{"id":883,"date":"2020-05-31T10:22:27","date_gmt":"2020-05-31T10:22:27","guid":{"rendered":"https:\/\/osintme.com\/?p=883"},"modified":"2020-08-29T16:53:25","modified_gmt":"2020-08-29T16:53:25","slug":"the-cyber-kill-chain-explained-along-with-some-2020-examples","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2020\/05\/31\/the-cyber-kill-chain-explained-along-with-some-2020-examples\/","title":{"rendered":"The Cyber Kill Chain explained &#8211; along with some 2020 examples"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"883\" class=\"elementor elementor-883\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-887e82e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"887e82e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5dfff66\" data-id=\"5dfff66\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e368a46 elementor-widget elementor-widget-text-editor\" data-id=\"e368a46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Cyber Kill Chain framework is known to just about everybody who works hands on in the information security industry. I must admit, before my transition into the infosec realm from a government job I had a very vague idea of what it was and how it was relevant.<\/p><p>If you are thinking about a career in incident response, cyber intelligence, information security, but also some more general areas like data protection &amp; privacy, the Cyber Kill Chain is probably one of the first concepts you should get familiar with.<\/p><p>The Cyber Kill Chain is a model that describes and explains various stages of a cyber attack. It was developed by <a href=\"https:\/\/www.lockheedmartin.com\/en-us\/index.html\">Lockheed Martin.<\/a><\/p><p>The idea behind it is to identify, itemise and prevent hostile cyber activity such as intrusion of a network. The model identifies what steps the cyber adversaries must complete in order to achieve their objectives.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-efc4dc2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"efc4dc2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-037dc33\" data-id=\"037dc33\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ea2bb8 elementor-widget elementor-widget-image\" data-id=\"2ea2bb8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"878\" height=\"1024\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/05\/THE-CYBER-KILL-CHAIN.png?fit=878%2C1024&amp;ssl=1\" class=\"attachment-large size-large wp-image-885\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/05\/THE-CYBER-KILL-CHAIN.png?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/05\/THE-CYBER-KILL-CHAIN.png?resize=257%2C300&amp;ssl=1 257w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/05\/THE-CYBER-KILL-CHAIN.png?resize=878%2C1024&amp;ssl=1 878w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/05\/THE-CYBER-KILL-CHAIN.png?resize=768%2C895&amp;ssl=1 768w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/05\/THE-CYBER-KILL-CHAIN.png?resize=1318%2C1536&amp;ssl=1 1318w, https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2020\/05\/THE-CYBER-KILL-CHAIN.png?resize=1757%2C2048&amp;ssl=1 1757w\" sizes=\"(max-width: 878px) 100vw, 878px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">source: www.lockheedmartin.com<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e64ed95 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e64ed95\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d212382\" data-id=\"d212382\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c35f63e elementor-widget elementor-widget-heading\" data-id=\"c35f63e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">The 7 steps of The Cyber Kill Chain<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-635e82e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"635e82e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dd2cacf\" data-id=\"dd2cacf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d5936cd elementor-widget elementor-widget-text-editor\" data-id=\"d5936cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\"><i><b>Step 1: RECONNAISSANCE<\/b><\/i><\/span><span style=\"font-size: medium;\"> \u2013 typically an open source intelligence style of an activity, which involves gathering email addresses, publicly identifiable information belonging to target company\u2019s staff members, their position in the company, area of expertise, online presence, interests, participation in conferences and training events, and so on. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">The reconnaissance step focuses on establishing not only who has access to a system, but also attempts to map out the target\u2019s infrastructure, type of security tools used, software, devices and an overall security posture of the target. Reconnaissance can be passive (OSINT and research) or active (gaining unauthorised access to any of the target\u2019s digital resources).<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-33a856c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33a856c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f0891c2\" data-id=\"f0891c2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a53a3d elementor-widget elementor-widget-text-editor\" data-id=\"2a53a3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Example:<\/strong>\u00a0A highly targeted reconnaissance against one or several entities that started with the harvesting of email addresses. Targeted were, amongst others, the Gates Foundation and the WHO.<\/em><\/p><p><em>source: <a href=\"https:\/\/www.washingtonpost.com\/technology\/2020\/04\/21\/nearly-25000-email-addresses-passwords-allegedly-nih-who-gates-foundation-are-dumped-online\/\">Washington Post<\/a><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b7ba8b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b7ba8b6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a36cc23\" data-id=\"a36cc23\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f6d4c9c elementor-widget elementor-widget-text-editor\" data-id=\"f6d4c9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\"><i><b>Step 2: WEAPONIZATION <\/b><\/i><\/span><span style=\"font-size: medium;\">\u2013 this means identifying an exploit, a backdoor as well as a mechanism for conducting an attack. Typical examples of weaponized devices or services is a botnet, which includes hundreds or thousands of infected machines that can be controlled by a hacker. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">One very common tactic used by cyber attackers is weaponizing PDF or MS Word \/ Excel attachments in emails, crafted carefully to look like they are official and legitimate documents. Compromised domains can also be weaponized to house malicious software. Another weaponization method is software that has security vulnerabilities (like a zero day exploit) and can serve as a gateway to deliver malware to a target system.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51f1dcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51f1dcf\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-415cb1e\" data-id=\"415cb1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1cb3601 elementor-widget elementor-widget-text-editor\" data-id=\"1cb3601\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Example:<\/strong> Weaponization of vulnerable Zyxel devices by the Mirai botnet.<\/em><\/p><p><em>source: <a href=\"https:\/\/krebsonsecurity.com\/2020\/03\/zxyel-flaw-powers-new-mirai-iot-botnet-strain\/\">Krebs on Security<\/a><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eddb797 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eddb797\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5d72828\" data-id=\"5d72828\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-47c43be elementor-widget elementor-widget-text-editor\" data-id=\"47c43be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\"><i><b>Step 3: DELIVERY<\/b><\/i><\/span><span style=\"font-size: medium;\"> \u2013 this is the process of delivering the weaponized content to the target\u2019s digital environment. The delivery can happen in a number of ways: from the victim opening a malicious attachments, to a drive-by download of malware from a malicious domain. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">The delivery method can be adversary-controlled (direct action by a bad actor like hacking into infrastructure to plant the malware) or adversary-released, example of which is releasing a malicious email that delivers the malicious software to the target.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1cb0a8d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1cb0a8d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-abd5e0e\" data-id=\"abd5e0e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bffafa1 elementor-widget elementor-widget-text-editor\" data-id=\"bffafa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Example:<\/strong> Multiple cases of systems infection by malware delivered as a malicious attachment in a fake COVID-19 update email.<\/em><\/p><p><em>source: <a href=\"https:\/\/www.cnbc.com\/2020\/04\/02\/us-secret-service-warns-that-coronavirus-email-scams-are-on-the-rise.html\">CNCB<\/a><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc038d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc038d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2db7687\" data-id=\"2db7687\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75f5cb2 elementor-widget elementor-widget-text-editor\" data-id=\"75f5cb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\"><i><b>Step 4: EXPLOITATION<\/b><\/i><\/span><span style=\"font-size: medium;\"> \u2013 this stage takes place after the attacker gains initial access to the target\u2019s system through a vulnerability. The bad actor will now exploit the security flaws. The host system is typically compromised during this step, usually by a type of malware called dropper (allows the hacker to remotely execute commands within the target\u2019s environment) or a downloader (downloads additional malware from another online location).<\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">Once some presence is established within the victim\u2019s network, the attacker can proceed to download more tools, attempt to intercept login credentials or to obtain hash values of passwords used in the environment or to escalate privileges to carry out more malicious actions within the system.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-eda44c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"eda44c8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7c5c2e4\" data-id=\"7c5c2e4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd880a9 elementor-widget elementor-widget-text-editor\" data-id=\"dd880a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Example:<\/strong> Cyber attackers were able to exploit unknown vulnerabilities and gained initial access to the systems of a medical research company, but they were repelled.<\/em><\/p><p><em>source: <a href=\"https:\/\/www.computerweekly.com\/news\/252480425\/Cyber-gangsters-hit-UK-medical-research-lorganisation-poised-for-work-on-Coronavirus\">Computer Weekly<\/a><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-005a9cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"005a9cb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-44f9e06\" data-id=\"44f9e06\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-349618e elementor-widget elementor-widget-text-editor\" data-id=\"349618e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\"><i><b>Step 5: INSTALLATION<\/b><\/i><\/span><span style=\"font-size: medium;\"> \u2013 this step is simply the installation process of the malicious software and taking up residence within the target infrastructure. The primary purpose of the installation stage is to establish a firm presence within the target network and bypass security controls while maintaining internal access.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2ff7a79 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2ff7a79\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-22e5265\" data-id=\"22e5265\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d59e11b elementor-widget elementor-widget-text-editor\" data-id=\"d59e11b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Example:<\/strong> How an APT group installed malware and maintained presence within the networks for months.<\/em><\/p><p><em>source: <a href=\"https:\/\/securityboulevard.com\/2020\/05\/apt-attack-targets-central-asian-companies-avast\/\">Security Boulevard<\/a><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0dcd66f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0dcd66f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a931432\" data-id=\"a931432\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46ee3bc elementor-widget elementor-widget-text-editor\" data-id=\"46ee3bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\"><i><b>Step 6: COMMAND AND CONTROL<\/b><\/i><\/span><span style=\"font-size: medium;\"> \u2013 once the malware installs on the system, it will seek to establish a connection back to the command and control server (C2). The malicious actor can now operate within the target environment and pivot or crawl laterally through the network. The command and control channel is usually manual and requires the hacker to interact with the malware from the C2 server in order to carry out desired activities.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f9c903 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3f9c903\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ce6ad4d\" data-id=\"ce6ad4d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e0ce142 elementor-widget elementor-widget-text-editor\" data-id=\"e0ce142\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Example:<\/strong> Analysis of the Qbot C2 server activity and its communications with compromised hosts.<\/em><\/p><p><em>source: <a href=\"https:\/\/www.varonis.com\/blog\/varonis-discovers-global-cyber-campaign-qbot\/\">Varonis<\/a><\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-681de30 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"681de30\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ed53798\" data-id=\"ed53798\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-95ec282 elementor-widget elementor-widget-text-editor\" data-id=\"95ec282\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\"><i><b>Step 7: ACTIONS ON OBJECTIVES<\/b><\/i><\/span><span style=\"font-size: medium;\"> \u2013 this final step varies and depends a lot on what malicious software was deployed to attack the victim and what the hacker wants to achieve while maintaining presence within from the compromised system. Obviously, the longer the bad actor maintains their presence, the more destructive the impact, at least potentially. <\/span><\/p><p class=\"western\" align=\"justify\"><span style=\"font-size: medium;\">This is the final step when intruders take specific actions to achieve their original objectives to the detriment of the victim. Objectives can vary, from data exfiltration and espionage, ransomware enabled extortion, to full destruction or temporary disruption of the network. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f7a77c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0f7a77c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b793f16\" data-id=\"b793f16\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6a764ba elementor-widget elementor-widget-text-editor\" data-id=\"6a764ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em><strong>Example:<\/strong> No examples here, go do your own research \ud83d\ude42<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Learn about the Cyber Kill Chain from the most recent 2020 examples illustrating each step.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18],"tags":[76,60,98,15],"class_list":["post-883","post","type-post","status-publish","format-standard","hentry","category-digital-privacy-security","tag-cybercrime","tag-hacking","tag-kill-chain","tag-security"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=883"}],"version-history":[{"count":11,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/883\/revisions"}],"predecessor-version":[{"id":1022,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/883\/revisions\/1022"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}