01
Pre-compromise focuses on stealthiness, prospecting value, and external exposure.
Framework View
See High Value Targets through pre-compromise, compromise, and post-compromise phases to align defenses to attacker progression.
01
Pre-compromise focuses on stealthiness, prospecting value, and external exposure.
02
Compromise attributes show where secrets, communications, and defensive visibility can be impaired.
03
Post-compromise attributes track widespread presence, restoration inhibition, and weaponized operational control.
To prevent an extreme cyber incident at a strategic level, organizations need to adopt High Value Target specific comprehensive security measures across all stages of the cyber kill chain to stay ahead of potential extreme but plausible attacks and maintain a resilient posture.
Our view of the three Unified Kill Chain phases is centered around the asset's attributes that the adversaries seek to leverage to advance their mission.
In this phase, the attacker conducts extensive research to identify potential High Value Targets that allow them to understand the organization's infrastructure and systems that could be abused to maximize an organization-wide, extreme but plausible cyber-attack. As the objective is to prepare a well-informed attack strategy, the attributes of assets being sought after by the adversary serves the purposes of reconnaissance, discovery and even defense evasion.
Once the adversary has identified potential High Value Target chokepoints, they move on to the compromise phase. In this stage, the focus shifts towards exploiting configuration weaknesses or vulnerabilities and gaining unauthorized access to the target organization's systems that can maximize the attacker ROI. The most wanted attributes during this phase include those that allow exploitation, malicious code deployment or lateral movement and escalation of privilege.
In this final phase, the attacker aims to achieve their strategic objectives, which could include data exfiltration and system destruction or abuse. Adversaries seek to accomplish their overall mission, which should be expected to be severe and leading to long-term reputational damage. The attributes of assets that allow to multiply the attacker’s benefits in this phase are those related to stealing sensitive data, persistence and tampering on global scale.