{"id":33776,"date":"2016-11-28T09:00:37","date_gmt":"2016-11-28T17:00:37","guid":{"rendered":"http:\/\/blogs.microsoft.com\/microsoftsecure\/?p=33776"},"modified":"2023-06-23T09:51:55","modified_gmt":"2023-06-23T16:51:55","slug":"disrupting-the-kill-chain","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/11\/28\/disrupting-the-kill-chain\/","title":{"rendered":"Disrupting the kill chain"},"content":{"rendered":"
This post is authored by Jonathan Trull, Worldwide Executive Cybersecurity Advisor, Enterprise Cybersecurity Group.<\/em><\/p>\n The cyber kill chain describes the typical workflow, including techniques, tactics, and procedures or TTPs, used by attackers to infiltrate an organization\u2019s networks and systems. The Microsoft Global Incident Response and Recovery (GIRR) Team and Enterprise Threat Detection Service, Microsoft\u2019s managed cyber threat detection service, identify and respond to thousands of targeted attacks per year. Based on our experience, the image below illustrates how most targeted cyber intrusions occur today.<\/p>\n The initial attack typically includes the following steps:<\/p>\n The Microsoft Secure and Productive Enterprise is a suite of product offerings that have been purposely built to disrupt this cyber attack kill chain while still ensuring an organization\u2019s employees remain productive. Below, I briefly describe how each of these technologies disrupts the kill chain:<\/p>\n And now for the best part. As shown in the image below, each of the above listed technologies is designed to work seamlessly together and provide security teams with visibility across the entire kill chain.<\/p>\n Each of these technologies also leverage the power of the Microsoft Intelligent Security Graph, which includes cyber threat intelligence collected from Microsoft\u2019s products and services, to provide the most comprehensive and accurate detections.<\/p>\n Finally, Microsoft\u2019s Enterprise Cybersecurity Group (ECG) also offers a range of both proactive and reactive services that leverages the capabilities of the Secure and Productive Enterprise suite in combination with the Intelligent Security Graph to help companies detect, respond to, and recover from attacks.<\/p>\n In the coming weeks, I will be following up with blogs and demos that go deeper into each of the above listed technologies and discuss how companies can most effectively integrate these solutions into their security strategies, operations, and existing technologies.<\/p>\n","protected":false},"excerpt":{"rendered":" This post is authored by Jonathan Trull, Worldwide Executive Cybersecurity Advisor, Enterprise Cybersecurity Group. The cyber kill chain describes the typical workflow, including techniques, tactics, and procedures or TTPs, used by attackers to infiltrate an organization\u2019s networks and systems. The Microsoft Global Incident Response and Recovery (GIRR) Team and Enterprise Threat Detection Service, Microsoft\u2019s managed […]<\/p>\n","protected":false},"author":61,"featured_media":75276,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3663],"topic":[3674,3687],"products":[3854,3720],"threat-intelligence":[3727],"tags":[],"coauthors":[1916],"class_list":["post-33776","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-research","topic-incident-response","topic-threat-intelligence","products-microsoft-incident-response","products-microsoft-security-experts","threat-intelligence-attacker-techniques-tools-and-infrastructure"],"yoast_head":"\n\n
Microsoft Secure and Productive Enterprise<\/h3>\n
\n
\nMost attackers leverage phishing emails containing malicious attachments or links pointing to watering hole sites. Advanced Threat Protection (ATP) in Office 365 provides protection against both known and unknown malware and viruses in email, provides real-time (time-of-click) protection against malicious URLs, as well as enhanced reporting and trace capabilities. Messages and attachments are not only scanned against signatures powered by multiple antimalware engines and intelligence from Microsoft\u2019s Intelligent Security Graph, but are also routed to a special detonation chamber, run, and the results analyzed with machine learning and advanced analysis techniques for signs of malicious behavior to detect and block threats. Enhanced reporting capabilities also make it possible for security teams to quickly identify and respond to email based attacks when they occur.<\/li>\n
\nIf an attacker still manages to deliver malware through to one of the organization\u2019s employees by some other mechanism (e.g., via personal email), Windows 10\u2019s security features are designed to both stop the initial infection, and if infected, prevent further lateral movement. Specifically, Windows Defender Application Guard<\/strong> uses new, hardware based virtualization technology to wrap a protective border around the Edge browser. Even if malware executes within the browser, it cannot access the underlying operating system and is cleaned from the machine once the browser is closed. Windows Device Guard<\/strong> provides an extra layer of protection to ensure that only trusted programs are loaded and run preventing the execution of malicious programs, and Windows Credential Guard<\/strong> uses the same hardware based virtualization technology discussed earlier to prevent attackers who manage to gain an initial foothold from obtaining other credentials stored on the endpoint. And finally, Windows Defender Advanced Threat Protection<\/strong> is the DVR for your company\u2019s security team. It provides a near real-time recording of everything occurring on your endpoints and uses built-in signatures, machine learning, deep file analysis through detonation as a service, and the power of the Microsoft Intelligent Security Graph to detect threats. It also provides security teams with remote access to critical forensic data needed to investigate complex attacks.<\/li>\n
\nIf an attacker still manages to get through the above defenses, compromise credentials, and moves laterally, the Microsoft Advanced Threat Analytics (ATA) solution provides a robust set of capabilities to detect this stage of an attack. ATA uses both detection of known attack techniques as well as a user-based analytics that learns what is \u201cnormal\u201d for your environment so it can spot anomalies that indicate an attack. Microsoft ATA can detect internal recon attempts such as DNS enumeration, use of compromised credentials like access attempts during abnormal times, lateral movement (Pass-the-Ticket, Pass-the-Hash, etc.), privilege escalation (forged PAC), and domain dominance activities (skeleton key malware, golden tickets, remote execution).<\/li>\n\n