Cyber Attack: Zynga Data Breach

The cyber kill chain is a series of steps that trace the stages of a cyber attack from the early reconnaissance stages to the exfiltration of data. The kill chain helps us understand and combat ransomware, security breaches, and advanced persistent attacks (APTs).


Task Instructions

Pick an example of a recent cyber attack (within the last three year) and describe it.  For this paper, I need you to detail the attack in terms of the Cyber Kill Chain.  The Cyber Kill Chain is described in the following article:

Step 1: Reconnaissance. The attacker gathers information on the target before the actual attack starts. He can do it by looking for publicly available information on the Internet.

Step 2: Weaponization. The attacker uses an exploit and creates a malicious payload to send to the victim. This step happens at the attacker side, without contact with the victim.

Step 3: Delivery. The attacker sends the malicious payload to the victim by email or other means, which represents one of many intrusion methods the attacker can use.

Step 4: Exploitation. The actual execution of the exploit, which is, again, relevant only when the attacker uses an exploit.

Step 5: Installation. Installing malware on the infected computer is relevant only if the attacker used malware as part of the attack, and even when there is malware involved, the installation is a point in time within a much more elaborate attack process that takes months to operate.

Step 6: Command and control. The attacker creates a command and control channel in order to continue to operate his internal assets remotely. This step is relatively generic and relevant throughout the attack, not only when there’s an installation of malware.

Step 7: Action on objectives. The attacker performs the steps to achieve his actual goals inside the victims network. This is the elaborate active attack process that takes months, and thousands of small steps, in order to achieve.

order now with paypal
Powered by WordPress