Clearswift and Cyber Kill Chain

The Cyber Kill Chain is a framework developed by Lockheed Martin for the identification and prevention of cyberattack activity. The model identifies what adversaries must complete in order to achieve their objective. Interrupt the chain, defeat the attack.

Cyber Kill Chain Illustration1 Cyber Kill Chain Illustration 2

Reconnaissance

Installation

Research, identification and selection of targets, looking for publically available information on the Internet and specific technologies, with the objective to identify vulnerabilities that can be exploited. Once executed, the payload installs a backdoor on the victim’s system allowing persistent access to the attacker. Depending on the profile of the attack, the exfiltration of information (or encryption) can take from days to months so as not to arouse suspicion.

Weaponization

Command and Control

The attacker uses an exploit and creates a malicious payload. Executable files and client application data files such as Adobe Portable Document Format (PDF) or Microsoft Office documents can serve as the weaponized deliverables. The attacker creates a command and control backdoor communication channel. This ensures the victim’s servers’ can communicate with the attackers, enabling a persistent “hands on keyboard access” to the target network and assets.

Delivery

Actions on Objectives

The attacker delivers the malicious payload to the victim by e-mail, web, USB sticks, QR-Code, or other means. It can be the actual file, or a link which the user then clicks on. The attacker takes action to achieve their goals, such as data exfiltration, data destruction, and encryption for ransom or infection of another target system or user.

Exploitation

 
Once delivered, the malicious payload is triggered either through a stealth install or through social engineering techniques and interaction with the victim. Exploits, if used, target vulnerable applications or systems within the victim’s network.  

 

Breaking the Cyber Kill Chain with Clearswift

Breaking the cyber kill chain at any point will defeat the attack. Multi-layer defense should be in place to do this. For most organizations this is from the delivery stage onwards. Clearswift Secure Gateways do just this.

Clearswift Secure Email Gateway (SEG) / Clearswift Secure Exchange Gateway (SXG) 
Clearswift Secure ICAP Gateway (SIG) / Clearswift Secure Web Gateway (SWG)

  • Block Delivery phase using Advanced Threat Protection features, sanitization of active content and dual anti-malware engines
  • Block data evasion through HTTP/HTTPS traffic as the result of Actions on Objectives phase using Deep Content Inspection features