The Kill Chain; how to take a military concept and put it through the wringer:
Chris Roberts
Strategist, Researcher, Hacker, Advisor, CISO/vCISO, Architect, and writer (Sidragon at Substack) Please remember Rule No. 1 "Do not act incautiously when confronting small bald wrinkly smiling men.
In the military there are a couple of rules:
- If you can be seen you can be shot, if you can be shot you can be killed…therefore don’t be seen.
- Anything worth shooting is worth shooting twice, ammo is cheap
- Have a backup plan because the first plan won’t work
- Be professional, be polite and have a plan to kill everyone
Also, in the military there’s a simple concept:
- Identify it
- Go see it
- Analyze it
- Blow it up
That’s their kill chain; it’s simple, effective (mostly) and takes minimal effort to implement; however we’ve taken a simple concept and tried to modify it to fit it in our ever-shifting environments…
The current “version” that the IT Security community seems to be using is this:
- Reconnaissance
- Weaponize
- Deliver
- Exploit
- Install
- C&C
- Attack
So, taking these 7 stages they can be broken into two broad and distinct areas, those on the outside and those on the inside.
- OUTSIDE: Recon, Weaponize, “some” of deliver, C&C
- INSIDE: Recon, “some” of deliver, exploit, install and attack.
Arguably this whole model really doesn’t account for anything more than promoting a focus on perimeter based security solutions which only tells ? the story that’s necessary to actually stand a chance of winning (or even keeping up) against the attackers.
Why can’t we go back to basics?
- Threat identification
- Threat analysis (and classification)
- Threat mitigation
- Threat remediation
Simple, effective and a LOT easier to use and communicate AND a lot simpler to actually articulate AND follows the military version a lot closer and with less mess. (Hack back however pleasurable is sometimes frowned upon, so the “blow it up” has to be modified to remediation, however I didn’t say HOW you get to remediate, but for legal reasons…)
The problem with the current version of 7 levels is that it’s missing multiple facets of attack vectors, it’s not allowing for growth or tactical changes that we should expect to be made over the coming years. This again is where the military version has us beaten… it’s able to adapt, it’s able to move into the new tactical era and it’s simple enough that it will fit inside the heads of the leaders just as readily as those who’s job it is to execute upon it.
The idea that we still want to focus on the technology stack solely is also outmoded, we talk more and more of the path of least resistance that the attackers take…and more often than not that path is human initiated, and not always in a manner that is readily detected by endpoint protection or customized detection models, once again OSINT comes into play, especially when paired up with deep, dark and other resources where intelligence can be gathered and analyzed, patterns understood, and human mitigation actually be accomplished.
Breaking the basics down: (and focusing for this moment on No1. Identification)
- Identification, this can take place in MULTIPLE places and be correlated across internal, external AND other stores of intelligence. Taking endpoints, perimeter and external reference systems as a core analysis of identifying threats and then applying OSINT gathered from open, dark, deep and other sources and then cross referencing that with beacons elsewhere in the same vertical markets will give a much deeper and broader set of key identifiers to allow accurate identification of threats.
- Identification using trending indicators that are referenced within industry and across OSINT platforms will also provide predictive analytics and behavioral pattern options that can be leverages to provide actionable intelligence in identifying future threat vectors.
- Identification of groups, individuals, countries and other entities (competitive intelligence attacks) can all be monitored, analyzed and tracked through correlating OSINT gathered on the dark, deep and other electronic sources (SIGINT etc.)
- Identification of the hosting sites, systems, locations and other jump on/off/in/out points are readily obtained through analyzing the intelligence gathered from endpoints, perimeter systems, TOR and Proxy nodes that are in the collective as well as referencing that against the actionable intelligence gathered from the darker reaches of the Internet.
- Identifying non-technical attack vectors (humans) and their weaknesses will be possible using a less complex, more OSINT focused set of technologies. Your endpoint solution isn’t going to be able to monitor and manage the data sets beyond the focus perimeter…however the OSINT platform can monitor and report back across all available public platforms. (You can’t monitor her car or her fridge, but I can tell you when her car goes in for service and the technician takes all her data from the Infotainment systems and posts her pictures on YouTube…and I can tell you when the fridge’s software is exploitable which means her internal home network that contains a backup of her work and your IP is vulnerable)
There’s more, but you get the idea, we need to both simplify the solution and be able to take new technologies and implement them into the lifecycle without having to re-write the rules.
I do believe there is a place for a technology kill chain; I do believe it needs to be simplified into something readily actionable that has the chance to grow with our industry. I also believe that we need to find a home for OSINT in all its facets. We HAVE the capability to accurately predict the outcome of actions that we perform inside our organizations, we have the capability to predict the attacks that will be used against us to a high degree of certainty…when will we start to actually USE that technology to our advantage?
Amplio.co | Simply Amplifying Security
9 年Aren't you mixing the concepts of offense and defense here? Your four steps are there to guide your own planning, and resembles the CERT/CC, ENISA, NIST and PICERL CND life cycle descriptions. The "kill chain" is there to help understand your adversarys planning. Which roughly belongs in your defensive step 2. By the way, the published LM cyber kill chain is very malware and phishing oriented. I like to use this setup for it: Simplified: 1. Preparation. 2. Intrusion. 3. Execusion. Extended: 1. Preparation. 2. Staging. 3. Attack. 4. Breach. 5. Foothold. 6. Actions on objectives. And I really do not agree that the kill chain as a model promotes a focus on perimiter based security solutions. Actually, I don't think it promote any security solutions. It's an intrusion analysis taxonomy, not a CND planning guideline (like those life cycle descriptions a referenced in the beginning). So unless I totally misunderstood you, I disagree with your position on this.
Information Security Executive & Strategist
9 年I agree, and interpret the overall message as "simplify". When we get into so much new and ever-changing technology, the expansion of our traditional internal vs. external borders, regulations, etc. it is easy to miss the big picture and end up chasing too many rabbit trails. It's one reason why I actually like governance within Info Assurance (am I the only one that thinks 'Cyber Security' is a limiting label?). It can sometimes force you to back up and look at the big picture again as it relates to who, why, when, then how, and the hope that you can then have something to measure against.
Don't play the Game better. Play a better Game.
9 年Only 40 years behind John Boyd.
I like it. Your environment necessitates a back to basics approach. There are too many ingress and egress points to think in terms of inside versus outside. You are no longer working behind the wire, instead you are on long-range reconnaissance with potential assets and attackers everywhere. Gear up and be in constant threat identification mode.
Chief Scientist at Semperis
9 年I agree that Lockheed Martin kill chain is not very practical. What you’re proposing though has less steps, but each step seems to be a lot more complex. Just looking at the Identification: it crosses so many boundaries that I doubt anyone but Big Brother has the reach to actually implement something like that. Cross-domain correlation of threat intel is a good thing and can and should be done, but tracking both external actors and high-risk insiders or correlating endpoint behavior with dark web activities crosses the enterprise perimeter, and that’s where things get complicated. Call me pessimist, but I prefer more pragmatic, less noisy threat-specific kill chains that are properly scoped between “inside” and “outside”, and that I can stitch on the perimeter to amplify their predictive capabilities. Being able to connect increased activity of a phishing botnet on the outside with a known pattern of malware beaconing on the inside might just be enough of a boost to detect a nascent infection and prevent a breach.