Learning Library

← Back to Library

Phishing Attack to Data Exfiltration

Key Points

  • The attacker begins with reconnaissance to map the organization’s web, email, database, and file‑sharing systems before launching a phishing email that tricks a user into revealing credentials.
  • Captured credentials are reused to access other internal resources, where the attacker discovers stored passwords in an unsecured flat file (e.g., Excel) and uses them to infiltrate the critical database.
  • After locating the valuable data, the attacker exfiltrates it and then deletes the original files, leaving the victim with nothing.
  • This multi‑step compromise can be categorized using the TTP framework: tactics (the attacker’s goals such as reconnaissance or credential harvesting), techniques (the specific methods like phishing or lateral movement), and procedures (the exact actions taken to execute each technique).

Full Transcript

# Phishing Attack to Data Exfiltration **Source:** [https://www.youtube.com/watch?v=2icKi2q6NS4](https://www.youtube.com/watch?v=2icKi2q6NS4) **Duration:** 00:07:42 ## Summary - The attacker begins with reconnaissance to map the organization’s web, email, database, and file‑sharing systems before launching a phishing email that tricks a user into revealing credentials. - Captured credentials are reused to access other internal resources, where the attacker discovers stored passwords in an unsecured flat file (e.g., Excel) and uses them to infiltrate the critical database. - After locating the valuable data, the attacker exfiltrates it and then deletes the original files, leaving the victim with nothing. - This multi‑step compromise can be categorized using the TTP framework: tactics (the attacker’s goals such as reconnaissance or credential harvesting), techniques (the specific methods like phishing or lateral movement), and procedures (the exact actions taken to execute each technique). ## Sections - [00:00:00](https://www.youtube.com/watch?v=2icKi2q6NS4&t=0s) **Phishing Attack Anatomy and Lateral Movement** - The passage outlines an attacker’s recon, phishing email, credential theft, and subsequent use of those credentials to access email and file servers within a network. - [00:03:06](https://www.youtube.com/watch?v=2icKi2q6NS4&t=186s) **Mapping Phishing to MITRE ATT&CK** - The speaker explains how to classify a phishing campaign using the MITRE ATT&CK framework by breaking it down into tactics, techniques, and procedures, and demonstrates mapping the scenario’s reconnaissance and initial access steps to the appropriate ATT&CK categories. - [00:06:15](https://www.youtube.com/watch?v=2icKi2q6NS4&t=375s) **Mapping Threat Data to Attack Tactics** - The speaker explains how security tools such as IBM’s SOAR and SIEM ingest indicators of compromise, map them to a standardized attack framework, and empower organizations to use people, process, and technology (PPT) to counter adversary tactics, techniques, and procedures. ## Full Transcript
0:00A "bad guy" just broke in and stole your data, leaving you empty handed. 0:03How did he do it? 0:05Let's take a look at the anatomy of an attack. 0:07How would something like this work? 0:09Well, let's say we've got a web server. 0:15And it's connected to a database. 0:18And we also have email server. 0:24And maybe some file sharing system that's out here. 0:28And now we have, in addition to all of this, a bad guy, an attacker, who's going to try to take advantage of this. 0:35Well, how is he going to do that? 0:36There's a number of things he could do. 0:38He starts his attack with a reconnaissance phase, with a scan, and he looks and discovers what systems are out here. 0:45He realizes there's an email system. 0:47So he sends to that a phishing attack. 0:53Phishing now is going to have an email with a link in it, and it's going to encourage this unsuspecting internal user to log in. 1:03And when they take a look at their email, they're going to see the email, click on the link, 1:07the link is going to tell them to log into this website to verify their details or accept an order or something like that, 1:14some ruse of that sort. 1:16And when he does, he's going to basically give his credentials to the bad guy in the process. 1:23That's how a phishing attack often works. 1:25Now, what happens next? 1:26The bad guy then takes a look at this and says, "okay, I now have access to this email. 1:32I can log in to that and see what happens.". 1:35"I also look and see that I discovered that there was this file server and I'm going to see if I can use 1:42the credentials that he provided for me to log in to the file sharing system." 1:48On there, he discovers that this guy has stored his passwords in an unencrypted file, just a flat file, 1:55maybe an Excel spreadsheet, something like that. 1:58Something that's convenient. 2:00He uses these credentials then to log in to the database back here that has the actual critical data. 2:07Up to this point, we haven't really dealt with anything all that sensitive. 2:11This is part of the critical operation of the organization. 2:14Well, once he sees that, he says "I'm going to exfiltrate", 2:17in other words, "I'm going to get a copy of all of that and send it back to myself." 2:20Then, he does the final piece and destroys the data and leaves you empty handed. 2:26He has your data and you don't. 2:29So that's the way an attack could go. 2:31There are a lot of different variations, but that's one way to look at it. 2:34Well, how do we look at something complex like this? 2:37And this is actually a relatively simple attack scenario, but can we put some some sort of common nomenclature, 2:44some common way of understanding that so that we can understand it even better? 2:50Well, it turns out bad guys use things that we think of this way. 2:55It's tactics, techniques and procedures. 2:58Tactics are basically what they're trying to do-- not in the larger scheme of things, but sort of the sub-goal. 3:05I want to do reconnaissance. 3:06I want to do this. 3:07I want to do a phishing type of campaign. 3:11That's the tactic. 3:12The next thing would be the technique. 3:14That's the how. 3:15How am I going to go actually and do this sort of thing? 3:18And then the procedures are the details, the real implementation details that go into the how 3:24and spell out what tools I'm going to use and things like that. 3:28So this is one way of thinking about this and classifying it. 3:33In addition to this, there's a group called MITRE that put together this is what we call the MITRE Att&ck framework. 3:41Att&ck also is an acronym. 3:44It stands for Adversarial, Tactics, Techniques & Common Knowledge. 3:51So the MITRE Attack framework is an industry standard that everyone can use. 3:56Think of it as a common language for describing, classifying, therefore, a taxonomy on what attacks look like. 4:04So let's take this MITRE Attack framework and map our scenario to it. 4:10So this is what the framework looks like. 4:12Now you can see there's a lot of stuff here, a lot of detail. 4:15You don't need to know all of these details, but this is how we classify all of these things. 4:20So there's a number of things that are going to happen. 4:22Let's take the scenario we went through and map it to attack. 4:27The first thing that happened then was a reconnaissance phase, a reconnaissance tactic. 4:32And under that, the technique that was used was active scanning. 4:35Remember, this guy went out and scanned and discovered the environment. 4:39Then he moved on to a different tactic of initial access with the phishing campaign and then using valid accounts to log in. 4:48Once he had gotten the credentials. The next thing he did was move to a different tactic with credential access. 4:55And credential access then allowed him to use these unsecured credentials that were down here on this file sharing system 5:02to log in to another system, which is an example of privilege escalation, yet another tactic using a valid account. 5:10Now he's gone from a low-level-- where he was an outsider --to a low level account to now a very sensitive account. 5:17The next thing he's going to do is collection. 5:19That's the tactic next. 5:20Collection is when he takes the data and then he does the next tactic and exfiltrate it, sends it to himself over the network. 5:29And then the final piece he does is the impact tactic. 5:32T. Hat's where he destroys the data. 5:34So now, if you think about it this way, we've described what that looks like in a common way. 5:39I could tell you that an attacker went through the following tactics and the following techniques, 5:44and you would understand something about that attack, if you knew what this framework was. 5:48And the beautiful thing about this is, you can actually click in on any one of these and see, for instance, on the phishing one, 5:54if you click through on that, then you'll get another page of detail that comes up and tells you 5:59what are some of the things that go into that procedure. How do you detect it? 6:03How do you mitigate against it? 6:04What are references that give you more information about it? 6:07So it's a nice way of trying to understand this-- classify --and then therefore 6:11get your arms around it when you actually find one of these attacks. 6:15Now, how would this look in the real world? 6:18You're not going to take this big, complicated diagram. 6:20That's going to be a lot. 6:21What you'd like is to have a tool, a threat management tool, that can take the information that's come in, the artifacts, 6:28the indicators of compromise, all the alarms-- map all of those activities to the attack framework, 6:35and then tell you exactly just which ones of those tactics were involved in this case. 6:42And that's what this shows you. 6:44So here's a screenshot that shows you in in, for example, in IBM's threat management solution, how we would depict this, 6:50in our SOAR-- our security orchestration, automation response capability, 6:55in our SIEM, our security information event management capability. 6:58We've got a number of different ways of depicting this. 7:01But given this now, I can say, I can describe this attack in a way that everyone in the industry will understand. 7:08So if you think about it this way, the bad guys have their TTPs. 7:12What are the good guys have? 7:13Well, we've got just the opposite: PPT. 7:17We've got people, process, and technology. 7:20That's what's working for us. 7:22And if we can understand the problem better, we can contain the problem and respond to it better. 7:27So we're going to use our PPTs to respond to their TTPs. 7:33Thanks for watching. 7:34If you found this video interesting and would like to learn more about cybersecurity, 7:37please remember to hit like and subscribe to this channel.