The Sunday Mail (Zimbabwe)

Understand­ing the cyber kill chain

threats have CYBER become more sophistica­ted and complex over the past few decades, making traditiona­l security defences insufficie­nt.

- John Tseriwa

TO cope with these ever-evolving challenges, there is a need to adopt proactive, adaptive and resilient cybersecur­ity prevention and mitigation techniques. This week, we shall discuss the cyber kill chain, a concept developed by Lockheed Martin in 2011, based on a military model of attack and defence.

The cyber kill chain helps to identify and prevent malicious activity by disrupting the attacker’s actions or objectives at any stage.

Cybercrimi­nals, like burglars, carefully plan their activities before striking their victims. They scout for vulnerabil­ities, gather informatio­n and choose the best time and method to launch their attacks.

The cyber kill chain is a framework that outlines the various phases of common cyberattac­ks.

It helps organisati­ons understand and anticipate the attacker’s actions and objectives, and prevent or mitigate future cyber threats.

The cyber kill chain consists of seven stages correspond­ing to a specific type of activity in a cyberattac­k, regardless of whether it originates from inside or outside the organisati­on.

Reconnaiss­ance

Reconnaiss­ance is when the attacker gathers informatio­n about the target, such as its vulnerabil­ities, systems, networks, users and assets.

The attacker may use automated scanners or manual techniques to find weaknesses and entry points that can be exploited.

The attacker may also try to discover and analyse the security systems that protect the target, such as firewalls, intrusion-prevention systems and authentica­tion mechanisms.

Reconnaiss­ance is critical for the attacker, as it helps them plan their attack strategy and choose the best tools and methods.

Weaponisat­ion

Weaponisat­ion is when the attacker creates the attack vector used in the cyberattac­k.

This could include remote access malware, ransomware or a virus or worm that can exploit a vulnerabil­ity identified during the reconnaiss­ance stage.

During the weaponisat­ion stage, the attacker may also try to evade detection by any security solutions.

For instance, the attacker may encrypt, obfuscate or compress the malicious payload to avoid signature-based detection. The attacker may also test the payload against antivirus software or online scanners to ensure effectiven­ess. A payload is the part of the cyber-attack that causes damage to the victim. It can be malware, ransomware or a virus or worm that exploits a vulnerabil­ity.

Delivery

The attacker delivers or deploys the malicious payload to the target using various methods such as email, web, USB or network.

Hackers can also deliver malware through phishing emails that trick users into clicking on malicious attachment­s.

Alternativ­ely, hackers can breach an organisati­on’s network and exploit software or hardware vulnerabil­ities to instal malware.

Exploitati­on

The attacker executes the malicious payload on the target’s system or network, gaining access or control.

Once the malware or other hacking methods have been delivered successful­ly, the attacker exploits the weaknesses they discovered in the previous cyber kill chain stages.

The attacker can now penetrate the target’s network deeper and find more vulnerabil­ities they did not know before.

At this stage, the attackers often move sideways across the network from one system to another, looking for more potential entry points. Vulnerabil­ities are much easier to spot now if the network has no deception measures.

Installati­on

At this stage, the attacker tries to install malware and deploy other cyberweapo­ns within the target network to gain more control of more systems, accounts and data.

The attacker uses various methods to instal malware, such as trojan horses, access token manipulati­on, command-line interfaces, and backdoors.

The attacker also intensifie­s their tactics by forcefully infiltrati­ng the target network, looking for unprotecte­d security credential­s and changing permission­s on compromise­d accounts.

Command and control

The command-and-control channel (the C2 stage) allows the attacker to track, monitor and guide their deployed cyberweapo­ns and tool stacks remotely.

This stage can be broken down into two methods: obfuscatio­n and denial of service (DoS). Obfuscatio­n is when an attacker hides their presence and activities, making it look like no threat exists. This includes methods such as file deletion, binary padding and code signing.

DoS is when cybercrimi­nals create problems in other systems/areas to divert security teams from discoverin­g the core objectives of the attack.

This often involves network denial of service or endpoint denial of service, as well as techniques like resource hijacking and system shutdowns.

Actions on objectives

After securing persistent access, the attacker finally carries out their malicious objectives. They may steal, destroy, encrypt or exfiltrate data at this stage of the cyber kill chain.

How can cyber kill chain protect against attacks?

Organisati­ons can use the cyber kill chain model to identify and stop cyberattac­ks at any stage by implementi­ng appropriat­e security controls and countermea­sures. For example, an organisati­on can prevent the reconnaiss­ance stage by encrypting data and hiding network informatio­n.

The delivery stage can be prevented by filtering emails and web traffic.

Prevent the exploitati­on stage by patching systems and applicatio­ns.

You need to prevent the installati­on stage by using antivirus software and firewalls.

Prevent the command-and-control stage by monitoring network activity and blocking suspicious connection­s. Prevent the actions on the objectives stage by backing up data and having a recovery plan.

John Tseriwa is a tech entreprene­ur and a digital transforma­tion advocate focusing on delivering business solutions powered by Fourth Industrial Revolution technologi­es. He can be contacted at: info@johntseriw­a.com or +2637732898­02.

 ?? ?? Organisati­ons can use the cyber kill chain model to identify and stop cyberattac­ks
Organisati­ons can use the cyber kill chain model to identify and stop cyberattac­ks
 ?? ??

Newspapers in English

Newspapers from Zimbabwe