Site icon Bizety: Research & Consulting

Kill Chain Executed in Target Attack

The US Senate has just published a full analysis on the Target breach. The report analyzes the seven steps the attackers took to compromise Target’s security defense system. When it comes to cyber attacks, the attacker must go through a series of steps in order to compromise any system. This attack method is called an “Intrusion Kill Chain” that is based on a framework developed by Lockheed Martin back in 2011. In summary, the report outlines the human failures that occurred at the various stages of the attack. Below are the key takeaways.

Target Mishaps
 Key Takeaways of the Report
 Kill Chain Executed in Target Attack
  1. Recon: Attacker secretly gather information on the target
  2. Weaponization: Attacker prepares attack payload (PDF, Word doc, etc.) to deliver to victim
  3. Delivery: Attacker delivers payload to victim
  4. Exploitation: Attacker payload deployed in the victim’s network
  5. Installation: Attacker establishes foothold in victim network
  6. Command & Control: Attacker has “Hands on the Keyboard” remote access  to victims network
  7. Actions on Objectives: Attacker acts on accomplished data exfiltration

 For full 18 page report click here.

Exit mobile version