Marks & Spencer confirms customer data stolen in cyberattack
M&S said that some customer data — but not payment card details or passwords — had been breached in a recent cyberattack.
The Record from Recorded Future News – Read More
M&S said that some customer data — but not payment card details or passwords — had been breached in a recent cyberattack.
The Record from Recorded Future News – Read More
The latest wave of activity in Ukraine suggests that Pyongyang is seeking to “better understand the appetite to continue fighting against the Russian invasion” and “the medium-term outlook of the conflict,” according to the latest report by cybersecurity firm Proofpoint.
The Record from Recorded Future News – Read More
A Turkey-affiliated espionage group has exploited a zero-day vulnerability in Output Messenger since April 2024.
The post Output Messenger Zero-Day Exploited by Turkish Hackers for Iraq Spying appeared first on SecurityWeek.
SecurityWeek – Read More
Orca positioned the deal as an expansion of its capabilities into the realm of AI-based autonomous remediation and prevention.
The post Orca Snaps Up Opus in Cloud Security Automation Push appeared first on SecurityWeek.
SecurityWeek – Read More
A 45-year-old individual was arrested in Moldova for his suspected involvement in DoppelPaymer ransomware attacks.
The post Suspected DoppelPaymer Ransomware Group Member Arrested appeared first on SecurityWeek.
SecurityWeek – Read More

The term “initial access” refers to the initial foothold or entry point that threat actors establish within a target network or system. It is the stage in the cyber attack kill chain in which an attacker has the opportunity to begin working towards their longer-term mission objectives, whatever those may be. Initial access can be gained through a variety of methods, including exploitation of software or hardware vulnerabilities, employment of social engineering tactics to obtain credentials, or delivery of malicious components that, if opened or executed by victims, grant this ability automatically.
In recent years, we have observed the emergence of threat actors who specialize in gaining initial access to computer networks. These threat actors, also referred to as initial access brokers (IABs), traditionally monetize the access they gain by selling it to other threat actors, who may then utilize the provided access for espionage or financial purposes. In short, IABs play a pivotal role in the overall cybercrime ecosystem, as they enable other malicious actors to quickly and efficiently execute their attacks without requiring them to obtain access themselves.
This distinction between IABs and the threat actors they may transfer network/system access to is extremely important. It directly impacts organizational risk assessment and threat modeling activities, as well as how incident response may be conducted if an intrusion occurs. It also complicates intrusion analysis, as it is often difficult to determine when a potential “handoff” of access occurs between threat actors when analyzing log data collected during an active intrusion.
Additionally, the term “initial access” is sometimes misused to refer to infrastructure leveraged by threat actors, such as operational relay box (ORB) networks and those offered as Infrastructure as a Service (IaaS). In this context, “initial access” specifically refers to access to the target’s network, not a network leveraged by threat actors merely as infrastructure for their campaign.
One of the primary challenges in modern intrusion analysis is the ability to correctly identify whether an observed adversary is an IAB. This distinction is operationally critical: when the actor responsible for the intrusion focuses solely on initial access, defenders must anticipate and prepare for the likely involvement of secondary actors who may carry out the core objectives of the attack. However, distinguishing IABs from full-spectrum threat actors has become increasingly difficult, as many initial access operations now exhibit the same level of sophistication, targeting and tooling as those conducted by targeted attackers or advanced persistent threats (APT). This overlap in tradecraft significantly complicates attribution, especially in cases where multiple actors interact across different phases of the intrusion.
Another challenge stems from the fact that compartmentalization is no longer exclusive to financially-motivated cybercriminals. In recent years, state-sponsored threat actors have adopted similar operational models, performing initial access and subsequently handing off to other state-sponsored groups within the same state apparatus (e.g., between military or intelligence units). In some cases, state-sponsored initial access groups even transfer access to financially-motivated ransomware operators. These handoffs may be strategic or opportunistic in nature, but they introduce a key problem for defenders: the appropriate preventative, detective and responsive strategies employed must consider not only the threat actor who obtains initial access, but also any other threat actors that may operate during later stages of an intrusion. Likewise, the hunting and containment strategies employed to defend against financially-motivated IABs may not be suitable against state-sponsored initial access groups, whose access operations are typically more stealthy, targeted, and persistent.
Given this evolution across the threat landscape, we argue that a more granular taxonomy of initial access groups is necessary. Specifically, differentiating initial access groups (IAGs) based on threat actor’s perceived motivation for obtaining initial access is essential for accurate actor profiling, campaign tracking, and threat modeling. This refined categorization enables defenders and analysts to better predict follow-on activity, align response strategies with threat actor intent, and improve long-term attribution and understanding of the threat landscape.
As previously mentioned, the concept of obtaining access to protected systems or networks and then transferring that access to third parties is not specific to either financially-motivated or state-sponsored/-aligned threat actors. In response to this shift, we propose expanding the definition of IABs to include several types of initial access groups (IAG) that reflect a broader range of threat actor motivations and affiliations (as not all the groups specialized in gaining initial access are “brokers”, we replace “broker” with “group”) . As such, we define an IAG not strictly by the technical stage of the intrusion in which they operate, but based on their primary operational intent: to obtain and then hand over access to another group. Although initial access groups primarily focus on gaining entry into target environments and may not be heavily involved in later operations within the kill chain, they might have the sophisticated skills necessary for lateral movement, privilege escalation, and other advanced techniques. Being classified as an initial access group does not imply a lack of sophistication in terms of their tactics, techniques and procedures (TTPs) and capabilities. It is also worth noting that while gaining initial access, many IAGs may also maintain persistence on the compromised host or network to ensure the access remains throughout the handover process.
The determination as to whether a threat actor should be considered an IAG is based on consistent observable behavioral patterns. If a group routinely hands over access, regardless of whether it also performs lateral movement, data staging, or limited post-compromise activity prior to the transfer of access, it should still be considered an IAG, as long as the end goal is delegation to another threat actor.
Rather than treating IAGs as a homogenous category, we further distinguish between actors based on their primary drivers and organizational alignment. Specifically, we introduce a new taxonomy comprising:
Financially-motivated initial access (FIA) groups are typified by their focus on compromising systems for financial gain, which is more aligned with the conventional definition of an IAB. Their main objective is the maximization of profits derived by monetizing the access they achieve. These groups may occasionally sell access to state-sponsored actors, either with or without full awareness of the buyer’s identity, but their sole driving force remains financial gain. The motivations behind their transactions are not influenced by political objectives or tasking, but rather by the potential for profit, making them distinct from state-sponsored initial access (SIA) or opportunistic initial access (OIA) groups. This singular focus on financial outcomes guides their operations, regardless of the end use of the access they provide.
ToyMaker, also known as UNC961, is one example of an FIA group. ToyMaker typically exploits known vulnerable internet-facing servers and has used custom implants such as LAGTOY to gain initial access to high-value targets, including critical infrastructure organizations. The group has been observed transferring access to multiple ransomware groups including Maze, Egregor and Cactus.
Another example is TA571, which is a threat actor that has been associated with the operation of spam botnets for malware distribution, as well as the use of the 404TDS which is sometimes incorporated into the spam emails. Prior reporting indicates that TA571 operates as an FIA group, and has been observed distributing a variety of malware families, including those associated with threat actors such as TA866/Asylum Ambuscade, a threat actor that has historically been associated with both financially-motivated and espionage operations. In addition, TA571 has been associated with the distribution of other malware families, including variants of IcedID, NetSupportRAT, DarkGate and others. In the context of the categorization described previously, we would characterize TA571 as an FIA group, as their primary motivation is likely financial in nature.
State-sponsored initial access (SIA) groups are typically embedded within a nation’s military cyber units, intelligence agencies, or state-affiliated contractors. These groups focus on gaining a foothold in high-value targets, often government, critical infrastructure or strategic industries, to help the state-sponsored groups achieve their broader operational goals. This type of handoff is often conducted for the purpose of providing isolation between the different phases of a typical attack kill chain. By insulating each phase from the others, the threat actor can lower the risk of exposure of stage-specific tooling and TTPs, making attribution of attacks significantly more difficult.
It’s important to note that for an actor to be classified as a SIA group, the focus should primarily be on securing initial access rather than executing the entire attack campaign. Even if an actor has the capability to complete the full attack kill chain, a SIA group’s defining characteristic is its regular practice of handing over initial access to affiliated groups. This deliberate handoff differentiates SIA groups from conventional APT groups, underscoring their specialized role within the broader context of state-sponsored cyber operations.
One example of an SIA group is ShroudedSnooper, also known as UNC1860, Scarred Manticore and Storm-0861. ShroudedSnooper is widely considered as an IAG and attributed to Iran by industry vendors. Talos assesses with high confidence that ShroudedSnooper is an SIA group. ShroudedSnooper is associated with the Iranian government, mainly tasked with gaining initial access and then deploying webshells and passive implants such as HTTPSnoop, PipeSnoop and more. These implants are later instrumented to transfer access to other threat groups working under the Iranian APT machinery. Once ShroudedSnooper has established persistent access, subsequent threat actors (for example, Storm-0842) may use the access for data exfiltration and espionage, financial gain via ransomware deployment or disrupting victim operations by deploying wipers.
Opportunistic initial access (OIA) groups often straddle the line between the two previously described categories. OIA groups may be financially-motivated and possess the means to monetize their access by selling it to either financially-motivated or state-sponsored threat actors. They may also operate in different capacities at different times. For example, actors like government contractors may operate as an SIA group as part of their normal means of employment while operating as an FIA group to generate additional income. Once the state-sponsored actor’s operation has been conducted, the initial access may then be re-sold under the pretext of “financial gain” while providing plausible deniability and forensic confusion once the access is reused.
One example of an OIA group is UNC5174. The persona tied to this group, uetus, is suspected to be a former member of Chinese hacktivist groups 騰蛇 (Teng Snake), aka 晓骑营 (Xiaoqiying)/Genesis Day), who research suggests is an IAB for nation state groups. The Teng Snake team was reported selling Personally Identifiable Information (PII) and initial access to the South Korean health department in an underground forum in 2022. In 2023, UNC5174 obtained access to entities that are deemed to be of high interest to espionage groups, primarily targeting organizations in North America, the U.K., Australia and Southeast Asia. Initial access is obtained by exploiting known vulnerabilities in services exposed to the internet and the subsequent deployment of bespoke or open-sourced tooling to maintain persistent access to victims. This access is subsequently monetized by UNC5174 and transferred to state-sponsored groups who then undertake a more comprehensive set of tasks to conduct long-term espionage operations within the victim enterprise.
While many IAG characteristics (motivation, objectives, etc.) differ significantly when comparing FIA and SIA groups, many of the TTPs, toolsets and infrastructure employed by FIA and SIA groups are often very similar, making differentiation challenging. For instance, both FIA and SIA groups commonly utilize spear-phishing emails, exploitation of known vulnerabilities and proprietary malware. Despite these similarities, several distinct characteristics observed during our investigations help indicate the potential motivation behind attacks. While these characteristics alone may not definitively confirm motivation, they serve as valuable indicators.
SIA groups primarily focus on targets aligned with a nation-state’s strategic interests (e.g. government, critical infrastructure or industries of strategic importance to the tasking organization). Even if SIA groups eventually transfer access to financially-motivated actors, their main objective remains fulfilling the nation-state’s geopolitical goals.
Although FIA groups can also target entities of interest to nation-states, this is typically coincidental, as they are often more opportunistic and generally have a broader targeting scope with potentially higher volume operations.
FIA groups typically prioritize rapid credential exfiltration rather than spending significant time and effort locating, staging, and exfiltrating strategically important data from compromised environments. From the perspective of the FIA group, authentication data like credentials is one of the primary ways that access can be monetized. For example, during the initial phase of the ToyMaker campaign, despite targeting high-value entities, we observed no attempts to locate data of significant importance, and no data other than credentials was exfiltrated from the environment, supporting the hypothesis that the actor was likely financially-motivated. On the other hand, SIA groups that collaborate with APT groups might also perform data exfiltration after gaining initial access. For example, ShroudedSnooper (Storm-0861) was reported to have exfiltrated mail from the victim’s network after gaining initial access.
FIA groups often sell access through dark web forums or underground marketplaces. Monitoring these platforms can aid in identifying compromised organizations and preventing subsequent attacks. On the other hand, SIA groups transfer access discreetly, usually without public advertisement and often within controlled channels or partnerships.
When collaborating with APT groups, SIA actors typically exhibit a more structured and consistent handover process due to repeated collaboration with the same or similar threat actors. For example, in ShroudedSnooper’s operation, access is often provided to the recipient group via a webshell and is typically leveraged by the recipient (Storm-0842 in many cases) right after the webshell is dropped on the system. This smoother coordination results in more predictable handover patterns based on the toolset and behaviors previously observed since they are often repeated across campaigns as future collaboration between threat actors occurs.
For FIA groups, although the threat actors usually try to sell the access quickly, the handover timing (the time when the buyer starts using the access) can vary significantly due to market transaction processes and the operational timeline of the buyer. However, FIA groups closely aligned with dedicated ransomware gangs may exhibit faster and more predictable handovers as they are accustomed to working with the same threat actor repeatedly over time.
FIA groups generally exhibit shorter dwell times because they aim to monetize their initial access quickly to maintain its value. An SIA group may maintain longer dwell time and prioritize stealth until tasked to transfer access. This differentiates SIA groups from FIA groups because in most cases the access achieved is used operationally rather than monetized quickly. Operational cadence may contribute to longer periods between when the access was gained and when it is operationalized. For example, in the ShroudedSnooper campaign that reportedly targeted victims in Israel, the handover for one victim occurred over a year after initial access was gained.
SIA groups typically operate within closed ecosystems or in close coordination with state structures, and are often collaborating with the same APT groups consistently over time. In contrast, FIA groups may monetize initial access by advertising on darknet markets and work with various types of threat actors, including ransomware groups, data theft criminals, malware operators and so on. Analysis of persistent relationships between IAGs and the entities they repeatedly transfer access to may help an analyst determine whether the IAG is FIA or SIA. Threat actor involvement in intrusions where handover has occurred with both financially- and state-sponsored threat actors may indicate an OIA operation.
No redefinition would be complete without a look into the way these IAGs may interact with each other. In order to do so, we have mapped these interactions in two dimensions.
Level of collaboration: Indicates how directly the IAG coordinates or hands off access to the counterpart group (the group receiving access to the compromised environment). Some coordination might be transient while others are tightly integrated, repeated collaborations between threat actors.
Level of knowledge: This dimension illustrates the level of knowledge the IAG group has about the identity or role of the recipient group (or vice versa). This ranges from anonymous or transactional exchanges to full organizational or operational awareness.
The quadrant below contains examples that illustrate such interactions, with examples of IAGs mapped according to their category. Each group positioning is explained in the sections ahead.
Q1 (High Collaboration, Low Knowledge): In the first quadrant, we can find IAGs that work closely with clients in tasking and targeting but without necessarily full knowledge of their recipient’s identity or motivations. For example, a state-sponsored group might regularly acquire access from TA571 for access to a specific victim without revealing its own true identity to them.
Q2 (High Collaboration, High Knowledge): IAGs inside a larger organization may be tasked with obtaining access to a specific target and then handing the access to another group inside the same organization. These actors operate in tightly integrated ecosystems, often within state-sponsored command structures (SIA). Here, IAGs coordinate directly with known entities, such as intelligence units, under clear tasking or operational alignment.
For example, an SIA like ShroudedSnooper operates under the directive of the state, and access obtained by ShroudedSnooper is typically handed over to another state-sponsored group.
Q3 (Low Collaboration, Low Knowledge): These actors operate independently and rarely interact with or have knowledge of the entities to which they are transferring access. When handoffs do occur, they tend to be infrequent and opportunistic, often through anonymous channels. FIA groups often fall into this category.
Q4 (Low Collaboration, High Knowledge): This is where an IAG passes on access to other groups without intentional collaboration but with knowledge of who they are supplying the access to. For example, an espionage group may transfer access to a ransomware group in the hope that this group’s activities hinder forensic reconstruction and analysis of earlier malicious activities.
Another example might be an FIA group partnering with a ransomware group. While the FIA group might be aware of the identity of the ransomware group, they might have limited collaboration. This is what has been observed in previous ToyMaker intrusion activity, where they only transfer access to ransomware groups, but we have not observed any evidence of direct interactions on compromised hosts.
Depending on the type of initial access, the role an IAB plays in an attack, the TTPs used to obtain initial access, the activities conducted directly following initial access, and the timeframe and means by which handoff occurs may differ drastically. As such, it is important to understand both the types of IAGs and the threat actors they maintain business relationships with. When analyzing intrusion activity, one should understand these business relationships, while also differentiating between the threat actor(s) who gained initial access and the threat actor(s) operating at later stages of the intrusion, particularly if some evidence of handoff is observed.
By distinguishing between FIA, SIA and OIA groups, we offer a clearer definition for understanding how these groups operate and interact within the broader threat landscape. In the next blog, we will demonstrate how Talos adjusts diamond models used in intrusion analysis and threat modeling to effectively incorporate the nuances of compartmentalized attack, allowing for more precise threat analysis and improved attribution of complex intrusion campaigns.
Cisco Talos Blog – Read More

The convergence of multiple threat actors operating within the same overall intrusion creates additional layers of obfuscation, making it difficult to differentiate the activities of one threat actor from another, or to identify when access has been handed off from one to the next. At each point where outsourcing occurs or access is handed off, the Diamond Model of the adversary changes. Likewise, the ability to leverage the output of kill chain analysis for the purpose of pivoting, clustering, and attribution becomes significantly more difficult as analysts may be forced to operate under the assumption that multiple actors are involved unless they can prove otherwise, where historically the opposite assumption was likely made.
Additionally, misattributing attacks due to tactics, techniques and procedures (TTPs) present in earlier stages of the intrusion may impact the way in which incident response or investigative activities are conducted post-compromise. They may also create uncertainty around the motivation(s) behind an attack or why an organization is being targeted in some cases.
Analysis processes and analytical models must be updated to reflect these new changes in the way that adversaries conduct intrusions, as existing methodologies often create more confusion than clarity.
NIST SP 800-53 (Rev. 5) defines threat modeling as “a form of risk assessment that models aspects of the attack and defense sides of a logical entity, such as a piece of data, an application, a host, a system, or an environment.”
For many organizations, this involves evaluating their preventative, detective and corrective security controls from an adversarial perspective to identify deficiencies in their ability to prevent, detect or respond to threats based on specific tactics, techniques, and procedures (TTPs). For example, adversary emulation simulates an attack scenario and demonstrates how an organization could reasonably expect their security program to respond if a specific threat is encountered.
Intrusion analysis is the process of analyzing computer intrusion activity. This involves reconstructing intrusion attack timelines, analyzing forensic artifacts and identifying the scope and impact of activity. Intrusion analysis typically results in a better understanding of an attack or adversary, and may also result in the development of a model to reflect what is known about the threat. This model can then be used to support more effective detection content development and threat modeling activities in the future. The symbiotic relationship between intrusion analysis and threat modeling allows organizations to effectively incorporate new knowledge and information about threats and threat actors into their security programs to ensure continued effectiveness.
Over the past several years, different analytical models have been developed to assist with intrusion analysis and threat modeling that provide logical ways to organize contextual details about threats and threat actors so that they can be communicated and incorporated more effectively. Two of the most popular models are the Diamond Model and the Kill Chain Model.
The Kill Chain Model shown above is typically used to break an intrusion down into distinct stages/phases so that the attack can be reconstructed and analyzed. This allows analysts to build a realistic model that reflects the TTPs and other characteristics present during the intrusion. This information can then be shared so that other organizations can determine whether their own security controls would be effective at combatting the same or similar intrusion(s) or whether they have encountered the same threat in the past.
The Diamond Model, shown above, is commonly used across the industry for building a profile of a specific threat or threat actor. This model is developed by populating each quadrant based on information about an adversary’s characteristics, capabilities, infrastructure tendencies and typical targeting/victimology. A fully populated diamond model creates an extensive profile of a given threat or threat actor.
It is important to note that an analysis may incorporate both (or other) models, and they are not mutually exclusive. There are also several other modeling frameworks that exist for similar purposes that are also often used in concert, such as the MITRE ATT&CK and D3FEND frameworks. For example, in some cases the information used to populate the Diamond Model may be the result of kill chain analyses of multiple intrusions over time that are ultimately attributed to the same threat actor(s). By leveraging the output of multiple kill chain analyses, one can build a more comprehensive model that reflects changes to characteristics or TTPs associated with a threat actor being tracked over time as well as improve overall understanding of the nature of a given threat.
One of the key strengths of the Diamond Model is its concept of “centered approaches” for analytic pivoting — including victim-, capability-, infrastructure- and adversary-centered methods of investigation. These approaches enable analysts to uncover new malicious activities and reveal how each facet of an intrusion across the Diamond’s four dimensions intersects with others. For instance, in the paper’s infrastructure-centered example, an analyst might begin with a single IP address seen during an intrusion, then pivot to the domain it resolves to, scrutinize WHOIS registration details, and discover additional domains or IPs registered by the same entity. Further examination may reveal malware connected to or distributed by those domains. In such scenarios, the Diamond Model’s systematic method of traversing from one node to another can rapidly expose an interconnected web of adversaries, capabilities, and victims.
However, the original centered approach can introduce errors when dealing with a “compartmentalized” attack kill chain involving multiple distinct threat actors. In many cases, adversaries are now leveraging various relationships simultaneously while working towards their longer term mission objectives. This could include the outsourcing of tooling development, rental of infrastructure services for distribution or command and control (C2), or access-sharing agreements leveraged post-compromise to facilitate hand-off once initial access (IA), persistence or privilege escalation has been achieved. This compartmentalization has complicated many analytical activities including attribution, threat modeling, and intrusion analysis. Likewise, the modeling methodologies that were initially developed to combat intrusion operations in previous years no longer accurately reflect today’s threat landscape.
To illustrate the complexity of compartmentalization, let’s consider a hypothetical scenario that closely mirrors real-world events. In this scenario, four distinct threat actor groups are involved:
In this scenario, a financially-motivated threat actor (Actor A) who is seeking to infect victims with information-stealing malware to steal victims’ sensitive information may outsource the development of their malware to Actor B. They may engage the developer directly or purchase it from a storefront. Likewise, the distribution of the malware itself is conducted by outsourcing it to Actor C, who operates a spam botnet or traffic distribution service (TDS) that is offered for rent for a usage-based fee. Once Actor C has successfully achieved code execution on a system, they may infect it with the malware they initially received from Actor A, who is charged “per-install.”
Likewise, once Actor A has successfully performed enumeration of the environment, they identify that they were successful in gaining access to a high value target. Rather than simply focus on monetizing information-stealing malware logs, they choose to monetize their access to the exfiltrated data by selling it to Actor D, who then leverages that access to deploy ransomware and extort the victim.
In this hypothetical scenario, Actor C, who would be classified as a financially-motivated initial access (FIA) broker, may also be distributing multiple malware families at any given time and leverage traffic filtering to manage final payload delivery. They may even host these payloads on the same infrastructure. The nature of the business relationships described in this scenario are shown below.
While this scenario covers a single attack, it highlights a situation where applying the traditional analytical models poses several challenges. For example, consider the infrastructure used by Actor C, the TDS provider. The infrastructure that facilitates malware distribution is not solely dedicated to Actor A’s operations. This means that other malware found by pivoting the distribution infrastructure should not be considered as capabilities associated with Actor A. In addition, the malware’s targets are highly associated with the Actor C’s targeted network and should not be strongly considered as the motivation for the victimology of Actor A. In this compartmentalized scenario, the interconnected web of adversaries, capabilities and victims exposed by pivoting with the Diamond Model should not be associated with each other, as they originate from different threat actors and should not be modeled as part of a single threat actor profile.
In even more complex cases, a threat actor may choose to engage multiple distributors simultaneously or work with different distributors on a weekly basis depending on real-time pricing and service availability. A threat actor conducting ransomware operations may choose to procure access from several initial access brokers (IABs), each with their own characteristics, capabilities and motivations. Likewise, several otherwise unrelated threat actors operating in different capacities throughout the kill chain present complications when attempting to take the result of the analysis and incorporate it into existing attribution data or when attempting to identify overlaps with other clusters of malicious activity. Modeling the IABs themselves also presents complications, as their characteristics and TTPs are often encountered in attacks where they may have only been operating within a subset of the overall phases of the intrusion.
State-sponsored or -aligned threat actors’ campaigns have been documented using anonymization networks or residential proxies to hide their activities. This will create the same kind of activity overlap described by the usage of a TDS.
To extend the Diamond Model to include the complexities posed by compartmentalized attacks, we propose an extension to the original Diamond Model by integrating a “Relationship Layer.” This additional layer is designed to contextualize the interactions between the four features (adversary, infrastructure, capability and victim) of individual diamonds representing distinct threat actors. By incorporating this layer, threat analysts can construct a nuanced understanding of compartmentalized contexts.
The Relationship Layer allows for the articulation of common relational dynamics such as “purchased from” to indicate a transactional association, “handover from” to reflect a transfer of operational control or resources, and “leaked from” to convey the use of leaked tools. Additionally, it describes the connections between adversarial groups, encompassing a variety of interactions such as “commercial relationship,” “partnership agreements,” “subcontracting arrangements,” “shared operational goals,” and more.
The integration of the Relationship Layer enables analysts to contextualize the interactions within the Diamond Model’s four features, thereby enhancing their ability to perform logical pivoting and accurate attribution. This refinement offers a more sophisticated framework for analyzing modern, compartmentalized cyberthreats, providing a clearer representation of the complex web of relationships that characterize these operations.
Let’s look at the scenario involving Actors A through D again. Figure 4 shows how we can use the extended Diamond Model to describe the relationships between entities involved in the intrusion activity:
Each of the actors, A through D, possesses their own Diamond Model, reflecting their distinct roles as adversaries with unique capabilities, victims and infrastructures. We have extended each Diamond Model by integrating an additional Relationship Layer to illustrate the contextual relationships between these features. For instance, the infrastructure used by Actor A for Traffic Distribution Services (TDS) is linked to Actor C’s infrastructure through a “purchased from” relationship. Consequently, when performing analytical pivoting, analysts should account for this relationship and not attribute all infostealers distributed via the TDS infrastructure solely to Actor A’s capabilities. Similarly, the victims of those infostealers should not be automatically classified as Actor A’s victims.
Another illustrative case involves the relationship between the victims of Actor A and Actor D. Actor D obtained initial access through a transaction with Actor A, denoted by the “purchased from” relationship within the Relationship Layer. This relationship offers analysts crucial context, allowing them to avoid attributing the tools used in the initial access phase to Actor D’s capabilities.
The Relationship Layer also elucidates the connections between adversaries. On the graph, we denote these inter-adversary connections as “commercial relationships,” providing additional context that aids in actor profiling. This extension understanding allows analysts to discern the nature of interactions between threat actors, facilitating more accurate and insightful profiling efforts.
The Cyber Kill Chain framework serves as a structured approach to analyzing cyberattacks, enabling security professionals to break down intrusions into discrete, sequential stages — from initial reconnaissance to actions on objectives. By organizing attacks in this manner, analysts can pinpoint attacker behaviors, anticipate adversary actions and develop targeted mitigation strategies, significantly enhancing overall threat intelligence.
Integrating the extended Diamond Model into the Cyber Kill Chain framework offers a more comprehensive view of compartmentalized campaigns by illustrating how each adversary contributes to different stages of an attack. This combined perspective enhances understanding by mapping out the intricate web of relationships among multiple threat actors, thereby providing a clearer picture of how resources, capabilities and infrastructure are shared or transferred throughout an attack’s lifecycle. Figure 5 illustrates the integration of the extended Diamond Model with the Cyber Kill Chain using the Actor A–D example.
The example above demonstrates the distinct roles that each adversary assumes at various stages of the kill chain in a hypothetical campaign. In this scenario, the victim is initially compromised by an infostealer, which Actor A acquired from Actor B, and subsequently faces a ransomware attack orchestrated by Actor D. To further enrich the analysis, we highlight the “handover” relationship between Actor C and Actor A, emphasizing its significance as both actors’ activities manifest within the targeted environment. This approach provides a more comprehensive view of the attack flow, allowing for a deeper understanding of how adversarial interactions and transitions unfold throughout the campaign.
This enriched view not only clarifies attacker tradecraft but also bolsters actor profiling and attribution efforts. By aligning specific tactics and resources with the threat groups deploying them, analysts can more accurately trace operations back to their origins. This approach also provides insights into adversary motivations, allowing defenders to tailor their response strategies effectively. For instance, understanding that an IAB is financially motivated might suggest a lower immediate threat to certain targets, while recognizing that access has been sold to a state-sponsored actor would escalate the priority of the threat response.
Identifying compartmentalization within the scope of an intrusion typically involves trying to determine where positive control is transferred between adversaries either pre- or post-compromise. It is essential to identify compartmentalization as this will significantly impact the overall understanding of the adversar(ies) and the capabilities available to them. Indicators of collaboration among distinct threat actors can vary significantly depending on the context and the phase of activity, and these can be categorized based on whether the actions occur before or after the compromise of a system or environment. It is important to note that while there are several examples listed in the following sections, compartmentalization can and does look different across intrusions and these are by no means comprehensive. Likewise, while the below elements are useful indicators that an analyst should investigate possible transfer of access, they are not necessarily indicative that a handoff has occurred. As more of these elements are encountered and evidence collected, an analyst may be able to strengthen their assessment that compartmentalization has occurred.
In the early stages of an intrusion, compartmentalization can often be identified by observing how tooling has been sourced, how malicious content is being delivered to potential victims and the initial/early execution flow of malicious components in the case that code execution has been achieved.
This stage may also be completely independent. In situations where a state-sponsored group is tasked with espionage operation, it may pass on the access to a ransomware group, making the state-sponsored group an IAG. It is not guaranteed that the ransomware group is aware of the nature of its IAG, but just by doing its activity it will fulfill the state-sponsored group objective of making incident analysis and attribution complex.
Shared tooling
While many of the indicators associated with the use of tooling are often identified in later stages of an intrusion, we characterize this compartmentalization as occurring pre-compromise as development and procurement activities must generally occur before the campaign is launched. It is often useful to identify if the threat actor procured tooling from third parties. This may involve identifying key characteristics of the malicious components being analyzed and searching/monitoring hacking forums and darknet marketplaces (DNMs) to identify whether a seller is advertising a capability matching the one used in the intrusion. Likewise, malware that has historically been used by one threat actor may be transferred to another threat actor, either on purpose or inadvertently in the case of source code leaks. In either case, analysis of contextual information surrounding the use of the tooling can help analysts identify when the tooling doesn’t match the threat actors’ known TTPs.
Shared delivery infrastructure
In the case of email-based delivery, analysis of the infrastructure used to send malicious emails, the content of the message, and the infrastructure used for hosting and delivering payloads may indicate that delivery has been outsourced in some capacity. Likewise, in the case of malvertising campaigns, analysis of the ad campaigns, traffic distribution infrastructure and gating methodologies may suggest the same. In many cases the infrastructure used is often observed distributing multiple distinct, otherwise unrelated malware families over a short period of time as the threat actor operating the delivery infrastructure may conduct business with multiple entities at any point in time. Analyzing activity associated with this infrastructure before, during, and after the intrusion may inform the analysis of whether compartmentalization has occurred.
Shared droppers/downloaders
When analyzing an intrusion, there is often a point at which code execution is achieved. This may be the point in which a malicious script-based component is delivered and executed by a victim. In many cases, these function as downloaders and are solely responsible for retrieving or extracting and executing follow-on payloads that allow an adversary to expand their ability to operate in an environment. Analysis of the dropper/downloader mechanisms used may identify cases where the same mechanism is used to deliver unrelated threats over time, indicating that delivery may have been outsourced. We have categorized this activity as “pre-compromise” to further differentiate it from handoffs that may occur later in the intrusion, once persistence has been achieved, etc.
In addition to the aforementioned types of compartmentalization that often occur early in an intrusion, there is another set of handoffs that may occur once an adversary has achieved compromise. These are typically used to transfer control of access from one party to another and may be performed for a variety of purposes, as described in our previous blog. This activity can often be identified by analyzing handoff behaviors, the motivation of the threat actors involved, and monitoring for typical indicators that an IAB is involved.
Handoff behaviors
In some cases, information can be collected related to the amount of time that has occurred between an IAB obtaining access to the environment, and the beginning of follow-on activity. This may include an IAB gaining access, establishing persistence, collecting information from the environment and exfiltrating that to adversary C2. Following this initial activity, the infection may conduct very little malicious activity aside from periodic C2 polling occurring on the system for an extended period of time. After an extended period, additional malicious components may be delivered that establish new C2 connections and new activity may be observed. This type of pattern is indicative that a handoff of access may have occurred and should be investigated further. Similarly, analysis of the behaviors of the threat actor before and after this handoff may strengthen or weaken an assessment as completely different TTPs may be observed between the threat actors involved.
The race to domain admin
Another set of characteristics that may strengthen an assessment that handoff has occurred is by analyzing the series of actions taken once access has been gained. In the case of FIA, for instance, we often observe repeatable processes for attempting to gain domain administrator access as quickly as possible. This makes the access more lucrative for the IAG and more seamlessly enables the deployment of additional malware components, such as ransomware. An FIA group may quickly progress from initial access to domain administrator access in a short period of time with little to no effort spent on identifying high-value targets in the environment. Once domain administrator access has been gained the intrusion activity may stop while the threat actor attempts to monetize that access and facilitate handoff to the threat actor who ultimately purchases it. SIA groups on the other hand, may take a more steady and stealth oriented approach, to conduct reconnaissance and proliferate throughout the victim enterprise without being detected. In many instances an SIA group might conduct initial exfiltration of restricted data, before handing access off to the secondary threat actor.
Dark web tracking
Monitoring hacking forums and darknet marketplaces can be extremely valuable for identifying when an IAB is involved in an intrusion. Since FIA brokers are primarily focused on achieving the maximum profit as quickly as possible, they will often post advertisements for access to environments that they have achieved. In many cases these advertisements include generic information about the company/organization involved such as size (number of employees), rounded financial information based on publicly available sources such as quarterly filings, industry, etc. Locating advertisements that match the profile of the victim of an intrusion can strengthen an assessment that an IAB is involved and provide additional intelligence collection avenues that may be pursued further to collect additional information about the IAB involved, who they typically work with, and more.
C2 analysis
Analysis of C2 infrastructure involved throughout the intrusion presents another opportunity for identifying any handoffs that have occurred. As previously mentioned, in some cases the handoff is performed by delivering a new payload and establishing a new C2 connection with another threat actor’s infrastructure. In the case of frameworks, analysis of the server logs can provide additional information where the same server has been used to administer multiple victims. Administrative panels used to manage malware infections are often useful for informing analysis related to the nature of threat actors involved and the business models they are working within. Some admin panels may be explicitly built for the purpose of facilitating handoffs, RaaS and C2aaS platforms being examples of this.
During the course of performing threat hunting and incident response, Cisco Talos sometimes encounters scenarios where compartmentalized operations involve multiple attackers participating in the same attack kill chain. Using the ToyMaker campaign as an example, we demonstrate how we identified the participation of various attackers during our investigation and utilized the extended Diamond Model to clarify the distinct activities and roles of these attackers across different stages of the attack kill chain.
Talos investigated the ToyMaker campaign in 2023. The attackers conducted operations for six consecutive days, during which they compromised a server of the victim organization, exfiltrated credentials and deployed the proprietary LAGTOY backdoor. We consider this “first wave” post-compromise activity. Since we did not find any common financial crime malware in this attack, and the attackers used their proprietary tools and C2 infrastructures, we considered the possibility that it might be the activity of an APT group. However, the TTPs and indicators of compromise (IOCs) did not overlap with previously observed campaigns, so we did not attribute the campaign early in the investigation.
However, during the investigation, Talos identified TTPs and hands-on-keyboard activity consistent with Cactus ransomware activity appearing in the victim’s network almost 3 weeks after the initial compromise. We consider this the “second wave” of malicious activity. After using various tools for lateral movement within the network, the attackers launched a ransomware attack within a matter of days. At this point, Talos started a more in-depth investigation, including exploring the connections and disparities between the ransomware attack and the initial access. We formulated several hypotheses at this point:
Hypothesis A was the most intuitive assumption at the beginning of the investigation. However, as the investigation progressed, Talos made the following observations:
The totality of patterns and abnormalities collected during our research shifted our assessments toward the hypothesis involving an initial access group, leading us to reanalyze the LAGTOY tool used in the first wave of activities conducted post compromise. We discovered that this backdoor is the same as HOLERUN, which Mandiant reported as being used by UNC961. This finding, combined with the previous public reporting and observations, allows us to confirm that the attack involved two distinct attacker groups (ToyMaker aka UNC961, and Cactus).
Mandiant’s public reporting noted that UNC961’s intrusion activities often preceded the deployment of Maze and Egregor ransomware by distinct follow-on actors. While Egregor is considered a direct successor to Maze, there is no evidence indicating any connection to Cactus. In the campaign we investigated, Cactus used compromised credentials from the first wave of attacks on the victim’s machine. Based on these findings, Talos assesses with high confidence that ToyMaker provided initial access for the Cactus group. Given ToyMaker’s focus on financial gain and their history of selling initial access to ransomware groups, we classify them as an FIA group.
Building on the analysis and context provided, the extended Diamond Model allows Talos to effectively represent the threat actors involved in this campaign, highlighting the intricacies of their collaborative relationships. In Figure 6, we utilize two distinct diamonds to symbolize the ToyMaker group and the Cactus ransomware group. The Relationship Layer plays a crucial role in delineating the connections between ToyMaker’s victims and Cactus’ victims, as well as illustrating the initial access provider-receiver dynamics.
These relationships underscore the importance of carefully reviewing and investigating any capabilities and infrastructure indicators identified on the victim’s machine associated with either threat actor. For example, the hosts infected by LAGTOY are potentially at risk of ransomware attacks, or tools discovered on Cactus’ victims might be from LAGTOY or potentially other initial access groups.
We can also leverage the relationship information provided by the extended Diamond Model to identify additional potential victims of Cactus ransomware by hunting for hosts infected with the LAGTOY backdoor. Similarly, examining victims associated with ToyMaker can lead to discovering other ransomware attack victims. For defenders, this relationship data is crucial for prioritizing detection efforts and ensuring that the activities of ToyMaker and other initial access groups are not overlooked, as they can serve as precursors to further attacks. By maintaining vigilance and focusing on these initial access indicators, security teams can proactively identify and mitigate threats before they escalate into full-blown ransomware incidents.
Cisco Talos Blog – Read More
An information exposure flaw in TeleMessage has been added to CISA’s Known Exploited Vulnerabilities catalog.
The post CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor appeared first on SecurityWeek.
SecurityWeek – Read More
The extra security is cool. Too bad the drawbacks aren’t.
Latest stories for ZDNET in Security – Read More
The threat group’s goal is to help Pyongyang assess risk to its troops deployed in Ukraine and to figure out if Moscow might want more.
darkreading – Read More