Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Why the ‘cyber kill chain’ needs an upgrade

Tim Greene | Aug. 8, 2016
From Black Hat conference: Security pros need to focus more on catching attackers after they’ve broken in

One of the most popular models for analyzing cyberattacks doesn’t focus  enough on what to do after adversaries break into networks successfully, which they inevitable will do, Black Hat 2016 attendees were told this week in Las Vegas.

“Every attacker will become an insider if they are persistent enough,” says Sean Malone, a security consultant who spoke at the conference. “We need to operate under a presumption of breach.”

He’s critical of a popular defense scheme called the cyber kill chain that defines seven steps attackers must take in order to succeed: reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions and objectives.

The problem with it is that it assumes a traditional perimeter defense where a firewall is the main impediment to intruders. But that is no longer the case, so organizations must beef up defenses within that perimeter, Malone says.

The New Cyber Kill Chain

That means adding more steps, which are actually the same set only this time preceded by the word internal, so the kill chain becomes internal reconnaissance, internal weaponization and so forth. Internal exploitation, for instance, might include privilege escalation, lateral movement within the network and manipulating individual targeted machines.

During internal reconnaissance, adversaries have access to a single user’s workstation and will data-mine it for local files, network shares, browser history, and access to wikis and Sharepoint. The objective is to figure out how that machine might help map the network and enable moving to more valuable assets.

At each stage of the internal cyber kill chain, security architects should figure out what tactics, techniques and procedures (TTP) adversaries are likely to use and then set up defensive TTPs. In the case of Internal exploitation that might be patching fully, including development and test systems, and installing effective endpoint protection products.

Each of the attack phases once inside a victim’s network can take anywhere from minutes to months, including a final wait time when an attack is in place and ready to go. But note that the attacker will hold off for the optimal time to launch in order to get the most impact, Malone says.

Reconnaissance and weaponization might each take months. It’s hard to disrupt weaponization because it takes place offline at the attacker’s sites. But defenders can take steps to harden their systems and applications so weaponization is more difficult, Malone says. This might also include introducing false devices on the network – obfuscation – to make the task harder.

This new kill chain extends into what happens in recovery after a successful attack is carried out. Corporate cybersecurity teams need to have a plan in place for dealing with reporting breaches, contacting law enforcement, dealing with adverse publicity and the like. Each of these steps should be thought through with a plan and personnel in place to deal with them, he says.

 

1  2  Next Page 

Sign up for Computerworld eNewsletters.