9Kill Chains
Up to this point, we've talked about individual threats. But in the real world, individual threats are less interesting than the chains that bring them together into an attack on a system.
Rebels analyze the stolen Death Star plans and find a weakness. The Death Star conveniently shows up (rather than a fleet of Star Destroyers), and the Rebels are able to use their X-Wing fighters and Jedi-in-training to deliver a torpedo to precisely the right spot, where it destroys the Death Star.
Other than X-Wings and Death Stars, threats don't show up in a vacuum. Technology has a context, and that context defines the attacker's journey. For every attack, an attacker will engage in some reconnaissance or experimentation. That may be as limited as “Send attack packets to sequential IP addresses” or as sophisticated as “We'll set up a collection of fake businesses, and then recruit people to ‘work from home,’ reshipping packages and laundering money for us.” Even the folks who scan sequential IP addresses need to hear the responses, put those into a database, and then use the results.
To this point, we've looked at individual threats: the building blocks that attackers will combine into something useful to them. Let me present an example of a chain:
- Analyze the plans for the Death Star. (Reconnaissance.)
- Discover that a small fighter might deliver a torpedo. (Weaponization.)
- Fly to the Death Star, fly down a trench. (Delivery.)
- Make the shot. It's like shooting womp rats ...
Get Threats now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.