is no code-based vulnerability or a single misconfiguration that can be mitigated by the established methods of patching and vulnerability management.

The problem is most acute for Microsoft Active Directory (AD), for several reasons. First, AD is by far the most widely used directory service: It’s widely reported that 95 percent of Fortune 1000 companies use AD. Adversaries who focus on understanding and exploiting attack paths in Active Directory have a huge number of targets to pick from.

Another factor that makes AD vulnerable to having attack paths is its complexity and lack of transparency. AD administrators have a wide range of options for granting permissions to accounts, with literally thousands of settings. At the same time, it’s nearly impossible to accurately audit permissions. AD has been around for more than two decades - plenty of time for many organisations to build up convoluted policies, deeply nested privileges and more.

Together, these factors make attack paths virtually inevitable in any AD environment - and a very pressing cyber security concern.

For strong AD security, attack path management is needed. Instead of looking at vulnerabilities or configuration errors in isolation, attack path management can help identify the sequences of steps an adversary can take from compromising an ordinary user account to gaining control over critical assets or even Active Directory itself.

An attack path management tool will identify the choke points that are shared by multiple attack paths. A choke point is the last segment in the chain of events for many attack paths. By remediating a choke point, you eliminate all the attack paths that rely on it.

It’s crucial to combine attack path identification with attack path monitoring - continuously watching to see if any attack paths are actually being leveraged so you can take action promptly instead of allowing the intruder the luxury of extra time to advance along the attack path towards your critical IT assets. 

It’s vital to remember that attack path management is not a “once and done” task. Modern computing environments are complex and highly dynamic. As a result, new attack paths are emerging all the time, so you need to actively look for them on a regular basis and promptly take steps to remediate or at least monitor them.

Bryan Patton is Principal Strategic Systems Consultant at Quest Software

You Might Also Read:

Azure Active Directory Recycle Bin Won’t Save Your Critical Data:

 

« NordLayer - An Adaptive Network Access Security Solution For Modern Businesses
Iranian Hackers Target US Midterm Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

Fidus Information Security

Fidus Information Security

Fidus is a team of security professionals providing Penetration Testing and Cyber Security Consulting services throughout the UK and worldwide.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

Rippleshot

Rippleshot

Rippleshot is a fraud analytics firm that detects mass card compromises faster, allowing issuers to execute more proactive fraud detection strategies.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Data Theorem

Data Theorem

Data Theorem is a leading provider in modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Glocomms

Glocomms

Glocomms is a leading specialist recruitment agency for the tech sector, providing permanent, contract, and multi-hire recruitment from our global hubs in San Francisco, New York, London and Berlin.

CerraCap Ventures

CerraCap Ventures

CerraCap Ventures invest globally into early-stage B2B companies in Healthcare, Enterprise AI and Cyber Security.

ISECURION Technology & Consulting

ISECURION Technology & Consulting

ISECURION is an information security consulting company. We provide a unique blend of services to our customers catering to the current information security landscape.

Herzing College

Herzing College

Herzing College Ottawa offers an accelerated 12-month Cybersecurity Specialist training program. This program is developed by industry experts and based on leading IT security certifications.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.