5 Links of the Attack Chain and How to Disrupt Them

Awareness & Training , Continuous Monitoring , Cybersecurity

5 Links of the Attack Chain and How to Disrupt Them by Malwarebytes 5 Links of the Attack Chain and How to Disrupt Them

By identifying steps in the attack chain, you can deploy appropriate defenses at each stage to prevent breaches from happening in the first place.

When dealing with attacks against the enterprise, many people might not realize that the actual infection is only one part of a chain of events leading up to a network breach. In this blog, we're going to break down the attack chain, link by link, and tell you how to prevent a breach at each step.

Understanding the attack chain means that you know that while there are multiple ways in which your network could be compromised, there are also multiple ways to disrupt the actual attack. 

1. Profiling

The first thing an attacker will do is profile your machines to determine whether they should launch the attack or not. They'll check your OS, your browser, plugins, IP address, and what security products you have installed. They can do this via malvertising exploit attack, which employees can be exposed to by simply visiting a popular news site.

In addition, cybercriminals will identify the low hanging fruit in the form of employees who post their role within the company and details of their job on unsecured social media pages. This information can be used to quickly identify a user who would fall for a specially crafted spear-phishing attack.

2. Delivery

The next stage of an attack is the delivery. In the malvertising example, once the attacker determines you're an interesting target, they'll redirect you to the exploit landing page. In the case of spear phishing, the specially crafted email will appear to come from a trusted source, usually including a link or malicious attachment.

3. Exploitation

After the attacker determines you're an interesting target and they've redirected you to the attack server, the attack server will exploit your browser and your Flash or Word applications to deliver and remotely execute the malware payload.

4. Payload Execution

Once on the system, and depending on the malware used, the attacker can accomplish any number of nefarious tasks, including installing additional malware, identifying networked drives and important files, ransoming important business files using ransomware, and of course obtaining network admin credentials through privilege escalation.

5. Malicious Behavior

Finally, the attack reaches its apogee, which in many cases is completely compromising the network to steal data, disrupt operations, or establish a pivot point to enter the networks of other organizations. This stage is where the breach occurs, and if an attacker has made it this far, it's usually game over.

Disruption

Understanding the attack chain means that you know that while there are multiple ways in which your network could be compromised, there are also multiple ways to disrupt the actual attack.

By advising your employees to lock down their social media profiles and be aware of what kind of information they are posting online, you can greatly reduce the information criminals have at their disposal when profiling a target.

Providing educational training for your employees on how to identify and confirm spear-phishing attacks, as well as employing the use of anti-exploit technology to prevent drive-by malvertising attacks, can disrupt the delivery phase. These same tips, combined with real-time malware protection technology that detects and blocks malware as it executes, can greatly reduce the risk from spear phishing and drive-by exploits.

It is also a good idea to start investing in specialized anti-malware tools such as anti-ransomware technology, which actively hunts for ransomware-like behavior and kills any applications identified as ransomware. This kind of technology protects your organization against both malware that the security community knows about as well as the stuff that hasn't even been compiled yet.

It's important not only to understand the layers and precautions needed when it comes to developing a solid network security plan, but also to understand what methods attackers will use to find the holes in your armor and exploit your vulnerabilities. By identifying steps in the attack chain, you can deploy appropriate defenses at each stage to prevent breaches from happening in the first place.