THM - LM Cyber Kill chain
- Intro
- There are 7 links in the kill chain
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command and Control
- Actions on Objectives
- The Cyber Kill Chain helps understand process of steps and layers of an attack
- There are 7 links in the kill chain
- Reconnaissance
- Discovery and collection of information related to the target.
- OSINT - Open-Source Intelligence
- The first and most subtle step an attacker can take to gather information
- Study of publicly available information
- Never makes contact with the target, so it's very difficult to detect
- Email harvesting and phishing
- Weaponization
- A "weaponizer" combines an exploit and malware into a deliverable payload
- The exploit is a program or code used to take advantage of a vulnerability in a system
- As an example, it is an empty wooden horse, or a word document with macros enabled
- The malware is the code or program that is intended to take action on a system (e.g. disrupt, gain access, damage, etc.)
- In the example, it's a group of soldiers, or a macro that executes code on a system
- The payload is the combination of the exploit and the malware that is delivered to a system
- the soldiers in the wooden horse, or the word document with macros to infect a system
- The exploit is a program or code used to take advantage of a vulnerability in a system
- IF the goal is more long-term, the attacker may attempt to leave themselves a backdoor
- A "weaponizer" combines an exploit and malware into a deliverable payload
- Delivery
- How the payload is delivered
- Phishing email, infected USB drives, or a watering hole attack, for example
- Cybercriminal group mails malicious USB dongles to targeted companies | CSO Online
- How the payload is delivered
- Exploitation
- A vulnerability is exploited, either with the payload created earlier, or in addition (e.g., employee clicking a link, etc.)
- The exploits can be used to move laterally through a system
- Lateral movement is when a malicious actor is able to use access in one area of a system to access another area in the system
- e.g., using an EA's credentials to log into the CEO's laptop
- Lateral movement is when a malicious actor is able to use access in one area of a system to access another area in the system
- A Zero-day is a vulnerability or exploit is a vulnerability or exploit that is unknown by the developer, and can be exploited on a fully-patched system
- Installation
- Once the attacker has entered the system, they want to install their malware, often to create a backdoor
- There are various ways to gain persistent backdoor access to a system:
- Web shell - a malicious script written in webdev languages like ASP, PHP, or JSP, to maintain access to a compromised system
- Install a backdoor application that is specifically designed to maintain persistent access on a system
- For example, Meterpreter in Metasploit or even something like Teamviewer
- Modifying system Services.
- Create or Modify System Process: Windows Service, Sub-technique T1543.003 - Enterprise | MITRE ATT&CK®
- These malicious services are often disguised by Masquerading as legitimate or known names for their applications, like Notepad
- Adding run keys or similar to system startup locations
- Timestomping allows is when an attacker modifies file and log timestamps to evade detection
- Command & Control
- C2 (Command and Control) is how an attacker communicates with a compromised machine and maintains control over its operation
- Also known as C2 or C&C Beaconing
- Historically, IRC (Internet Relay Chat) was frequently used as a C2 communication channel, but there are now 2 common methods to evade firewalls
- HTTP 80 and HTTPS 443 - blends malicious traffic with legitimate traffic, and is difficult to detect
- DNS Tunneling - frequent DNS requests to a DNS server owned by the attacker, making the traffic appear legitimate.
- The C2 device or infrastructure can also be owned by the attacker (e.g., a raspberry pi)
- C2 (Command and Control) is how an attacker communicates with a compromised machine and maintains control over its operation
- Actions on Objectives (Exfiltration)
- The attacker typically now takes its actions on objectives, whether that is corrupting or collecting data. or going deeper
- Collecting
- Credentials, recon of internal software vulnerabilities, sensitive information, etc.
- Goal might be to resell information, ransom it, or use it to craft more targeted attacks
- Corrupting
- Deleting backups, encrypting or corrupting records
- Goal might be to ransom information, inflict corporate damage, or conceal information, etc.
- Going deeper
- Further privilege escalation or lateral movement, like to air-gapped equipment etc.,
- Goal is to perform further attacks
- Collecting
- The attacker typically now takes its actions on objectives, whether that is corrupting or collecting data. or going deeper
- Conclusion
- The Cyber Kill Chain is not to be relied upon
- It was last updated in 2011, when it was published
- The landscape and our understanding has evolved since then
- MITRE and the Unified Kill Chain should be used instead
- The Cyber Kill Chain is not to be relied upon
Practice
The analysis is on Target's credit card compromise, and we're given a list of possibilities.
- exploit public-facing application
- data from local system
- PowerShell
- dynamic linker hijacking
- spearphishing attachment
- fallback channels
And we're supposed to align these with the 6 stages above Recon
- Weaponization
- I initially thought this would by the dynamic link hijacker, as I was thinking of that as the malware
- However, the correct answer is PowerShell, because PowerShell (or VB script etc.) is used to weaponize the exploit and malware in a payload
- Delivery
- Clearly spearphishing attachment, since that's how it gets the payload is delivered
- Exploitation
- Very likely exploit public-facing application, because at this point the attackers were skimming credit cards
- Installation
- Here I thought it was PowerShell, because PowerShell = install
- However, I need to connect Installation with Persistence in my mind
- Therefore, dynamic linker hijacking is how the attackers maintain persistence
- Command & Control
- Use fallback channels for communication
- Actions on Objectives
- exfiltrate data from local system as their objective (stealing credit card information)