Skip to content

Cyber Defence Framework

Mahesh Shukla edited this page May 30, 2024 · 1 revision

Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin to understand the stages of a cyberattack and help organizations prepare and respond effectively. Here is a detailed breakdown of the Cyber Kill Chain:

cyberkillchain

1. Reconnaissance

  • Definition: The initial phase where the attacker gathers information about the target.
  • Activities:
    • Researching publicly available information (e.g., social media, company websites).
    • Identifying vulnerabilities in systems and networks through scanning and probing.
  • Tools: WHOIS, social engineering, Google hacking, network scanners (e.g., Nmap).

2. Weaponization

  • Definition: The attacker creates a deliverable payload to exploit vulnerabilities found during reconnaissance.
  • Activities:
    • Developing malware (e.g., viruses, trojans, ransomware).
    • Embedding malicious code in legitimate files (e.g., PDFs, Office documents).
  • Tools: Metasploit, Cobalt Strike, custom scripts, weaponized documents.

3. Delivery

  • Definition: The method used by the attacker to transmit the payload to the target.
  • Activities:
    • Sending phishing emails with malicious attachments or links.
    • Exploiting vulnerabilities in web applications or network services.
  • Tools: Email (phishing), USB drives, drive-by downloads, watering hole attacks.

4. Exploitation

  • Definition: The phase where the payload is executed to exploit a vulnerability on the target system.
  • Activities:
    • Executing malicious code to gain initial access to the system.
    • Exploiting software vulnerabilities to escalate privileges.
  • Tools: Exploit kits, zero-day exploits, malicious scripts.

5. Installation

  • Definition: The attacker installs malware to maintain a foothold in the target environment.
  • Activities:
    • Installing backdoors or remote access tools (RATs).
    • Setting up persistence mechanisms (e.g., registry keys, scheduled tasks).
  • Tools: Persistence scripts, rootkits, trojans, backdoors.

6. Command and Control (C2)

  • Definition: The attacker establishes a command channel to remotely control the compromised systems.
  • Activities:
    • Setting up communication channels (e.g., HTTP, HTTPS, DNS).
    • Using encrypted communication to avoid detection.
  • Tools: C2 frameworks (e.g., Cobalt Strike, Metasploit), custom C2 servers, DNS tunneling.

7. Actions on Objectives

  • Definition: The attacker achieves their goals, which can vary based on the intent of the attack.
  • Activities:
    • Exfiltrating data (e.g., intellectual property, personal information).
    • Disrupting services or systems (e.g., launching a DDoS attack).
    • Manipulating data (e.g., changing financial records).
  • Tools: Data exfiltration tools (e.g., FTP, HTTP POST requests), DDoS tools, file manipulation scripts.

Summary Diagram

Here's a visual summary of the Cyber Kill Chain:

rust

Reconnaissance -> Weaponization -> Delivery -> Exploitation -> Installation -> Command and Control -> Actions on Objectives

Defensive Measures

For each stage of the Cyber Kill Chain, there are specific defensive measures that can be implemented:

  1. Reconnaissance: Use threat intelligence, monitor network traffic, and conduct regular security awareness training.
  2. Weaponization: Implement sandboxing, use antivirus and anti-malware solutions, and conduct regular software updates.
  3. Delivery: Employ email filters, web filtering, and intrusion prevention systems (IPS).
  4. Exploitation: Patch vulnerabilities, use endpoint protection, and implement security policies.
  5. Installation: Monitor for abnormal behavior, use application whitelisting, and employ host-based intrusion detection systems (HIDS).
  6. Command and Control: Detect and block suspicious network traffic, use network segmentation, and employ data loss prevention (DLP) tools.
  7. Actions on Objectives: Encrypt sensitive data, monitor and analyze logs, and implement strong access controls.

Understanding the Cyber Kill Chain helps organizations to anticipate, detect, and respond to cyberattacks more effectively. By breaking down an attack into stages, defenders can better identify gaps in their security posture and implement targeted defenses to mitigate threats.

Unified Kill chain

The Unified Kill Chain is an advanced and comprehensive model for understanding and countering cyberattacks, combining elements from various cyberattack frameworks, including the Cyber Kill Chain and MITRE ATT&CK. It provides a more detailed and holistic view of attack methodologies, helping security professionals enhance their defense strategies. Here is a detailed breakdown of the Unified Kill Chain:

Phases of the Unified Kill Chain

  1. Preparation

    • Definition: Activities carried out by the attacker before launching the attack.
    • Activities:
      • Identifying targets and gathering intelligence.
      • Developing or acquiring tools and capabilities.
    • Examples: Reconnaissance, weaponization, infrastructure setup.
  2. Initial Intrusion

    • Definition: The phase where the attacker gains initial access to the target system.
    • Activities:
      • Delivering the payload to the target (e.g., phishing, drive-by download).
      • Exploiting vulnerabilities to execute malicious code.
    • Examples: Spear phishing, exploitation of public-facing applications.
  3. Establish Foothold

    • Definition: The attacker establishes a persistent presence on the compromised system.
    • Activities:
      • Installing malware or backdoors.
      • Creating persistence mechanisms.
    • Examples: Malware installation, establishing backdoors, setting up persistence.
  4. Escalate Privileges

    • Definition: The attacker attempts to gain higher levels of access within the target environment.
    • Activities:
      • Exploiting vulnerabilities to escalate privileges.
      • Harvesting credentials for privileged accounts.
    • Examples: Exploiting system vulnerabilities, credential dumping.
  5. Internal Reconnaissance

    • Definition: The attacker gathers information about the internal network and systems.
    • Activities:
      • Scanning internal network for valuable targets.
      • Enumerating systems and services.
    • Examples: Network scanning, system enumeration, lateral movement.
  6. Move Laterally

    • Definition: The attacker moves from the initial foothold to other systems within the network.
    • Activities:
      • Using compromised credentials to access other systems.
      • Exploiting vulnerabilities on other systems.
    • Examples: Lateral movement, pass-the-hash, remote service exploitation.
  7. Maintain Presence

    • Definition: The attacker ensures continued access to the network over an extended period.
    • Activities:
      • Setting up additional backdoors.
      • Implementing stealth techniques to avoid detection.
    • Examples: Adding new persistence mechanisms, rootkits, fileless malware.
  8. Complete Mission

    • Definition: The attacker achieves their ultimate objective, which could include data exfiltration, destruction, or disruption.
    • Activities:
      • Exfiltrating sensitive data.
      • Encrypting or destroying data.
      • Disrupting critical services.
    • Examples: Data theft, ransomware deployment, DDoS attacks.

Defensive Measures

For each phase of the Unified Kill Chain, specific defensive measures can be implemented:

  1. Preparation

    • Conduct threat intelligence gathering.
    • Monitor for indications of attacker preparation.
    • Harden systems and networks to reduce vulnerabilities.
  2. Initial Intrusion

    • Implement email and web filtering.
    • Use intrusion detection and prevention systems (IDS/IPS).
    • Educate users on recognizing phishing and social engineering attacks.
  3. Establish Foothold

    • Employ endpoint protection and response (EPP/EDR) solutions.
    • Monitor for unusual system behavior and file modifications.
    • Use application whitelisting and exploit mitigation technologies.
  4. Escalate Privileges

    • Apply the principle of least privilege (PoLP).
    • Regularly update and patch systems.
    • Monitor for abnormal account activities and privilege escalation attempts.
  5. Internal Reconnaissance

    • Use network segmentation and micro-segmentation.
    • Employ network traffic analysis and anomaly detection.
    • Implement honeypots and deception technologies.
  6. Move Laterally

    • Monitor and restrict lateral movement paths.
    • Use multi-factor authentication (MFA) for sensitive systems.
    • Implement network access control (NAC) and zero-trust architecture.
  7. Maintain Presence

    • Regularly audit and review persistence mechanisms.
    • Use file integrity monitoring (FIM).
    • Continuously hunt for advanced threats and indicators of compromise (IOCs).
  8. Complete Mission

    • Encrypt sensitive data both at rest and in transit.
    • Implement robust data loss prevention (DLP) solutions.
    • Develop and test incident response and disaster recovery plans.

Integration with Other Frameworks

The Unified Kill Chain integrates well with other cybersecurity frameworks, such as the MITRE ATT&CK framework, by providing a comprehensive view of attacker tactics, techniques, and procedures (TTPs). This integration helps in creating a robust defense strategy by mapping out potential attack paths and ensuring all aspects of security are covered.

By understanding the Unified Kill Chain, organizations can better anticipate, detect, and respond to cyber threats, ensuring a more resilient and secure environment. This comprehensive approach helps in identifying gaps in defenses and implementing targeted security measures to mitigate risks effectively.

Diamond Model

The 18 Phases of the Diamond Model

  1. Reconnaissance

    • Definition: The adversary gathers information about the target.
    • Activities: Open-source intelligence (OSINT), scanning, social engineering.
  2. Weaponization

    • Definition: The adversary creates a deliverable payload.
    • Activities: Developing or acquiring malware, creating phishing emails.
  3. Delivery

    • Definition: The adversary transmits the payload to the target.
    • Activities: Phishing emails, drive-by downloads, USB drops.
  4. Exploitation

    • Definition: The payload exploits a vulnerability on the target system.
    • Activities: Code execution, exploitation of software vulnerabilities.
  5. Installation

    • Definition: The adversary installs malware on the compromised system.
    • Activities: Installing backdoors, setting up persistence mechanisms.
  6. Command and Control (C2)

    • Definition: The adversary establishes communication with the compromised system.
    • Activities: Setting up C2 channels, using remote access tools.
  7. Actions on Objectives

    • Definition: The adversary performs actions to achieve their goals.
    • Activities: Data exfiltration, system disruption, data manipulation.
  8. Privilege Escalation

    • Definition: The adversary attempts to gain higher privileges on the compromised system.
    • Activities: Exploiting vulnerabilities, credential dumping.
  9. Internal Reconnaissance

    • Definition: The adversary gathers information about the internal network.
    • Activities: Scanning for internal systems, enumerating network shares.
  10. Lateral Movement

    • Definition: The adversary moves through the network to other systems.
    • Activities: Using compromised credentials, exploiting vulnerabilities.
  11. Collection

    • Definition: The adversary gathers data of interest from the target.
    • Activities: Copying files, capturing screenshots, keylogging.
  12. Exfiltration

    • Definition: The adversary removes collected data from the target network.
    • Activities: Transferring data via HTTP, FTP, or other protocols.
  13. Covering Tracks

    • Definition: The adversary attempts to avoid detection and remove evidence.
    • Activities: Clearing logs, deleting files, altering timestamps.
  14. Impact

    • Definition: The adversary executes final actions to achieve the intended impact.
    • Activities: Encrypting data (ransomware), disrupting services (DDoS).
  15. Maintain Presence

    • Definition: The adversary ensures continued access to the network.
    • Activities: Installing multiple backdoors, setting up hidden user accounts.
  16. Evasion

    • Definition: The adversary avoids detection and analysis.
    • Activities: Using anti-forensic techniques, encrypting communications.
  17. Execution

    • Definition: The adversary executes the malicious payload.
    • Activities: Running scripts, launching exploits.
  18. Infiltration

    • Definition: The adversary gains initial access to the target environment.
    • Activities: Exploiting public-facing applications, using stolen credentials.

Summary Diagram

Here's an enhanced visual summary of the Diamond Model with the 18 phases:

lua

Copy code

       `Adversary               /  \              /    \ Infrastructure ---- Capability              \    /               \  /              Victim               |         18 Phases (cyclic)`

Application of the 18 Phases

Understanding the 18 phases of the Diamond Model helps organizations to develop a comprehensive defense strategy:

  1. Reconnaissance: Implementing threat intelligence and monitoring.
  2. Weaponization: Using sandboxing and malware analysis.
  3. Delivery: Employing email and web filtering.
  4. Exploitation: Applying patch management and endpoint protection.
  5. Installation: Monitoring for changes and using anti-malware tools.
  6. Command and Control: Detecting and blocking C2 communications.
  7. Actions on Objectives: Using data loss prevention (DLP) and monitoring.
  8. Privilege Escalation: Restricting administrative access and monitoring logs.
  9. Internal Reconnaissance: Segmenting networks and using honeypots.
  10. Lateral Movement: Applying network segmentation and access controls.
  11. Collection: Monitoring for unusual data access and transfers.
  12. Exfiltration: Implementing DLP and monitoring outbound traffic.
  13. Covering Tracks: Using forensic tools and maintaining log integrity.
  14. Impact: Developing incident response and disaster recovery plans.
  15. Maintain Presence: Regularly auditing systems and networks.
  16. Evasion: Using advanced threat detection and response tools.
  17. Execution: Monitoring for malicious activity and using exploit mitigation.
  18. Infiltration: Strengthening access controls and monitoring for breaches.

By applying the Diamond Model, security teams can systematically analyze and counteract cyber threats, enhancing their overall cybersecurity posture.

The Diamond Model of Intrusion Analysis is a framework designed to understand, dissect, and analyze cyber intrusions. It provides a comprehensive view of cyber threats by breaking them down into core components and relationships. Here’s a detailed breakdown of the Diamond Model:

Core Components

The Diamond Model consists of four core components: Adversary, Infrastructure, Capability, and Victim. These components are interconnected and form the vertices of a diamond, representing the relationships and interactions between them.

  1. Adversary

    • Definition: The actor or group conducting the intrusion.
    • Attributes:
      • Identity: Who is the adversary?
      • Motives: Why are they conducting the intrusion (e.g., financial gain, espionage, hacktivism)?
      • Resources: What resources do they have (e.g., tools, skills, knowledge)?
    • Examples: Nation-state actors, cybercriminal groups, hacktivists.
  2. Infrastructure

    • Definition: The physical and virtual resources used by the adversary to carry out the intrusion.
    • Attributes:
      • Communication Channels: How the adversary communicates with the compromised systems (e.g., C2 servers, email, social media).
      • Hosting Services: Where the malicious infrastructure is hosted (e.g., compromised servers, cloud services).
      • Proxies: Intermediaries used to hide the adversary’s true location.
    • Examples: Command and control (C2) servers, malicious domains, VPNs.
  3. Capability

    • Definition: The tools and techniques used by the adversary to achieve their goals.
    • Attributes:
      • Malware: What malicious software is used?
      • Exploits: Which vulnerabilities are exploited?
      • Tactics, Techniques, and Procedures (TTPs): How does the adversary operate?
    • Examples: Ransomware, phishing kits, zero-day exploits, social engineering techniques.
  4. Victim

    • Definition: The target of the adversary’s actions.
    • Attributes:
      • Identity: Who or what is the target (e.g., individuals, organizations, governments)?
      • Industry: Which sector does the victim belong to (e.g., finance, healthcare, government)?
      • Assets: What is being targeted (e.g., data, intellectual property, operational systems)?
    • Examples: Financial institutions, healthcare providers, government agencies.

Event

At the center of the Diamond Model is the Event, representing the specific instance of intrusion that links the Adversary, Infrastructure, Capability, and Victim. Each event can be analyzed to understand the interactions between these core components.

Meta-Features

In addition to the core components, the Diamond Model includes several meta-features that provide additional context and insights into the intrusion:

  1. Timestamp

    • Definition: The time when the event occurred.
    • Importance: Helps in establishing a timeline and correlating events.
  2. Phase

    • Definition: The stage of the intrusion (e.g., reconnaissance, exploitation, exfiltration).
    • Importance: Assists in understanding the adversary’s progress and intent.
  3. Result

    • Definition: The outcome of the event (e.g., data exfiltration, service disruption).
    • Importance: Provides insights into the impact and success of the intrusion.
  4. Direction

    • Definition: The flow of the intrusion (e.g., inbound, outbound, lateral movement).
    • Importance: Helps in understanding how the intrusion propagated.

Applications of the Diamond Model

  1. Intrusion Analysis

    • Purpose: To systematically dissect and understand cyber intrusions.
    • Approach: By analyzing each core component and their relationships, analysts can uncover the adversary’s methods, motives, and infrastructure.
  2. Threat Intelligence

    • Purpose: To enhance threat intelligence efforts.
    • Approach: By mapping out and correlating multiple events, organizations can build a comprehensive threat profile and anticipate future attacks.
  3. Incident Response

    • Purpose: To improve incident response strategies.
    • Approach: By understanding the adversary’s infrastructure and capabilities, responders can more effectively contain and mitigate the intrusion.
  4. Detection and Prevention

    • Purpose: To enhance detection and prevention mechanisms.
    • Approach: By identifying common patterns and indicators of compromise (IOCs) across events, organizations can strengthen their defenses.

Example

Case Study: Phishing Campaign

  1. Adversary: A cybercriminal group motivated by financial gain.
  2. Infrastructure: A network of compromised email servers used to send phishing emails.
  3. Capability: A phishing kit that includes malicious attachments and links to fake login pages.
  4. Victim: Employees of a financial institution targeted to steal banking credentials.

Event: A phishing email is sent to an employee, leading to credential theft and subsequent unauthorized access to the financial institution’s systems.

Meta-Features:

  • Timestamp: The phishing email was sent on May 1, 2024.
  • Phase: Initial intrusion.
  • Result: Credential theft and unauthorized access.
  • Direction: Inbound (phishing email received by the victim).

By analyzing this event using the Diamond Model, the financial institution can understand the adversary’s methods, identify the compromised infrastructure, and implement measures to prevent future incidents.

Summary Diagram

Here’s a visual summary of the Diamond Model:

lua

Copy code

       `Adversary               /  \              /    \ Infrastructure ---- Capability              \    /               \  /              Victim`

Understanding the Diamond Model helps organizations to systematically analyze and respond to cyber threats, providing a structured approach to uncovering and mitigating adversarial activities.