<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Predictive Defense Blog]]></title><description><![CDATA[Predictive Defense Blog]]></description><link>https://blog.predictivedefense.io</link><image><url>https://substackcdn.com/image/fetch/$s_!U1fy!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png</url><title>Predictive Defense Blog</title><link>https://blog.predictivedefense.io</link></image><generator>Substack</generator><lastBuildDate>Wed, 08 Apr 2026 06:00:49 GMT</lastBuildDate><atom:link href="https://blog.predictivedefense.io/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Robin Dimyanoglu]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[predictivedefense@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[predictivedefense@substack.com]]></itunes:email><itunes:name><![CDATA[Robin Dimyanoglu]]></itunes:name></itunes:owner><itunes:author><![CDATA[Robin Dimyanoglu]]></itunes:author><googleplay:owner><![CDATA[predictivedefense@substack.com]]></googleplay:owner><googleplay:email><![CDATA[predictivedefense@substack.com]]></googleplay:email><googleplay:author><![CDATA[Robin Dimyanoglu]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Wargaming a China-Taiwan Conflict and Its Cyber Scenarios]]></title><description><![CDATA[China&#8217;s use of cyber strategies in a conflict with Taiwan is likely to follow a methodical, gradual approach]]></description><link>https://blog.predictivedefense.io/p/wargaming-a-china-taiwan-conflict</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/wargaming-a-china-taiwan-conflict</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Wed, 25 Mar 2026 14:00:24 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!E81d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="pullquote"><p>This post is co-authored by the Predictive Defense and <a href="https://www.nattothoughts.com/">Natto Thoughts</a>.</p></div><p>Since the start of his second term in January 2025, the Trump administration has <a href="https://www.axios.com/2026/03/02/trump-iran-war-military-strikes-maga">conducted</a> military actions or strikes in seven countries. The ouster of Venezuelan president Nicolas Maduro in January 2026 and the ongoing US-Israeli joint military operation against Iran makes it feel as if the threshold for war has been lowered. Leaders across the globe are likely drawing their own conclusions. Bill Bishop, a China expert at Sinocism, <a href="https://substack.com/@sinocism/note/c-221158202?utm_source=notes-share-action&amp;r=1fj33r">remarked</a>, &#8220;Maduro and now Ayatollah Ali Khamenei in two months. Would love to know what Xi really thinks about this,&#8221; referring to Chinese President Xi Jinping. Indeed, what does Xi think about these developments? In particular, how do they shape Xi&#8217;s views on Taiwan &#8220;reunification&#8221;? Have US military actions in seven countries influenced Xi&#8217;s perspective on using military force to achieve China&#8217;s goal of &#8220;reunification&#8221;&#8212;which he <a href="https://www.nattothoughts.com/i/141051336/what-are-xis-thoughts-on-taiwan-reunification-and-the-use-of-force-over-taiwan">considers</a> a &#8220;historical inevitability&#8221;?</p><p>A potential conflict between China and Taiwan would represent a globally significant inflection point. Drawing from the Center for Strategic and International Studies (CSIS) 2023 <a href="https://www.csis.org/analysis/first-battle-next-war-wargaming-chinese-invasion-taiwan">report</a> <strong>The First Battle of the Next War: Wargaming a Chinese Invasion of Taiwan</strong>, this piece aims to conduct a reality check on a likely scenario of China-Taiwan conflict presented in the CSIS report, and examines the challenges and possible cyber implications of such a scenario and how organizations across sectors could be exposed, whether directly or indirectly.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Based on war games involving a simulated invasion, the CSIS study provides insights under clearly defined assumptions, including participating actors and their roles, mobilization timelines, ammunition availability and the type of operations conducted. While no single study can predict outcomes, its transparent methodology and multi-scenario approach provide a useful analytical foundation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!E81d!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!E81d!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!E81d!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!E81d!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!E81d!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!E81d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg" width="480" height="319.875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:853,&quot;width&quot;:1280,&quot;resizeWidth&quot;:480,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!E81d!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg 424w, https://substackcdn.com/image/fetch/$s_!E81d!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg 848w, https://substackcdn.com/image/fetch/$s_!E81d!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!E81d!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe22e18c0-8e80-463c-8940-465b59c6a8cb_1280x853.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Credit: Wikimedia Commons</figcaption></figure></div><h3>Four Potential Winning Conditions and Challenges That Could Create Openings for China</h3><p>The CSIS study analyzes 24 iterations of a large-scale war game simulating a Chinese amphibious invasion of Taiwan. It focuses primarily on conventional military variables such as force posture, logistics, attrition, alliance coordination, and operational timelines under varying assumptions. Across most scenarios, Taiwan avoids defeat only with active US intervention and access to Japanese bases. Even then the cost is severe for all sides: heavy naval and air losses, high casualties, and significant economic disruption. Cyber operations are not treated as a decisive variable in the simulations, but the report remains valuable for understanding the conditions that are crucial for Taiwan&#8217;s defense.</p><p>The CSIS study identifies the critical conditions required for Taiwan and its partners to prevail. From an adversary&#8217;s perspective, these conditions highlight the pressure points China would likely attempt to disrupt before or during a conflict, with cyber operations serving as one of the enabling tools. We will examine four key conditions for success identified in the CSIS report and apply adversarial perspectives to consider challenges to these winning conditions that could provide openings for China. This does not imply that China will pursue these actions, nor that cyber capabilities would be the primary means. Rather, the exercise helps frame where cyber-enabled activity could plausibly emerge.</p><p><strong>1. The Need for Taiwanese Ground Forces to Contain the Landing</strong></p><p>The CSIS report emphasizes that Taiwan&#8217;s ground forces are decisive in preventing a successful lodgment and breakout. However, these forces exhibit structural weaknesses, particularly in manpower and readiness.</p><p>Sustained ground defense is fundamentally a numbers and endurance challenge. Based on our assessment, two key pressure points emerge:</p><ul><li><p>Conscription and force generation: The ability to mobilize, train and rotate sufficient personnel over time is critical to maintaining front-line effectiveness and replacing losses in a prolonged conflict.</p></li><li><p>Ammunition stockpiles and production capacity: Having adequate reserves and the industrial capability to restock munitions at a rate that matches battlefield consumption.</p></li></ul><p><em><strong>Challenges</strong>: As the CSIS<a href="https://www.csis.org/analysis/first-battle-next-war-wargaming-chinese-invasion-taiwan"> report</a> points out, Taiwan&#8217;s ground forces have faced difficulties in filling positions, resulting in a reduction of the army&#8217;s size from 200,000 in 2011 to 94,000 in 2022. To boost manpower, at the end of 2022 former President Tsai Ing-wen <a href="https://english.president.gov.tw/News/6417">announced</a> a plan to realign Taiwan&#8217;s military force structure, including extending the conscription period from four months to a full year beginning in 2024. However, an April 2025 <a href="https://thediplomat.com/2025/04/taiwan-races-to-scale-up-revamped-conscription-program-before-2027">report</a> from The Diplomat, a Washington, D.C.-based Indo-Pacific region-focused online news magazine, indicates that &#8220;with understocked equipment, lackluster recruitment, and budget fights in the legislature, full implementation of Taiwan&#8217;s new mandatory military service plan remains difficult.&#8221;</em></p><p><strong>2. The Need for Pre-Supplied Weapons from the US and Allies</strong></p><p>Taiwan&#8217;s ability to resist depends heavily on weapons being delivered before conflict begins. This requirement hinges on:</p><ul><li><p>Financing and procurement mechanisms: The availability of funding and the efficiency of acquisition processes to secure and deliver needed systems in a timely manner.</p></li><li><p>Political willingness in the United States and allied countries: The readiness of governments to approve, prioritize and sustain arms transfers despite competing domestic and strategic considerations.</p></li></ul><p>US risk tolerance for escalation is a decisive variable, as efforts to pre-position or accelerate weapons deliveries before a conflict could themselves be perceived as escalatory. This affects how far the US is willing to go in advancing support timelines, given the risk of provoking a response or raising tensions prior to the outbreak of hostilities.</p><p><em><strong>Challenges</strong>: Since 2020, as China has increased military provocations against Taiwan, Taiwan has strengthened its defense by expanding its weapons stockpiles with a special military <a href="https://www.cna.com.tw/news/aipl/202110050154.aspx">budget</a> in 2021 and meeting its<a href="https://globaltaiwan.org/2024/10/taiwans-missile-programs/"> missile production</a> goals two years ahead of schedule. However, Taiwan&#8217;s current production rate&#8212;about 1,000 precision missiles per year&#8212;is not sufficient to stop a full-scale Chinese invasion, and its stockpile could be depleted in just a few days, as <a href="https://asiatimes.com/2025/08/dependent-and-exposed-taiwans-military-supply-chain-crisis/">reported</a> by Asia Times, a Hong Kong-based news outlet, in August 2025.</em></p><p><em>Although the United States is Taiwan&#8217;s closest arms provider, US arms sales have often been delayed due to <a href="https://www.nytimes.com/2026/02/27/us/politics/trump-taiwan-arms-sale.html">competing geopolitical priorities</a>. Taiwan is also seeking to <a href="https://focustaiwan.tw/politics/202601120014">co-produce</a> munitions and weapon systems with the US, but this effort remains in the planning stages.</em></p><p><strong>3. The Need for Japanese Base Access</strong></p><p>US access to its military bases in Japan is a critical operational requirement. This is a legal and political decision for Tokyo, as it depends on Japan&#8217;s willingness to authorize the use of its territory for combat operations and accept the associated risks.</p><p><em><strong>Challenges</strong>: As the CSIS report points out, Japan hosts more US bases and service members than any other state in the world. In 2025, approximately <a href="https://www.state.gov/u-s-security-cooperation-with-japan">55,000</a> US military personnel were stationed in Japan. The US State Department <a href="https://www.state.gov/u-s-security-cooperation-with-japan">has described</a> the security cooperation with Japan as &#8220;the cornerstone of peace, stability, and freedom in the Indo-Pacific region.&#8221; In any response to a Chinese invasion, the US would rely primarily on its bases located in Japan, due to &#8220;the proximity of these bases to Taiwan and the lack of nearby alternatives,&#8221; according to the CSIS report. Over the years, some political groups in Japan have protested against US bases but have carried little weight in government policy.</em></p><p><strong>4. The Need for US Political Willingness to Sustain High Losses</strong></p><p>Even if military conditions are favorable, US willingness to absorb heavy losses and continue fighting is a central determinant of outcome. Based on our assessment this depends on political leadership and public support holding firm as casualties mount, which can become increasingly difficult over time.</p><p><em><strong>Challenges</strong>: The CSIS report concludes that US involvement in fighting a Chinese invasion of Taiwan would likely result in high losses, potentially damaging the US&#8217;s global position for many years. Although former US President Joe Biden <a href="https://globaltaiwan.org/2025/02/assessing-joe-bidens-long-and-complicated-taiwan-legacy/">promised</a> to defend Taiwan against attack, implying a willingness to sustain such losses, the current US administration has <a href="https://globaltaiwan.org/2026/01/trumps-policy-toward-taiwan/">sent</a> <a href="https://www.reuters.com/world/china/taiwan-says-us-has-initiated-111-billion-arms-sale-procedure-2025-12-18/">mixed messages</a>.</em></p><p>When these preconditions and potential countermeasures are viewed collectively, a coherent set of probable Chinese objectives emerges - objectives that China may pursue to facilitate its goal of &#8220;reunification&#8221;:</p><ul><li><p>Degrade Taiwan&#8217;s ability to sustain ground resistance by weakening manpower mobilization, ammunition availability, and battlefield communications.</p></li><li><p>Erode US and allied pre-conflict preparation by reducing political willingness to arm Taiwan in advance.</p></li><li><p>Fracture alliance cohesion by increasing political hesitation in Japan and other regional partners regarding direct involvement.</p></li><li><p>Undermine domestic political will in the United States to sustain a prolonged, high-casualty conflict.</p></li></ul><p>In essence, China&#8217;s objectives would be to shape the strategic environment so that Taiwan&#8217;s coalition cannot mobilize, coordinate, or sustain resistance at the required scale. Information operations<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a>, &#8211; including cyber operations (also known as computer network operations) and influence operations (also known as psychological operations) &#8211; would likely serve as enabling instruments in support of these broader political and military goals.</p><p>The two critical roles that the US Cyber Command played in the most recent US-Israeli operations exemplify how cyber instruments could enable military goals. US General Dan Caine <a href="https://www.war.gov/News/Transcripts/Transcript/Article/4418959/secretary-of-war-pete-hegseth-and-chairman-of-the-joint-chiefs-of-staff-gen-dan/">explained</a> at a press conference on March 2, 2026, approximately 57 hours after the operations began, that along with US Space Command, US Cyber Command was among the &#8220;first movers&#8221; that were &#8220;layering non-kinetic effects, disrupting, degrading, and blinding Iran&#8217;s ability to see, communicate, and respond,&#8221; which &#8220;<a href="https://www.rusi.org/explore-our-research/publications/commentary/fog-proxies-and-uncertainty-cyber-us-israeli-operations-iran">shaped</a> the environment for the subsequent phases of the operation.&#8221; He further <a href="https://www.war.gov/News/Transcripts/Transcript/Article/4418959/secretary-of-war-pete-hegseth-and-chairman-of-the-joint-chiefs-of-staff-gen-dan/">stated</a> that US Space Command and US Cyber Command &#8220;have continuously layered effects to disrupt, disorient, and confuse the enemy.&#8221;</p><div><hr></div><h3>How China Will Likely Use Cyber Means to Facilitate its Strategic Goals</h3><p>Over the years, China has been undertaking methodical, gradual steps aimed at shaping the strategic environment. This has become more overt since 2015. A significant turning point was the revelation in May 2023 that Chinese state threat group <a href="https://www.nattothoughts.com/p/who-is-volt-typhoon-a-state-sponsored">Volt Typhoon</a> had targeted US critical infrastructure. Subsequently the US government officially reported on Volt Typhoon following the US Department of Justice (US DoJ)&#8217;s takedown of a botnet allegedly used by Volt Typhoon in January 2024. US officials <a href="https://selectcommitteeontheccp.house.gov/committee-activity/hearings/hearing-notice-ccp-cyber-threat-american-homeland-and-national-security">pointed</a> out that China&#8217;s &#8220;historical focus on stealing state secrets and espionage,&#8221; meaning cyber espionage for political and economic interests, has evolved into a more ominous intention to prepare for destructive attacks. As US officials said, Volt Typhoon campaigns<a href="https://www.axios.com/2024/01/31/china-cyber-threats-congressional-hearing"> show</a> &#8220;a new interest in preparing and launching destructive cyberattacks against US electricity systems, water utilities, military organizations and other critical services,&#8221; and the intent is to &#8220;cause disruption and sow societal panic, especially in the event of a military conflict.&#8221;</p><p>If China, indeed, is preparing for and pre-positioning the country for any kind of military conflict using cyber means &#8211; such as if the US military helped Taiwan resist a potential Chinese attack &#8211; this makes us wonder what China&#8217;s next move will be. As we know, cyber activities for the purpose of pre-positioning can also be a form of deterrent, such as to make the US think twice about coming to the aid of Taiwan. Influencing the US policy-making process or stealing intellectual property through cyber espionage to further China&#8217;s strategic goals also likely remain on the regular Chinese threat activity agenda.</p><p>Therefore, examining possible scenarios of Chinese information operation activities in the following categories&#8212;both in preparation for and during a military conflict with Taiwan&#8212;may help us better understand how China would likely use cyber means to facilitate its strategic goals.</p><p><strong>Cyber-enabled Influence operations</strong></p><ul><li><p>Increased bot activity targeting social media platforms, messaging apps, online games as well as gaming forums with large Taiwanese or Japanese user bases, such as social media platform LINE</p></li><li><p>Account takeover attempts, phishing or impersonation attempts targeting influencers in Japan and Taiwan who are vocally anti-China</p></li><li><p>DDoS and other disruption attempts targeting online news websites that are vocally anti-China</p></li></ul><p>These are typical activities associated with mass disinformation campaigns, the topic of a <a href="https://www.nattothoughts.com/p/disinformation-handbook-a-concise">series</a> of Natto Thoughts posts, including case studies of their use by <a href="https://www.nattothoughts.com/p/bluesky-should-outsmart-chinas-public">China</a> and <a href="https://www.nattothoughts.com/p/disrupt-and-demoralize-deniably-part">Russia</a>. Before and during a conflict, a huge volume of bot activity &#8212; often amplified with the help of Large Language Models &#8212; would likely be unleashed in an attempt to control the online narrative. As in the case of <a href="https://www.nattothoughts.com/p/troll-humor">Russia</a>, messages are likely to be disseminated not only on the social media giants, but also on more localized forums, blogs, games and messaging apps. An academic <a href="https://arxiv.org/pdf/2211.04154">study</a> about Russian propaganda on social media during the 2022 invasion of Ukraine written by several German scholars shows that the peak on March 2, 2022, coincides with the day the United Nations General Assembly adopted Resolution ES-11/1 deploring the invasion, likely intended to sway the votes of the UN delegates. (See chart below)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oPnY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oPnY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png 424w, https://substackcdn.com/image/fetch/$s_!oPnY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png 848w, https://substackcdn.com/image/fetch/$s_!oPnY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png 1272w, https://substackcdn.com/image/fetch/$s_!oPnY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oPnY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png" width="1452" height="816" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:816,&quot;width&quot;:1452,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oPnY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png 424w, https://substackcdn.com/image/fetch/$s_!oPnY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png 848w, https://substackcdn.com/image/fetch/$s_!oPnY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png 1272w, https://substackcdn.com/image/fetch/$s_!oPnY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4ebf7c2-0ed7-48b7-a0e2-0afdf665f9be_1452x816.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Pro-Russian messages on social media during the first few weeks of war shows the peak on March 2, 2022; Source: <a href="https://arxiv.org/abs/2211.04154">arXiv</a></figcaption></figure></div><p><strong>Hacktivist activities</strong></p><ul><li><p>DDoS and other low-impact hacktivist activities, such as defacement attacks targeting government websites of the US, Japan and Taiwan and banking sectors</p></li></ul><p>This is also typical with conflicts. Low-tier hacktivist groups want to grab the headlines and <a href="https://www.nattothoughts.com/p/disrupt-and-demoralize-deniably-part">demonstrate their patriotism</a> through attacks on government and banks of enemy countries. For example, the share of DDoS targets located in Germany rose from 5% to 70% after the US-Israel operation on Iran in late February 2026, according to data from VirusTotal, a US-based threat intelligence aggregator (see chart below). This shift likely reflects Germany&#8217;s public stance in support of Israel during the conflict, which may have increased its visibility as a target for hacktivist groups seeking symbolic or attention-grabbing targets rather than conducting coordinated disruption. While many of China&#8217;s first generation of patriotic &#8220;red hackers&#8221; or &#8220;honkers&#8221; have <a href="https://www.nattothoughts.com/p/few-and-far-between-during-chinas">graduated</a> from hacktivism to providing sophisticated cyber services for the state, further hacktivist activities in support of China against Taiwan cannot be excluded.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Uoro!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Uoro!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png 424w, https://substackcdn.com/image/fetch/$s_!Uoro!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png 848w, https://substackcdn.com/image/fetch/$s_!Uoro!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png 1272w, https://substackcdn.com/image/fetch/$s_!Uoro!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Uoro!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png" width="485" height="359.9539594843462" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:806,&quot;width&quot;:1086,&quot;resizeWidth&quot;:485,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Uoro!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png 424w, https://substackcdn.com/image/fetch/$s_!Uoro!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png 848w, https://substackcdn.com/image/fetch/$s_!Uoro!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png 1272w, https://substackcdn.com/image/fetch/$s_!Uoro!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F799c2cf1-b020-452f-b433-c457f1612cfe_1086x806.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Share of countries falling victim to DDoS attacks from February to Early March 2026; Source: VirusTotal</figcaption></figure></div><p><strong>Cyber espionage operations</strong></p><ul><li><p>Intrusion and data exfiltration attacks targeting survey and polling companies researching public opinion in Taiwan and Japan</p></li><li><p>Intrusion attacks targeting government IT contractors in the US, Japan, and Taiwan, particularly those developing back-office software.</p></li></ul><p>News reporters, think tanks and public opinion research companies are persistent targets for cyber espionage. However, during wartime these intrusions often become part of broader harassment campaigns aimed at shaping the narrative surrounding the war. For example, the Institute of Mass Information, a civil society organization based in Ukraine, <a href="https://imi.org.ua/en/monitorings/607-crimes-against-the-media-and-journalists-in-ukraine-committed-by-russia-in-the-two-years-and-i62664">reported</a> in July 2024 that Russia committed 607 crimes against journalists and the media in Ukraine in the two years and five months since the start of the full-scale invasion. Government contractors are also persistent targets of cyber espionage given their broad access to government networks.</p><p><strong>Offensive cyber operations</strong></p><ul><li><p>Pre-conflict intrusion activity and potential disruptive cyberattacks during conflict targeting civilian energy and telecommunications providers supporting US bases in Japan</p></li><li><p>Ransomware<a href="https://www.nattothoughts.com/p/ransom-war-part-3-inflict-maximum"> or pseudo-ransomware </a>attacks targeting Tier-2 and Tier-3 industrial suppliers critical to defense production</p></li><li><p>Ransomware attacks targeting Japanese automotive manufactures and major suppliers to signal economic pressure.</p></li></ul><p>As the Natto Team has <a href="https://www.nattothoughts.com/p/disrupt-and-demoralize-deniably">pointed out</a> in the case of Russia, analysts have discerned a &#8220;playbook&#8221; combining disruptive and destructive operations with psychological operations. Indeed, evidence suggests that <a href="https://www.nattothoughts.com/p/ransom-war-russian-extortion-operations">ransomware can serve as a form of hybrid warfare</a>. In China, too, threat actors with some degree of relationship to the Chinese state have <a href="https://www.nattothoughts.com/p/chinese-threat-groups-that-use-ransomware">used ransomware</a> to cause misattribution, distraction, disruption or even destruction and to provide financial gain, cover for espionage operations and the ability to remove the evidence. During the Russia-Ukraine conflict in 2022-2023 several cybersecurity firms observed disruptive campaigns against industrial and economic sectors, along with an evolution of toolsets better suited for disruptive operations. For example, US based cyber firm Mandiant, now part of Google Cloud, <a href="https://services.google.com/fh/files/misc/apt44-unearthing-sandworm.pdf">discovered </a>that APT44 (a.k.a Sandworm) demonstrated tooling evolution during its wartime operation. VirusTotal also showed a spike of malware and Indicators of Compromise (IoC) submissions from December 2021 to May 2022, the months leading up to the full-scale Russian invasion of Ukraine. (See chart below)</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-aM_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-aM_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png 424w, https://substackcdn.com/image/fetch/$s_!-aM_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png 848w, https://substackcdn.com/image/fetch/$s_!-aM_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png 1272w, https://substackcdn.com/image/fetch/$s_!-aM_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-aM_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png" width="1456" height="532" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:532,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-aM_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png 424w, https://substackcdn.com/image/fetch/$s_!-aM_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png 848w, https://substackcdn.com/image/fetch/$s_!-aM_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png 1272w, https://substackcdn.com/image/fetch/$s_!-aM_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4c718ed1-1009-49ff-939c-c9f8084e79c1_1600x585.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Sandworm malware and IoC submissions on VirusTotal showed a spike from December 2021 to May 2022. Source: VirusTotal</figcaption></figure></div><p>Overall, these possible scenarios of using cyber means to facilitate China&#8217;s strategic goals in the China-Taiwan conflict are likely to evolve as geopolitical situations, the development of military technologies, and the understanding of military conflicts progress. As <a href="https://www.csis.org/people/nikita-shah">Nikita Shah</a>, a senior fellow at the Center for Strategic &amp; International Studies (CSIS), <a href="https://www.csis.org/analysis/demystifying-iranian-cyber-operations-us-iran-conflict">pointed out</a>, in the ongoing US-Israel and Iran conflict in March 2026, cyber operations are &#8220;not a revolutionary edge in conflict,&#8221; but rather incremental. For China, &#8220;reunification&#8221; with Taiwan is<a href="https://www.aljazeera.com/news/2026/1/1/chinas-xi-says-reunification-with-taiwan-unstoppable"> seen</a> as inevitable and &#8220;unstoppable&#8221;. Therefore, China is likely to act strategically, using cyber operations to achieve steady, incremental progress toward its objectives.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>Information operations (IO) refers to the integrated employment, during military operations, of information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making of adversaries and potential adversaries while protecting our own, according to Joint Publication 3-13<a href="https://defenseinnovationmarketplace.dtic.mil/wp-content/uploads/2018/02/12102012_io1.pdf"> Information Operation</a>, 27 November 2012 published by the US Department of Defense. The core capabilities include capabilities, such as Electronic Warfare, computer network operations, psychological operations, military deception, and operations security. The Natto Team has written extensively about<a href="https://www.nattothoughts.com/p/disinformation-handbook-a-concise"> information operations</a> as a form of<a href="https://www.nattothoughts.com/p/ransom-war-russian-extortion-operations"> hybrid warfare</a>.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Threat Intelligence Essentials: How to Prioritize Effectively]]></title><description><![CDATA[Rethinking CTI prioritization through business context]]></description><link>https://blog.predictivedefense.io/p/threat-intelligence-essentials-how</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/threat-intelligence-essentials-how</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Mon, 02 Feb 2026 20:13:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!9Hh_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the first post of this series, we argued that the effectiveness of CTI cannot be measured with a single, universal set of success metrics. What &#8220;good intelligence&#8221; looks like depends heavily on who consumes it. Even when the underlying data set is exactly the same, the expectations of an Analyst, an Engineer, or a Leader differ significantly.</p><p>Analysts are focused on shortening investigation cycles, engineers care about improving automation and operational efficiency, while leaders need clarity on where to prioritize security investments. These are very different problems and they require very different forms of intelligence products. Consequently, a CTI analyst must deliberately tailor the output to match these role-specific needs.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>This represents a departure from the still-common practice of distributing the same report, built on the same data, to every stakeholder. Modern threat intelligence demands a more targeted, consumer-driven approach rather than a one-size-fits-all delivery model.</p><p>You can read the first article in the series at the link below.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;f1bcc6c8-cd70-4a67-b466-a1bee083a19a&quot;,&quot;caption&quot;:&quot;Cyber threat intelligence aims to support decision making across different layers of security operations. But in practice, teams often overlook one simple fact: people at different levels have different needs. If our understanding of their day to day responsibilities is only surface level, the intelligence team cannot truly help them. This is also the c&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Threat Intelligence Essentials: Which Customer Are You Serving?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-12-01T01:01:43.713Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d3b6ba05-9877-4dad-8ce2-c59058b7fe26_1521x1367.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/threat-intelligence-essentials-which&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:180361875,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:2565759,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!U1fy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>In this post, we&#8217;ll dive into yet another crucial part of CTI planning: how to prioritize effectively. As you know, defining Priority Intelligence Requirements is key for allocating time and resources. A common mistake in setting PIRs is overlooking the company&#8217;s business model, growth projections, and technology strategies.</p><p>When determining CTI priorities, the typical approach is to build a threat landscape based on the industry and geographical location of the company, focusing on the threat actors most relevant to that context. Then, prioritization is based on the level of damage these actors could inflict, with the highest-impact threats being addressed first.</p><p>Another common strategy involves using SWOT analyses or post-mortems to pinpoint weaknesses and develop a strategy to address them. In these cases, CTI often acts as a complementary layer of defense. For example, if a company&#8217;s EDR system isn&#8217;t detecting certain types of malware, CTI can be used to fill that gap.</p><p>While these approaches aren&#8217;t inherently wrong, they miss an important piece of the puzzle. The reality is that businesses don&#8217;t stay the same. They almost always grow and change over time. CTI programs that don&#8217;t align with the company&#8217;s growth plans struggle to stay proactive and fail to deliver long-term ROI. Over time, this makes it even harder to redirect investments where they&#8217;re needed most.</p><div><hr></div><h3>The Tale of Two Banks</h3><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!9Hh_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!9Hh_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9Hh_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9Hh_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9Hh_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!9Hh_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2556483,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/182321931?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!9Hh_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!9Hh_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!9Hh_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!9Hh_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9936ae8c-dc16-4f90-8e7e-0873a0b3cd85_1536x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When doing cyber security planning, the first thing you should ask yourself is: <em>How does the company actually make money?</em> Even if two companies are in the same industry and appear to offer the same services, their revenue models can be drastically different. Let&#8217;s explore this with two fictional banks: <strong>ClassicBank</strong> and <strong>DigitalBank</strong>.</p><p><strong>ClassicBank</strong> is a traditional bank with physical branches, offering standard banking services. It then uses the capital from its customers to make direct investments and private equity deals. Unlike typical banks that earn from fees or interest, ClassicBank profits from the returns on these investments. So, its growth strategy is all about attracting high-net-worth individuals (HNWI and UHNWI) to raise capital, and then using that capital to make better, more profitable investments. This means ClassicBank&#8217;s customer base won&#8217;t grow quickly or through consumer loans. It&#8217;s about finding a few high-value clients and expanding through capital investments. As a result, ClassicBank isn&#8217;t likely to focus on developing digital products. Its IT infrastructure will expand in line with its physical branch network, and its due diligence operations will be intensive because of the high-risk nature of its investments.</p><p><strong>DigitalBank</strong> on the other hand, is a fully digital, branchless bank. It targets young professionals, especially those in the tech-savvy white-collar workforce. Its goal is to offer an exceptional user experience while making stock and crypto investments more accessible. DigitalBank earns primarily from consumer loans and transaction fees in the stock and crypto markets. Its growth strategy is centered on constantly increasing its customer base by improving digital products and user experiences. DigitalBank is continuously partnering with new stores and subscription services to offer discounts, cashback, and other benefits to attract customers. Because it has no physical branches, DigitalBank aims to rapidly scale its customer base through digital channels. This means the bank will likely invest heavily in software development and cloud-based infrastructure to keep up with its growing user load.</p><p>So, while both ClassicBank and DigitalBank operate in the same industry, their business models and their growth strategies are completely different. ClassicBank focuses on attracting a few high-value customers and growing through capital investments, while DigitalBank expands by offering diverse digital products and targeting a large base of individual consumers.</p><div><hr></div><h3>Translating Growth Strategy to CTI Priorities</h3><p>We&#8217;ll now dive deeper into the cyber security priorities (and by extension the CTI priorities) of these two fictional banks. But first, let&#8217;s quickly compare their key characteristics side by side.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GjNX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GjNX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png 424w, https://substackcdn.com/image/fetch/$s_!GjNX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png 848w, https://substackcdn.com/image/fetch/$s_!GjNX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png 1272w, https://substackcdn.com/image/fetch/$s_!GjNX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GjNX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png" width="1456" height="533" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/af260c86-91ee-4f39-841d-26431b29380f_1673x612.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:533,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:157662,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/182321931?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GjNX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png 424w, https://substackcdn.com/image/fetch/$s_!GjNX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png 848w, https://substackcdn.com/image/fetch/$s_!GjNX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png 1272w, https://substackcdn.com/image/fetch/$s_!GjNX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faf260c86-91ee-4f39-841d-26431b29380f_1673x612.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now that we've compared the two banks, let's delve into how their growth strategies translate into cybersecurity and threat intelligence priorities.</p><h3>1. ClassicBank</h3><p>ClassicBank&#8217;s security priorities primarily focus on protecting the high-net-worth individual client data. This data is not only critical to maintaining the bank&#8217;s reputation but also directly impacts high-risk investment decisions. Therefore, ensuring the security of this information is a key element of the bank&#8217;s overall strategy.</p><p>The second priority is securing the due diligence data of the companies ClassicBank is evaluating for potential investments. During the investment analysis process, safeguarding the trade secrets and financial information of these companies is crucial. A breach here could seriously threaten the bank&#8217;s financial interests, making this an area of high focus in their cybersecurity efforts.</p><p>Third, managing the cyber risks associated with the bank&#8217;s direct investments is important. These investments often involve high-risk financial assets, and protecting them from cyber threats is essential. ClassicBank must have measures in place to protect its investments from external threats like cyber attacks or data breaches.</p><p>A significant portion of the attack surface comes from the bank&#8217;s IT networks, employee devices, and identity management systems. As the bank&#8217;s digital infrastructure expands alongside its physical branches, the risk of vulnerabilities in these systems grows. Network security, endpoint protection, and identity authentication are therefore central to the bank&#8217;s cybersecurity strategy.</p><p>Additionally, the risk of insider threats is a critical concern for ClassicBank. Attacks or misuse originating from within the bank, whether intentional or accidental, can pose a severe risk to its operations. Therefore, ClassicBank must implement strong security monitoring systems that can detect both internal and external threats effectively.</p><h3>2. DigitalBank</h3><p>DigitalBank&#8217;s primary security priority is protecting customer accounts and transactional integrity at scale. Unlike ClassicBank, the risk is not concentrated in a small number of high-value clients, but distributed across a massive user base. Account takeovers, credential stuffing, phishing campaigns, and fraud directly threaten revenue, customer trust, and growth. CTI efforts must therefore focus heavily on monitoring threat actors and techniques targeting consumer-facing financial platforms.</p><p>The second major priority is securing the bank&#8217;s digital products and APIs. DigitalBank&#8217;s growth strategy relies on rapid feature development, frequent integrations with third-party services, and constant iteration of its mobile and web applications. This significantly increases the attack surface. Vulnerabilities in APIs, mobile apps, or partner integrations can be exploited at scale, making application-layer threats and software supply chain risks a critical focus for CTI.</p><p>Third, DigitalBank must closely monitor threats related to cloud infrastructure and DevOps pipelines. As the bank scales its user base, it will increasingly depend on cloud-native architectures, CI/CD pipelines, and infrastructure-as-code. Misconfigurations, leaked credentials, and attacks targeting cloud service providers or developer tooling represent systemic risks. CTI must therefore track emerging attack patterns targeting cloud environments and developer ecosystems.</p><p>Fraud and abuse also play a central role in DigitalBank&#8217;s threat landscape. Because the bank earns revenue from consumer loans and transaction fees, fraud directly impacts profitability. Intelligence related to fraud rings, mule networks, synthetic identities, and emerging social engineering techniques is essential. </p><div><hr></div><h3>Why This Matters for CTI Planning</h3><p>ClassicBank and DigitalBank operate in the same industry, face many of the same regulatory requirements, and are targeted by overlapping threat actors. Yet their CTI priorities differ radically because their growth strategies, revenue models, and attack surfaces are fundamentally different.</p><p>CTI is only effective when it is scoped to real decision-making. Threat landscapes, incident history, and control gaps are useful inputs, but they are incomplete on their own. If CTI priorities are not informed by how the business operates and plans to scale, intelligence efforts will skew reactive and gradually lose relevance.</p><p>Anchoring CTI planning to business models and growth strategies helps identify where risk is likely to concentrate next, not just where it has appeared before. This makes prioritization more defensible, resource allocation clearer, and CTI outputs easier to operationalize.</p><p>In practice, effective CTI is role-specific, business-aware, and deliberately scoped. Anything else is just reporting.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Wargaming Insights: Cost of Ineffective Incident Response]]></title><description><![CDATA[How incomplete remediation can tilt the odds in the attacker&#8217;s favor]]></description><link>https://blog.predictivedefense.io/p/wargaming-insights-cost-of-ineffective</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/wargaming-insights-cost-of-ineffective</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Thu, 04 Dec 2025 13:16:27 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!xnGz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>In the first article of our Wargaming Insights series, we used a Markov Chain to model a simple attack scenario. We then compared two strategies Defense-in-Depth (preventive) and Detection &amp; Response (reactive) and discussed their effectiveness.</p><p>Since our primary goal in that initial piece was to demonstrate the use of Markov processes, we intentionally over simplified the detection and incident response components of the model.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>If you&#8217;d like to dive into the details of that simulation, you can check out the article below. It&#8217;s highly recommended for anyone looking to gain a solid understanding of the simulation approach we will use in this post.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;20b3e5d8-45bf-454b-b9f5-8897fce6f9c5&quot;,&quot;caption&quot;:&quot;In the 1980s, the US faced an overwhelming Soviet nuclear arsenal. The conventional wisdom held that any shield arrayed against them would have to be virtually perfect. Wargames explored the impact of US missile defenses on Soviet offensive planning. Interestingly, even a modest 15% defense capability forced the Soviets to exhaust their arsenal before a&#8230;&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;md&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Wargaming Insights: Is Investing in a SOC Worth It?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2025-04-25T23:40:33.383Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/$s_!59XH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/wargaming-insights-is-investing-in&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:162160660,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:4,&quot;comment_count&quot;:0,&quot;publication_id&quot;:2565759,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!U1fy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>One of the core assumptions in our initial simulation was this: once an incident response process is triggered after detecting an attack, it would <em>always</em> result in completely eradicating the attacker from the system. However, real-world incident response is far more complex than that.</p><p>Due to various factors that affect incident response such as limited visibility, access restrictions, poor planning, or miscommunication, remediation from an incident is not always 100% successful. For example, while a backdoor left by the attacker might be removed, the vulnerability that enabled the intrusion may remain unpatched or the passwords for compromised accounts may never be reset. In another scenario, during a spear-phishing campaign that infects multiple employees in the same organization the response team might fail to identify all victims and end up remediating only a single device.</p><p>In such cases, even if the threat is detected and an incident response process is initiated, the attacker may not be fully removed from the environment. And more often than not, this leaves systems vulnerable to being compromised again. Therefore there is always a chance of an incomplete response during a real incident. If this happens the attacker moves back to one of the previous steps.</p><p>If we model this dynamic with a Markov chain we need to draw arrows from each detection step back to the earlier steps. So the probabilities after the &#8220;detected&#8221; step follow the red path shown in the graphic below.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UC_n!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UC_n!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png 424w, https://substackcdn.com/image/fetch/$s_!UC_n!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png 848w, https://substackcdn.com/image/fetch/$s_!UC_n!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png 1272w, https://substackcdn.com/image/fetch/$s_!UC_n!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UC_n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png" width="1456" height="654" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:654,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:160266,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/180652200?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UC_n!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png 424w, https://substackcdn.com/image/fetch/$s_!UC_n!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png 848w, https://substackcdn.com/image/fetch/$s_!UC_n!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png 1272w, https://substackcdn.com/image/fetch/$s_!UC_n!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F06a2e1f4-bf5a-4901-be60-d3ad855615ee_1912x859.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The full attack chain would look like the diagram below. After each <em>detected</em> step, there is an X% chance of complete remediation; otherwise the process randomly returns to one of the previous steps.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xnGz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xnGz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png 424w, https://substackcdn.com/image/fetch/$s_!xnGz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png 848w, https://substackcdn.com/image/fetch/$s_!xnGz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png 1272w, https://substackcdn.com/image/fetch/$s_!xnGz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xnGz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png" width="1456" height="855" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:855,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:671301,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/180652200?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xnGz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png 424w, https://substackcdn.com/image/fetch/$s_!xnGz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png 848w, https://substackcdn.com/image/fetch/$s_!xnGz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png 1272w, https://substackcdn.com/image/fetch/$s_!xnGz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4e922d4-649f-4f6f-b37b-006c513a6c95_3284x1928.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p>Disclaimer: Please note that the models in this post are deliberately oversimplified. They are designed to demonstrate the application of Markov Chains in simulation modeling. As such, they abstract away many real-world factors such as adaptive attacker behavior, response times, and cost of implementation. A more detailed model could be built to incorporate those factors, but that would go beyond the purpose of this post.</p></div><h3>Modeling the Intrusion Chain</h3><p>Now we will simulate our intrusion chain model using Python code. As you can see, since our new model includes backtrack connections, we can no longer perform a formal solution the way we did in the first article. Instead, we&#8217;ll run this model thousands of time in Python and observe the distribution of results. This method is also known as a Monte Carlo simulation.</p><p>As a first step, let&#8217;s define our intrusion chain. As an example, I selected the TTPs from one of the <a href="https://attack.mitre.org/groups/G1052/">Lazarus Contagious Interview</a> campaigns. The final stage of our attack is the <em>&#8221;Exfiltration over C2 Channel&#8221;</em> step. In our simulation, an attacker who reaches this step will be considered successful.</p><pre><code># -----------------------------
# ATTACK CHAIN OF CONTAGIOUS INTERVIEW (Lazarus Group)
# -----------------------------
STATES = [
    &#8220;Initial Access &#8211; Phishing Attachment (T1566.001)&#8221;,
    &#8220;Execution &#8211; Mshta (T1170)&#8221;,
    &#8220;Persistence &#8211; Setup Folder (T1060)&#8221;,
    &#8220;Discovery - Process Discovery (T1057)&#8221;,
    &#8220;Collection &#8211; Data from Local System (T1005)&#8221;,
    &#8220;Exfiltration &#8211; Over C2 Channel (T1041)&#8221; # final state
]</code></pre><p>When building the chain, an important point is to choose attack steps that can genuinely be treated as distinct from one another. Our simulation relies on the assumption that if an attacker is stopped at step <em>N</em>, they can fall back to step <em>N&#8211;1</em>. But if steps <em>N</em> and <em>N&#8211;1</em> aren&#8217;t truly separate (if they operate together as part of the same activity) then the simulation becomes inaccurate.</p><p>For example, an attacker might use multiple techniques at once for C2 communication, such as <em>Encrypted Channels</em> and <em>Non-Standard Port</em>. Even though these are listed as separate MITRE ATT&amp;CK techniques, in practice they are not independent steps. An attacker detected and pushed back at the &#8220;Non-Standard Port&#8221; stage wouldn&#8217;t realistically revert to an &#8220;Encrypted Channels&#8221; stage.</p><p>So these steps should be merged into a single consolidated phase (e.g: &#8220;Command and Control&#8221;) before constructing the chain.</p><div><hr></div><h3>Running the Monte Carlo Simulation</h3><p>Below function will execute a single run of the Monte Carlo simulation. Conceptually, it works as follows:</p><ul><li><p>The attacker starts at the first step of the intrusion chain (<code>state_index = 0</code>).</p></li><li><p>At each iteration, the model draws a random number to determine whether the attacker is detected or remains undetected.</p></li><li><p>If the attacker is <strong>not detected</strong>, they simply advance to the next step in the chain.</p></li><li><p>If the attacker <strong>is detected</strong>:</p><ul><li><p>A second random draw decides whether the response leads to <strong>full remediation</strong>.</p><ul><li><p>If yes, the simulation ends with a <em>&#8220;Fully Remediated&#8221;</em> result.</p></li></ul></li><li><p>If remediation fails, the attacker is <strong>pushed back</strong> to a randomly selected earlier step.</p><ul><li><p>The only exception is step 0: if detection happens there, we count it as full remediation.</p></li></ul></li></ul></li><li><p>The simulation repeats this process until one of the following occurs:</p><ul><li><p>The attacker reaches the final step &#8594; <strong>&#8220;Attack Successful&#8221;</strong></p></li><li><p>A full remediation event is triggered &#8594; <strong>&#8220;Fully Remediated&#8221;</strong></p></li><li><p>The loop hits the maximum step limit &#8594; <strong>&#8220;Timeout&#8221;</strong></p></li></ul></li></ul><p>This structure lets the simulation capture the dynamics of a real intrusion where detection may push the attacker back rather than eliminate them outright.</p><pre><code># -----------------------------
# SIMULATION FUNCTION
# -----------------------------
def run_single_simulation(P_REMEDIATED, P_DETECTED, max_steps=2000):
    P_UNDETECTED = 1 - P_DETECTED
    state_index = 0
    steps = 0

    while steps &lt; max_steps:
        steps += 1
        if state_index &gt;= len(STATES) - 1:
            return &#8220;Attack Successful&#8221;

        rnd = np.random.rand()

        # 1) Undetected &#8594; move forward
        if rnd &lt; P_UNDETECTED:
            state_index += 1
            continue
        else:
            # detected &#8594; full remediation or partial remediation
            rnd2 = np.random.rand()
            if rnd2 &lt; P_REMEDIATED:
                return &#8220;Fully Remediated&#8221;
            else:
                if state_index == 0:
                    return &#8220;Fully Remediated&#8221;
                state_index = np.random.choice(np.arange(0, state_index))

    return &#8220;Timeout&#8221;
</code></pre><p>Let&#8217;s run our simulation using a baseline assumption of a <strong>10% detection probability</strong> per step. In each simulation batch, we increase the incident response effectiveness by 1%, and we repeat this process until it reaches 100%. In other words, we&#8217;re trying to answer <strong>If I can detect 10% of all attack steps, how does improving incident response effectiveness affect the attacker&#8217;s overall success rate?</strong></p><p>After running the simulation, we plot the results as shown below. As you can see, increasing incident response effectiveness reduces the attacker&#8217;s success rate from around 87% down to roughly 60%.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TDMz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb718991e-8126-41b2-b315-115ee8523799_768x470.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TDMz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb718991e-8126-41b2-b315-115ee8523799_768x470.png 424w, https://substackcdn.com/image/fetch/$s_!TDMz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb718991e-8126-41b2-b315-115ee8523799_768x470.png 848w, https://substackcdn.com/image/fetch/$s_!TDMz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb718991e-8126-41b2-b315-115ee8523799_768x470.png 1272w, https://substackcdn.com/image/fetch/$s_!TDMz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb718991e-8126-41b2-b315-115ee8523799_768x470.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TDMz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb718991e-8126-41b2-b315-115ee8523799_768x470.png" width="768" height="470" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b718991e-8126-41b2-b315-115ee8523799_768x470.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:470,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TDMz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb718991e-8126-41b2-b315-115ee8523799_768x470.png 424w, https://substackcdn.com/image/fetch/$s_!TDMz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb718991e-8126-41b2-b315-115ee8523799_768x470.png 848w, https://substackcdn.com/image/fetch/$s_!TDMz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb718991e-8126-41b2-b315-115ee8523799_768x470.png 1272w, https://substackcdn.com/image/fetch/$s_!TDMz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb718991e-8126-41b2-b315-115ee8523799_768x470.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Simulating Various Detection Probabilities</h3><p>How does the effectiveness of incident response influence attacker success across different detection probabilities? To explore this, we&#8217;ll run a series of simulations using the same model. This time, we&#8217;ll repeat the previous simulation multiple times, starting with a detection probability of 5% and increasing it by 5% in each iteration, continuing until we reach 50%.</p><p>A detection probability of 50% means that we can detect roughly one out of every two steps the attacker takes. In other words, if the entire intrusion chain consists of six steps, we would be able to detect about three of them. You can think of the detection probability as how many TTPs in the intrusion chain your detection rules are able to cover.</p><p>When we run the simulation repeatedly across this range of probabilities, we get the following results.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uSPW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uSPW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png 424w, https://substackcdn.com/image/fetch/$s_!uSPW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png 848w, https://substackcdn.com/image/fetch/$s_!uSPW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png 1272w, https://substackcdn.com/image/fetch/$s_!uSPW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uSPW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png" width="949" height="590" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/aa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:590,&quot;width&quot;:949,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uSPW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png 424w, https://substackcdn.com/image/fetch/$s_!uSPW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png 848w, https://substackcdn.com/image/fetch/$s_!uSPW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png 1272w, https://substackcdn.com/image/fetch/$s_!uSPW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Faa2bb4b1-9e32-4bec-9e69-e090aa640f7e_949x590.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In each simulation, we represent the overall impact of incident response on attack success using the <em>delta</em> variable. For example in our first simulation (the dark purple line at the top), when the detection probability is 5%, increasing incident response effectiveness reduces the attacker&#8217;s chances of success by up to 16%. (&#916; = 0.16)</p><p>When we test across different levels of detection coverage, we see that incident response effectiveness reduces the attacker&#8217;s success rate by an average of 22%. But more realistically, by somewhere between 25% and 35%.</p><p>A particularly interesting takeaway is that incident response effectiveness has relatively little impact on attack success at very low or very high detection rates (&#916; = 0.16 and &#916; = 0.06, respectively). In other words, <strong>incident response effectiveness becomes most critical when detection coverage is partial</strong>. This was a result I didn&#8217;t expect to see at the start of the analysis.</p><div><hr></div><h3>Conclusion</h3><p>Our simulations yield the following key lessons for security leaders:</p><p><strong>Prioritize improving detection coverage when it is very low.</strong><br>If detection gaps are significant, enhancing coverage should be the first step, as improvements here provide the greatest reduction in attacker success.</p><p><strong>Focus on incident response effectiveness when partial detection exists.</strong><br>When planning against an intrusion chain with <em>known detection gaps</em>, prioritize improving the response playbook as it can significantly reduce the attacker&#8217;s chances of success. This may include automating key response actions to ensure timely and reliable mitigation.</p><p><strong>Use simulations to guide strategy.</strong><br>Monte Carlo-style simulations, as demonstrated here, provide a practical way to model the impact of different detection and response strategies. You may use these techniques to enable informed, data-driven decisions in complex security environments.</p><div><hr></div><h3>Limitations</h3><p>The simulation presented in this article does not fully capture the dynamics of real-world incident response processes. In this sense, there are several important limitations to keep in mind:</p><p><strong>1. Time-to-Respond is not modeled.</strong><br>Our simulation assumes that as soon as a step of an attack is detected, the response can be executed immediately. In reality, detection, triage, investigation, and response can take days or even weeks to complete. This delay gives the attacker a critical window of opportunity to advance to subsequent steps. Therefore, when planning real-world incident response, the Time-to-Respond must be accounted for unless the response steps are fully automated.</p><p><strong>2. Attacker adaptation is ignored.</strong><br>The simulation assumes that if an attacker fails at a particular step, they will simply repeat the same actions as it did before. This overlooks the attacker&#8217;s ability to adapt. In reality, unless the attack itself is fully automated, attackers typically adjust their tactics when encountering failure and attempt alternative approaches. As a result, the detection probability assumed at the beginning of an intrusion gradually decreases as the attacker adapts. Addressing this limitation would require a more sophisticated modeling approach.</p><p>Ultimately, while simulations are very useful tools for decision-making, we must be aware of their limitations and continue refining our models to better capture real-world dynamics. Only then can we make truly informed and reliable security decisions.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Threat Intelligence Essentials: Which Customer Are You Serving?]]></title><description><![CDATA[Most CTI programs fail because nobody asked who the intel was for.]]></description><link>https://blog.predictivedefense.io/p/threat-intelligence-essentials-which</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/threat-intelligence-essentials-which</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Mon, 01 Dec 2025 01:01:43 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/d3b6ba05-9877-4dad-8ce2-c59058b7fe26_1521x1367.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Cyber threat intelligence aims to support decision making across different layers of security operations. But in practice, teams often overlook one simple fact: people at different levels have different needs. If our understanding of their day to day responsibilities is only surface level, the intelligence team cannot truly help them. This is also the core problem with many CTI products. They serve the same data, the same dashboards, and the same reports to everyone regardless of their role or seniority. Yet the question <em>&#8220;Who is my customer?&#8221;</em> is the most important one.</p><p>In this post, the goal is to define these customer profiles and take a quick look at the types of problems each one deals with. For simplicity, I&#8217;ll group all cybersecurity roles (offensive or defensive) into three categories: Analysts, Engineers, and Leaders.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v_wj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v_wj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png 424w, https://substackcdn.com/image/fetch/$s_!v_wj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png 848w, https://substackcdn.com/image/fetch/$s_!v_wj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png 1272w, https://substackcdn.com/image/fetch/$s_!v_wj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v_wj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png" width="610" height="548.4134615384615" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1309,&quot;width&quot;:1456,&quot;resizeWidth&quot;:610,&quot;bytes&quot;:781410,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/180361875?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!v_wj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png 424w, https://substackcdn.com/image/fetch/$s_!v_wj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png 848w, https://substackcdn.com/image/fetch/$s_!v_wj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png 1272w, https://substackcdn.com/image/fetch/$s_!v_wj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46fa593-5002-47e7-91f8-a0cce7921a8a_1521x1367.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>1) Analysts</h3><h5>SOC analysts, incident responders, forensic analysts, threat hunters, vulnerability analysts, pentesters&#8230;</h5><p>Analysts deal with <em>real</em> threats and <em>real</em> vulnerabilities. Their job is to identify active attacks on the organization&#8217;s systems and uncover weaknesses that could enable those attacks. In other words, they carry the majority of the operational load. Their workflow typically follows: <strong>Validation &#8594; Risk Assessment &#8594; Response.</strong></p><p>Their core challenge is reducing the time between validation and response. It&#8217;s simply not possible for them to thoroughly investigate the hundreds of potentially risky events that may appear throughout the day.</p><p>Below are the common questions analysts ask and how CTI can help answer them.</p><p><strong>Q:</strong><br><em>Is this alert actually malicious, or is it a false positive?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Hash/IP/domain reputation checks<br>&#8212; Sandbox analysis<br>&#8212; Automated malicious/benign classification via context enrichment</p><p><strong>Q:</strong><br><em>I found malicious activity on a system. How serious is this? How deep should I investigate?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Campaigns related to the artifact<br>&#8212; Adversary &#8220;actions on objective&#8221;<br>&#8212; Example cases showing real-world impact</p><p><strong>Q:</strong><br><em>I&#8217;m investigating an incident. What is the attacker&#8217;s next step likely to be? Where should I look?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Campaign or threat actor TTPs<br>&#8212; Step-by-step breakdown through MITRE ATT&amp;CK<br>&#8212; Suggested pivot points for investigation</p><p><strong>Q:</strong><br><em>I&#8217;m flooded with new CVEs every day. Which of these actually matter to me?</em></p><p><strong>How CTI helps:</strong><br>&#8212; CVE relevance filtering via asset inventory or ASM integration<br>&#8212; Automatic prioritization of organization-specific vulnerabilities</p><p><strong>Q:</strong><br><em>I found CVE-XYZ in my environment. How urgently do I need to patch this?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Active exploitation information<br>&#8212; Campaigns leveraging the vulnerability<br>&#8212; Real-world impact examples and threat actor usage frequency</p><div><hr></div><h3>2) Engineers</h3><h5>DevSecOps engineers, cloud security engineers, network/IT security engineers&#8230;</h5><p>Engineers don&#8217;t deal with threat investigation directly; their job is to build scalable systems that perform those detections and harden environments automatically. The keyword here is &#8220;scalable.&#8221; Engineers don&#8217;t solve problems case-by-case. For example, determining the sensitivity of a single hardcoded API key is an analyst&#8217;s job. But designing a system that can find that key across hundreds of repositories is the engineer&#8217;s responsibility.</p><p>They work on large scale challenges such as patch management, detection engineering, software supply chain security, and identity lifecycle management. And with large scale comes a major trade-off: <strong>the bigger the scale, the lower the accuracy.</strong><br>Understanding the importance of a few CVEs on one server is easy; scaling that to tens of thousands of servers leaves you drowning in hundreds of thousands of CVEs.</p><p>For analysts, the goal of CTI was &#8220;maximum context.&#8221;<br>For engineers, it&#8217;s the opposite: clean, structured, machine-readable data.<br>Most of the time, it&#8217;s not a human consuming the CTI. It&#8217;s the system they built.</p><p>This is why the CTI strategy for engineers is built around <strong>enrichment</strong>: improving the quality and structure of the data their systems rely on.</p><p><strong>Q:</strong><br><em>My detections produce too many false positives. How do I reduce them?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Automatic correlation with external reputation sources<br>&#8212; Normalized risk scoring<br>&#8212; Noise-reducing global allow/deny lists</p><p><strong>Q:</strong><br><em>Patch management at scale is overwhelming. How do I prioritize?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Exploitation-in-the-wild intelligence<br>&#8212; Threat actor usage patterns<br>&#8212; Sector/region-specific CVE trends<br>&#8212; Alignment with CISA KEV or similar authoritative lists</p><p><strong>Q:</strong><br><em>How do I secure our software supply chain at scale?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Compromise history of popular libraries<br>&#8212; Malicious package trends<br>&#8212; Version-level risk scoring<br>&#8212; SBOM enrichment and dependency insight</p><div><hr></div><h3>3) Leaders</h3><h5>Head of Security, Director, InfoSec Manager, CISO</h5><p>Security leaders act as the bridge between the company&#8217;s executive management and the security team. In practice this means:</p><ol><li><p>Answering questions and requests from the executive layer,</p></li><li><p>Identifying security needs and convincing leadership to invest in them.</p></li></ol><p>They often use tools like risk catalogs, maturity frameworks, SWOT analyses, and industry benchmarks. Their biggest challenge is building a compelling narrative that justifies investment. A block of forensic output or malware analysis is useless to them unless it&#8217;s translated into business-level meaning.</p><p>This is why the CTI strategy for leaders is <strong>interpretation</strong>.<br>The value comes not from raw intel, but from connecting the dots into a coherent story.</p><p><strong>Q:</strong><br><em>A new attack/vulnerability is all over the news. Does it affect us? Do I need to notify the executives?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Targeting patterns of the campaign<br>&#8212; Active exploitation status<br>&#8212; Business impact ready summaries<br>&#8212; Executive friendly briefing materials</p><p><strong>Q:</strong><br><em>A threat actor claims they have our data. Is the claim legitimate? Do I need to involve the data protection office?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Verification of leaked data (samples, patterns, previews)<br>&#8212; Dark web/voucher analysis<br>&#8212; Actor motivation and credibility<br>&#8212; Regulatory impact assessment</p><p><strong>Q:</strong><br><em>We might be impacted by campaign XYZ. What is the typical impact on its victims?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Activities observed on other victims<br>&#8212; Potential business impacts (downtime, financial loss, exposure)<br>&#8212; Actor targeting criteria<br>&#8212; Executive-level narrative translation</p><p><strong>Q:</strong><br><em>We&#8217;re preparing a use case to procure a new security product. What are the sector/regional trends? What do the attackers targeting us look like?</em></p><p><strong>How CTI helps:</strong><br>&#8212; Sector-specific threat trend reports<br>&#8212; Benchmarking against similar organizations<br>&#8212; Threat landscape summaries<br>&#8212; Adversary motivation and sophistication profiles</p><div><hr></div><h2>Conclusion</h2><p>A CTI program is only effective if it knows exactly who it serves. Analysts, engineers, and leaders consume intelligence in completely different ways, speak different languages, and expect different outputs. The goal is to deliver the right information to the right profile in the right format.</p><p>Analysts need speed.<br>Engineers need scale.<br>Leaders need narrative.</p><p>And the true value of threat intelligence lies in empowering the right decision maker at the right moment, with the right context.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Lessons from the Nucor and Thyssenkrupp Breaches]]></title><description><![CDATA[What the Nucor and Thyssenkrupp breaches reveal about cyber conflict]]></description><link>https://blog.predictivedefense.io/p/cyber-attacks-on-critical-industries</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/cyber-attacks-on-critical-industries</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Tue, 20 May 2025 13:40:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The influence of geopolitics on cyber events continues to grow, especially as critical industries are increasingly targeted. The breaches at Nucor (May 2025) and Thyssenkrupp (early 2024) are recent examples that show just how exposed key economic sectors are. Attribution is still complicated, as always, but the downstream economic impact is clear. Even the perception of a supply shortage in some industries can lead to price fluctuations, triggering a trickle-down effect throughout the entire economy. These types of attacks are not rare in the context of geopolitical conflicts, where cyber operations are used to punish countries for supporting the opposing side.</p><div><hr></div><h2>The Nucor Incident: A Disruption of Critical Industry</h2><p>In May 2025, Nucor Corporation, the largest steel producer in the U.S., fell victim to a cyberattack that led to a temporary halt in operations across several of its plants. [<a href="https://www.bleepingcomputer.com/news/security/steel-giant-nucor-corporation-facing-disruptions-after-cyberattack/">1</a>] The breach, which appears to have been a ransomware attack, disrupted production lines and forced the company to take critical IT infrastructure offline to contain the damage.</p><p>As a foundational player in steel production, Nucor supports a wide range of downstream industries, including construction, automotive, and defense. Disrupting steel manufacturing has a cascade effect: not only does it delay supply chains, but it also impacts pricing and availability across national and global markets. In macroeconomic terms, even the perception of supply instability in materials as central as steel can lead to price fluctuations and broader market volatility.</p><div><hr></div><h2>The Thyssenkrupp Incident: A Parallel in Europe</h2><p>In early 2024, German steel manufacturer Thyssenkrupp experienced a cyberattack that disrupted its automotive division, halting production at multiple facilities. [<a href="https://www.cm-alliance.com/cybersecurity-blog/thyssenkrupp-cyber-attack-timeline">2</a>] Although operational continuity was restored relatively quickly, the breach demonstrated similar systemic fragilities. As with Nucor, the attackers targeted a company that is central to its country's industrial capacity.</p><p>Thyssenkrupp&#8217;s role in Germany parallels that of Nucor in the U.S. Both firms represent critical nodes in their respective national economies. While there is no public attribution connecting these two incidents, their similar timing, scale, and strategic impact raise important questions. Particularly when examined within the context of ongoing geopolitical tensions.</p><div><hr></div><h2>Geopolitical Context: A Pattern Emerges</h2><p>According to the <em>Ukraine Support Tracker</em> by the Kiel Institute, the United States and Germany are the top two contributors of military, financial, and humanitarian aid to Ukraine. [<a href="https://www.ifw-kiel.de/topics/war-against-ukraine/ukraine-support-tracker/">3</a>] Germany, notably, is both the leading EU-level contributor and the largest individual contributor within the EU overall. The U.S. has also maintained the highest total level of assistance globally.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RVRA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RVRA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png 424w, https://substackcdn.com/image/fetch/$s_!RVRA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png 848w, https://substackcdn.com/image/fetch/$s_!RVRA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png 1272w, https://substackcdn.com/image/fetch/$s_!RVRA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RVRA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png" width="560" height="435.1414309484193" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:934,&quot;width&quot;:1202,&quot;resizeWidth&quot;:560,&quot;bytes&quot;:145070,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/164000697?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RVRA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png 424w, https://substackcdn.com/image/fetch/$s_!RVRA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png 848w, https://substackcdn.com/image/fetch/$s_!RVRA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png 1272w, https://substackcdn.com/image/fetch/$s_!RVRA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F78bc3d8b-9e66-4af8-8c13-f7005982202a_1202x934.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Concurrently, Kaspersky&#8217;s Q1 2024 ICS report shows that U.S. and German industries are the top two most-targeted globally in terms of industrial cybersecurity incidents. [<a href="https://ics-cert.kaspersky.com/publications/reports/2024/06/03/q1-2024-a-brief-overview-of-the-main-incidents-in-industrial-cybersecurity/">4</a>] This correlation between leading aid contributions and a surge in attacks on their industrial bases may not be coincidental.</p><p>While no direct attribution can be made, it is reasonable to assess the possibility that these attacks form part of a broader effort to exert economic and political pressure on the so-called "Red Allies": those nations seen as supporting Ukraine from the perspective of Russian strategic interest. Disrupting their domestic industries could serve to undermine public support, strain logistics, and signal a capability for retaliatory escalation.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!X17s!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!X17s!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png 424w, https://substackcdn.com/image/fetch/$s_!X17s!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png 848w, https://substackcdn.com/image/fetch/$s_!X17s!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png 1272w, https://substackcdn.com/image/fetch/$s_!X17s!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!X17s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png" width="1456" height="777" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:777,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:234942,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/164000697?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!X17s!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png 424w, https://substackcdn.com/image/fetch/$s_!X17s!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png 848w, https://substackcdn.com/image/fetch/$s_!X17s!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png 1272w, https://substackcdn.com/image/fetch/$s_!X17s!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3b1404ed-0928-44ae-8556-81c5e6c7e721_2406x1284.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>OT-Centric Cyber Operations as Strategic Tools</h2><p>Dragos' 2025 OT Cybersecurity report highlights the increased frequency of OT-centric cyber operations, particularly in countries involved in high-stakes geopolitical alignments. It notes that &#8220;KAMACITE and ELECTRUM continue to collaborate in support of Russian military objectives by targeting critical infrastructure in Ukraine.&#8221; [<a href="https://hub.dragos.com/hubfs/312-Year-in-Review/2025/Dragos-2025-OT-Cybersecurity-Report-A-Year-in-Review.pdf">5</a>]</p><p>Attacks on companies like Nucor and Thyssenkrupp fit this pattern. They do not aim for direct military advantage but seek instead to disrupt economic infrastructure as a potent form of coercion. Strategic OT disruptions can constrain infrastructure projects, and degrade economic resilience.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MhNV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MhNV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png 424w, https://substackcdn.com/image/fetch/$s_!MhNV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png 848w, https://substackcdn.com/image/fetch/$s_!MhNV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png 1272w, https://substackcdn.com/image/fetch/$s_!MhNV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MhNV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png" width="1456" height="664" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:664,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:203829,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/164000697?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MhNV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png 424w, https://substackcdn.com/image/fetch/$s_!MhNV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png 848w, https://substackcdn.com/image/fetch/$s_!MhNV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png 1272w, https://substackcdn.com/image/fetch/$s_!MhNV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2ad07914-32fd-4811-8f93-c6655ce4f560_2354x1074.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>From a military operations perspective, these operations align well with the concept of <strong>countervalue targeting</strong>, where the objective is not battlefield dominance but the degradation of assets critical to national morale and function. [<a href="https://en.wikipedia.org/wiki/Countervalue">6</a>] This contrasts with counterforce strategies that target military capabilities directly.</p><p>Moreover, analysis methods like ASCOPE/PMESII can help anticipate where such attacks might occur. The IPB/IPOE process emphasizes understanding the adversary's centers of gravity for the most economic use of force. [<a href="https://www.airuniversity.af.edu/Portals/10/ASPJ/journals/Chronicles/Satterly.pdf">7</a>] In this light, Nucor and Thyssenkrupp could be seen as predictable targets due to their central roles in national infrastructure.</p><p>These campaigns may aim not just to degrade supply chains but to control narrative. Causing domestic concern, triggering economic ripple effects, and ultimately deterring future alignment or support for Ukraine. If you&#8217;re interested in this type of analysis, feel free to check out our post below.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;447b904a-160c-4c90-afb3-8aeaa613cbfc&quot;,&quot;caption&quot;:&quot;Introduction&quot;,&quot;cta&quot;:&quot;Read full story&quot;,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Geopolitical Cyber Risk: Cyber Operations in Modern Warfare&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-20T13:35:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ec2ec3e2-a646-40f9-b644-4759f8bfd5f8_1024x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/geopolitical-cyber-risk-cyber-operations&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:144038236,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h3>Curious About More? Join Our Workshop </h3><p>I will be leading a specialized <strong>Geopolitical Cyber Threat Intelligence Workshop</strong> on <strong>21&#8211;22 June 2025</strong>, designed for cybersecurity professionals, CTI analysts, and cyber risk teams looking to understand how geopolitical tensions translate into cyber threats.</p><p>This two-day, instructor-led workshop focuses on the role of cyber operations in advancing political, economic, and military objectives. Drawing on real-world conflicts and intelligence methodologies, the course offers a structured approach to geopolitical threat analysis, strategic foresight, and cyber risk forecasting.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://store.predictivedefense.io/l/workshop-geopolitical-cti&quot;,&quot;text&quot;:&quot;Register Now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://store.predictivedefense.io/l/workshop-geopolitical-cti"><span>Register Now</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Wargaming Insights: Is Investing in a SOC Worth It?]]></title><description><![CDATA[A Markov Chain Simulation to compare two competing strategies]]></description><link>https://blog.predictivedefense.io/p/wargaming-insights-is-investing-in</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/wargaming-insights-is-investing-in</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Fri, 25 Apr 2025 23:40:33 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!59XH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In the 1980s, the US faced an overwhelming Soviet nuclear arsenal. The conventional wisdom held that any shield arrayed against them would have to be virtually perfect. Wargames explored the impact of US missile defenses on Soviet offensive planning. Interestingly, even a modest 15% defense capability forced the Soviets to exhaust their arsenal before achieving all objectives. Because of its concern about taking out high-priority targets that might be defended, Moscow had to add to its original operations plan in almost every case.</p><p>This story, taken from <em><a href="https://www.google.de/books/edition/Wargaming_for_Leaders_Strategic_Decision/FRKSW44k5V8C">Wargaming for Leaders</a></em>, illustrates how simulations can help to understand the impact of strategies on adversary decision-making. In the context of cyber security, wargaming can be used to simulate different threat scenarios and test how various defense strategies might influence the outcome of those attacks.</p><h3>What is Wargaming?</h3><p>Wargaming is a method of simulating attack and defense scenarios to evaluate how different strategies affect the outcome of an adversary&#8217;s actions.</p><p>By using wargaming, security teams can model cyber threat scenarios, apply different defense measures (like firewalls, endpoint protection, and SOCs), and observe how these defenses alter the attacker&#8217;s likelihood of success. This provides a better understanding of where resources should be allocated and how to improve defense measures.</p><p>In this post, we&#8217;ll use wargaming to evaluate <strong>whether investing in security detection and response capabilities is worthwhile</strong>. The approach involves modeling a simple cyber intrusion as a Markov Chain and adding a detection step to analyze how it affects the likelihood of a successful attack.</p><p>If you wonder what Markov Chains are, check out our previous blog post on this topic:</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;d156adb8-6410-4eb7-826b-3e251ad3a02a&quot;,&quot;caption&quot;:&quot;Enjoyed this post? Explore more in my E-book \&quot;Geopolitical Cyber Risk Analysis Handbook\&quot;! - predictivedefense.io&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Filling the Gap in Risk Management: Probabilistic Threat Modeling&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-08-22T01:06:11.193Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/filling-the-gap-in-risk-management&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:147985696,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:false,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="pullquote"><p><strong>Disclaimer:</strong> Please note that the models in this post are deliberately oversimplified. They are designed to demonstrate the application of Markov Chains in simulation modeling. As such, they abstract away many real-world factors such as adaptive attacker behavior, response times, and cost of implementation. A more detailed model could be built to incorporate those factors, but that would go beyond the purpose of this post.</p></div><h3>Strategy 1: Prevention Only</h3><p>In this first Markov Chain model, we simulate a scenario where there are no detection or response capabilities, relying solely on preventive measures. Each step of the attack is represented by a probability of success, reflecting how likely the attacker is to complete each phase of the attack.</p><p>There are four layers of preventive controls:</p><ol><li><p>Email filtering to block potentially malicious emails.</p></li><li><p>Security awareness training to reduce the click-through rate of phishing emails.</p></li><li><p>Malware protection to prevent the execution of malicious files.</p></li><li><p>Data loss prevention systems to block the exfiltration of sensitive data.</p></li></ol><p>By measuring the false negative and true positive rates of each layer, we can calculate the probabilities of success. For example, phishing emails reported by employees would be considered false negatives for our email filtering control.</p><p>Here&#8217;s how the Markov chain looks like for this scenario:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!59XH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!59XH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png 424w, https://substackcdn.com/image/fetch/$s_!59XH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png 848w, https://substackcdn.com/image/fetch/$s_!59XH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png 1272w, https://substackcdn.com/image/fetch/$s_!59XH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!59XH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png" width="404" height="471.5240793201133" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:824,&quot;width&quot;:706,&quot;resizeWidth&quot;:404,&quot;bytes&quot;:53331,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/162160660?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!59XH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png 424w, https://substackcdn.com/image/fetch/$s_!59XH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png 848w, https://substackcdn.com/image/fetch/$s_!59XH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png 1272w, https://substackcdn.com/image/fetch/$s_!59XH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69d46b1f-1b25-48da-976a-6bbc3d84e3df_706x824.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>To calculate the overall probability of success, we multiply the success probabilities at each step:</p><div class="pullquote"><p>P = 0.9 &#215; 0.8 &#215; 0.85 &#215; 1.0 &#215; 1.0 &#215; 0.8 = 0.4896</p></div><p>This means the attacker has a <strong>48.96% probability</strong> of success against this defensive strategy.</p><div><hr></div><h3>Strategy 2: Detection &amp; Response</h3><p>In the second Markov Chain, we add detection as an additional control. For each attack step, there&#8217;s now a <strong>10% chance</strong> of the attack being detected. Once detected, the attack has a 10% chance of triggering an incident response, which mitigates it. Here&#8217;s how the progression looks with detection in place:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SlY5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SlY5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png 424w, https://substackcdn.com/image/fetch/$s_!SlY5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png 848w, https://substackcdn.com/image/fetch/$s_!SlY5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png 1272w, https://substackcdn.com/image/fetch/$s_!SlY5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SlY5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png" width="1437" height="910" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:910,&quot;width&quot;:1437,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:101873,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/162160660?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!SlY5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png 424w, https://substackcdn.com/image/fetch/$s_!SlY5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png 848w, https://substackcdn.com/image/fetch/$s_!SlY5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png 1272w, https://substackcdn.com/image/fetch/$s_!SlY5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea0dea4a-a8de-4bb9-8b90-4da2299331e5_1437x910.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now, we calculate the combined success probability with detection and response by multiplying the success and detection survival rates at each step:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hX6F!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hX6F!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png 424w, https://substackcdn.com/image/fetch/$s_!hX6F!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png 848w, https://substackcdn.com/image/fetch/$s_!hX6F!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png 1272w, https://substackcdn.com/image/fetch/$s_!hX6F!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hX6F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png" width="524" height="287.87654320987656" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:534,&quot;width&quot;:972,&quot;resizeWidth&quot;:524,&quot;bytes&quot;:85944,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/162160660?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hX6F!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png 424w, https://substackcdn.com/image/fetch/$s_!hX6F!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png 848w, https://substackcdn.com/image/fetch/$s_!hX6F!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png 1272w, https://substackcdn.com/image/fetch/$s_!hX6F!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F11dfe33b-8fb8-454c-bfe7-62498e237edb_972x534.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p>P = 0.81 &#215; 0.72 &#215; 0.765 &#215; 0.9 &#215; 0.9 &#215; 0.72 = 0.2601</p></div><p>With detection &amp; response procedures in place the attacker now has only a <strong>26% probability</strong> of success.</p><div><hr></div><h3>Attempts Needed to Succeed</h3><p>We can now compare how many attempts an attacker would need to succeed in both scenarios. This is done by calculating the expected number of attempts (1 divided by the success probability) for each condition:</p><div class="pullquote"><p><strong>Strategy #1:</strong>  1 &#247; 0.48 = 2 attempts</p><p><strong>Strategy #2:</strong> 1 &#247; 0.26 = ~3.84 attempts</p></div><p>Adding a <strong>10% detection probability</strong> nearly doubles the difficulty for the attacker, from around <strong>2 attempts</strong> to <strong>3.84 attempts</strong> to succeed.</p><p>To better understand how different defensive strategies impact the attack outcome, we&#8217;ll compare two performance scale plots. Each plot highlights how <strong>detection capabilities</strong> and <strong>layered defenses</strong> scale differently in terms of difficulty for attackers to reach its goal.</p><div><hr></div><h3>Defense in Depth Performance</h3><p>This plot shows how Difficulty increases in multiplies as more defense layers are added, with blocking success ranging from 10% to 50%.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kn2J!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kn2J!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png 424w, https://substackcdn.com/image/fetch/$s_!kn2J!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png 848w, https://substackcdn.com/image/fetch/$s_!kn2J!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png 1272w, https://substackcdn.com/image/fetch/$s_!kn2J!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kn2J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png" width="580" height="358.6390532544379" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:836,&quot;width&quot;:1352,&quot;resizeWidth&quot;:580,&quot;bytes&quot;:190970,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/162160660?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!kn2J!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png 424w, https://substackcdn.com/image/fetch/$s_!kn2J!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png 848w, https://substackcdn.com/image/fetch/$s_!kn2J!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png 1272w, https://substackcdn.com/image/fetch/$s_!kn2J!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4887b734-73ac-441f-9e37-d628a20e3b60_1352x836.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>How to interpret this plot:</strong></p><ul><li><p>When layers individually block a higher percentage of attacks (e.g., 40&#8211;50%), difficulty multiplies sharply with each additional layer.</p></li><li><p>With lower blocking rates (e.g., 10&#8211;20%), difficulty still increases, but at a slower rate.</p></li><li><p>The shape of the curves depends strongly on the blocking effectiveness of each layer.</p></li></ul><p><strong>Insight:</strong><br>This strategy scales more effectively with the quality of individual layers than with the number of layers themselves. Therefore, focusing solely on the number of defenses without considering the efficiency of each layer will lead to a suboptimal strategy.</p><div><hr></div><h3>Detection and Response Performance</h3><p>This second plot shows the relationship between Detection Success (%) and the difficulty for an attacker to achieve its objective. <em><strong>This scenario assumes that the incident response will completely eradicate the threat.</strong></em> However in reality, this is less often the case due to inefficiencies in incident response procedures.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Bx22!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Bx22!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png 424w, https://substackcdn.com/image/fetch/$s_!Bx22!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png 848w, https://substackcdn.com/image/fetch/$s_!Bx22!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png 1272w, https://substackcdn.com/image/fetch/$s_!Bx22!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Bx22!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png" width="580" height="417.439446366782" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1156,&quot;resizeWidth&quot;:580,&quot;bytes&quot;:95711,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://blog.predictivedefense.io/i/162160660?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Bx22!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png 424w, https://substackcdn.com/image/fetch/$s_!Bx22!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png 848w, https://substackcdn.com/image/fetch/$s_!Bx22!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png 1272w, https://substackcdn.com/image/fetch/$s_!Bx22!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd9a5ed89-fce7-4db0-a644-e48bf99f896a_1156x832.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><strong>How to interpret this plot:</strong></p><ul><li><p>As detection success improves, difficulty for the attacker increases polynomially.</p></li><li><p>As detection success moves higher (e.g., 40% to 50%), the difficulty rises much more steeply.</p></li></ul><p><strong>Insight:</strong><br>A detection and response strategy becomes more effective against attackers as it scales. The key idea is that the cost of implementing detection at all layers is lower than the cost of preventive controls at each layer. This allows the strategy to scale by improving detection efficiency, whereas a preventive strategy requires considering the cost of defense at each individual layer. But it's also important to note that the effectiveness of this strategy depends on efficient incident response, which must be factored in as well.</p><p>Let&#8217;s compare the two strategies: </p><ul><li><p>With three layers of preventive controls, each blocking 50% of attacks, the difficulty for the attacker <em><strong>increases by 8x</strong></em>. (Defense in Depth)</p></li><li><p>To achieve the same effectiveness with the second strategy, <em>only 30% detection success per step is needed</em>. (Detection and Response)</p></li></ul><div><hr></div><h3>Conclusion</h3><p>Wargaming can be an effective way to test different cybersecurity strategies and understand their potential impact on an attack's success.</p><p><strong>The precision of the numbers aren't important, nor are they particularly reliable.</strong></p><p>Instead, what really matters is the directional insight: even limited detection capabilities can significantly disrupt intrusions, essentially showing that a SOC acts as a powerful force multiplier.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Principles of Predictive Threat Intelligence]]></title><description><![CDATA[Deliver high-quality predictive intelligence using these four principles.]]></description><link>https://blog.predictivedefense.io/p/principles-of-predictive-threat-intelligence</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/principles-of-predictive-threat-intelligence</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Fri, 10 Jan 2025 20:25:51 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4Nil!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>Predictive intelligence is emerging as a critical component of proactive defense strategies, as noted by authorities like MITRE, GARTNER, and others, offering the capability to anticipate, prepare for, and mitigate threats before they fully materialize. As with any emerging field, there is no agreed-upon definition of what predictive intelligence should look like. As a result, predictive threat intelligence reports in the industry vary widely, making it more difficult for consumers to operationalize them.</p><p>To address this issue, this post proposes four principles deemed essential for making high-quality predictions. These principles are encapsulated in the acronym <strong>PART:</strong> Probabilistic, Actionable, Responsive and Time-bound.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4Nil!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4Nil!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png 424w, https://substackcdn.com/image/fetch/$s_!4Nil!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png 848w, https://substackcdn.com/image/fetch/$s_!4Nil!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png 1272w, https://substackcdn.com/image/fetch/$s_!4Nil!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4Nil!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png" width="356" height="356" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a46ceac7-02af-450a-a94b-5f1778e115db_794x794.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:794,&quot;width&quot;:794,&quot;resizeWidth&quot;:356,&quot;bytes&quot;:59942,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4Nil!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png 424w, https://substackcdn.com/image/fetch/$s_!4Nil!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png 848w, https://substackcdn.com/image/fetch/$s_!4Nil!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png 1272w, https://substackcdn.com/image/fetch/$s_!4Nil!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa46ceac7-02af-450a-a94b-5f1778e115db_794x794.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now let&#8217;s break down these principles and explore how they should be implemented.</p><div><hr></div><h3>1. Probabilistic</h3><p>When performing predictive analysis, we must evaluate the likelihood of each scenario that is being considered. A high-quality product must assign probabilities or confidence levels to those forecasts.</p><p>Probabilistic models can leverage statistical methods, machine learning, and historical data. Confidence levels in the end product can be quantitative (&#8220;There is a 70% chance of a ransomware attack&#8221;) as well as categorical (&#8220;High likelihood&#8221;) depending on the case. Through this, decision-makers will be able to allocate resources more effectively. </p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;1cd6c3cb-9337-47a7-bb80-da7302a891e7&quot;,&quot;caption&quot;:&quot;Introduction&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Predictive Defense: How to build Early Warning System with examples&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-20T09:43:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/67b3a2b9-c339-42a9-b198-15f08d73168a_1792x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/predictive-defense-how-to-build-early&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:144030115,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>Take a look at the following example from the above post, notice the quantitative probability attached to it:</p><div class="pullquote"><p>If accounts belonging to our organization or our customers have been leaked in publicly shared Infostealer logs (and data breaches), there is a 40% probability that a DDoS/credential stuffing attack will occur within two weeks.</p></div><p>This insight was derived from observing a moderate correlation between events from two data sources: SIEM and identity intelligence.</p><p>Furthermore, you can watch the &#8220;Infostealer infections&#8221; section from one of our talks to learn how probabilistic and evaluable models can be developed. Pay attention to the defined metrics used to validate the model's effectiveness and how historical back-testing was done using the available data.</p><div id="youtube2-wfz00To4I0I" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;wfz00To4I0I&quot;,&quot;startTime&quot;:&quot;840&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/wfz00To4I0I?start=840&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><div><hr></div><h3>2. Actionable</h3><p>Predictive analysis is a complex and resource-intensive process. Therefore, analyses should be done while keeping defensive capabilities in mind. There is no meaning in making predictions, if no defensive actions can be taken based on them. In your end product, pair each prediction with a set of tailored mitigation steps, such as patch recommendations, system configurations, or user awareness initiatives.</p><p>For example, take a look at the proactive countermeasures plan below:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!kaz1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!kaz1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png 424w, https://substackcdn.com/image/fetch/$s_!kaz1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png 848w, https://substackcdn.com/image/fetch/$s_!kaz1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png 1272w, https://substackcdn.com/image/fetch/$s_!kaz1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!kaz1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png" width="1456" height="583" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:583,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:492225,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!kaz1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png 424w, https://substackcdn.com/image/fetch/$s_!kaz1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png 848w, https://substackcdn.com/image/fetch/$s_!kaz1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png 1272w, https://substackcdn.com/image/fetch/$s_!kaz1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff15fa7be-1140-432c-80d8-8e908d20c3b6_1484x594.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>You can check out the following post to learn what a Proactive Countermeasure Plan is.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;6dd05d17-f376-4b92-82db-c96c82216cf3&quot;,&quot;caption&quot;:&quot;Introduction&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;From Warnings to Actions: Proactive Countermeasures Framework&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-20T09:56:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/from-warnings-to-actions-proactive&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:144030751,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h3>3. Responsive</h3><p>Forecasts often depend on specific conditions or triggers. A predictive intelligence product should articulate the conditions under which a prediction is valid and describe how changes in those conditions might alter the outcome. Decision-makers should have a clear view of the factors influencing an outcome and the reasoning behind the prediction. This way, our predictive models will be responsive to the changing circumstances.</p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;8c32a05c-a9a6-4b56-8cb6-7d6e0deb73e3&quot;,&quot;caption&quot;:&quot;Introduction&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Geopolitical Cyber Risk: War and Coercive Diplomacy&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-20T13:22:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b9d331b8-326d-400e-9012-3027c21977ac_1024x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/geopolitical-cyber-risk-war-and-coercive&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:144037769,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p>As an example, take a look at the future scenarios outlined in the post above, which describe various policy changes Turkey could adopt during the Russia-Ukraine war, along with the implications of each scenario on cyber threats to Turkey.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JFvM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JFvM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png 424w, https://substackcdn.com/image/fetch/$s_!JFvM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png 848w, https://substackcdn.com/image/fetch/$s_!JFvM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png 1272w, https://substackcdn.com/image/fetch/$s_!JFvM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JFvM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png" width="1456" height="560" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:560,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!JFvM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png 424w, https://substackcdn.com/image/fetch/$s_!JFvM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png 848w, https://substackcdn.com/image/fetch/$s_!JFvM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png 1272w, https://substackcdn.com/image/fetch/$s_!JFvM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffec676a5-8c6f-46d4-a3b3-73baed1c0c46_1600x615.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>4. Time-bound</strong></h3><p>A prediction without a temporal scope lacks utility. Predictive intelligence must specify when the threat is expected to materialize, whether in days, weeks, or longer. Use clear time frames in all outputs, and allow decision-makers to filter predictions by urgency to focus on imminent risks. For instance, a prediction about a potential attack during a high-profile event in the next 72 hours demands immediate attention and response. </p><p>Additionally, include success metrics and post-mortem analysis features to track prediction outcomes and refine models based on real-world results. This evaluability provides a feedback loop for continuous improvement and it also underscores the importance of ensuring predictions are data-driven rather than based on intuition or unverified reports. </p><div><hr></div><h3>Conclusion</h3><p>The four principles outlined in this post intends to be a guideline to creating high-quality predictive intelligence reports. It is important to remember that predictive analysis is not a one-time effort but an ongoing process that requires continuous improvement.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[What is Predictive Defense?]]></title><description><![CDATA[Predictive Defense is a concept that seeks to anticipate future threats using data analysis and structured analytical techniques.]]></description><link>https://blog.predictivedefense.io/p/what-is-predictive-defense</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/what-is-predictive-defense</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Fri, 15 Nov 2024 17:31:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!WUTJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Predictive Defense is a concept that seeks to anticipate future threats using data analysis and structured analytical techniques. The goal is to start preparations as soon as a threat is <em>perceived</em>, whereas in conventional methods the response begins only after a threat is <em>observed</em>. To understand its significance, we need to explore the limitations of traditional approaches and the advantages of this forward-looking methodology.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!WUTJ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!WUTJ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png 424w, https://substackcdn.com/image/fetch/$s_!WUTJ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png 848w, https://substackcdn.com/image/fetch/$s_!WUTJ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png 1272w, https://substackcdn.com/image/fetch/$s_!WUTJ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!WUTJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png" width="1456" height="567" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:567,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:228892,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!WUTJ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png 424w, https://substackcdn.com/image/fetch/$s_!WUTJ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png 848w, https://substackcdn.com/image/fetch/$s_!WUTJ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png 1272w, https://substackcdn.com/image/fetch/$s_!WUTJ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc77c28dc-7934-4cd7-b3d7-c00c44c9e715_3260x1270.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>Shortcomings of Reactive Defense</h3><p>According to Mandiant's report[<a href="https://cloud.google.com/blog/topics/threat-intelligence/time-to-exploit-trends-2023">1</a>], the time it takes for a vulnerability to be exploited has decreased to an average of five days. Yet, it&#8217;s widely known that many organizations still take 30 to 90 days to implement patches. This delay provides attackers with a significant window of opportunity. In ransomware attacks, for instance, attackers often deploy ransomware just six days after infiltrating a target network[<a href="https://cloud.google.com/blog/topics/threat-intelligence/ransomware-attacks-surge-rely-on-public-legitimate-tools">2</a>]. Such fast-paced operations shortens the window of opportunity for defenders to act.</p><p>Another issue is the long lead time required for cybersecurity investments to take effect. Implementing organization-wide changes is no easy task, and even the simplest controls can take months to deploy at scale. As a result, solutions designed for today&#8217;s threats may fall short at mitigating the risks by the time they are fully operational. <strong>If we can anticipate the threats we&#8217;ll face in advance, we can proactively develop the necessary measures to counter them.</strong></p><div><hr></div><h3>Axes of Uncertainty: When, Where, and How?</h3><p>To design an effective defense against cyberattacks, we must answer three fundamental questions: <strong>When</strong> will an attack occur? <strong>Where</strong> will it happen? <strong>How</strong> will it take place? Traditional methods focus on addressing the "how" and "where" through practices like penetration testing, threat hunting, and threat modeling, which helps identify the weakest points. However, the "when" has often been treated as unknowable. Risk assessments typically regard likelihood as a constant variable, whereas the probability of an attack is in fact dynamic and time-sensitive. </p><p>For example, an API key mistakenly uploaded to a public repository may be exploited by malicious actors within hours, whereas an SQL Injection vulnerability in a web application may remain unnoticed for months.</p><p>Predictive Defense tries to minimize this uncertainty, enabling organizations to <em>perceive</em> threats before they materalize.</p><p></p><h3>Methods of Predictive Defense</h3><p>Predictive Defense relies on various analysis techniques to anticipate future threats and risks. Key methods include:</p><p><strong>Wargaming (How and Where):</strong></p><ul><li><p>Wargaming involves simulating potential attack scenarios to explore how and where they might occur. For instance, it examines how an employee&#8217;s credentials might be stolen and the cascading impact this could have on critical systems. By analyzing each step of a potential attack, weaknesses are identified, and targeted defenses can be developed.</p></li></ul><p><strong>Monte Carlo Simulations (Where):</strong></p><ul><li><p>This method evaluates the likelihood and impact of potential attacks across different scenarios. It repeatedly tests various attack paths (e.g., phishing attempts, brute-force attacks, or compromised credentials) against current defenses. By simulating thousands of scenarios, it estimates the probability of a successful attack within a given timeframe, helping prioritize risks and optimize resource allocation. This method is often used in conjunction with wargaming.</p></li></ul><p><em>You can check out our blog post for more details about how to build probabilistic models.</em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;726b9964-b983-4ef3-89bf-13dd82e3da11&quot;,&quot;caption&quot;:&quot;Enjoyed this post? Explore more in my E-book \&quot;Geopolitical Cyber Risk Analysis Handbook\&quot;! - predictivedefense.io&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Filling the Gap in Risk Management: Probabilistic Threat Modeling&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-08-22T01:06:11.193Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/filling-the-gap-in-risk-management&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:147985696,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:2,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><p></p><p><strong>Early Warning System (When):</strong></p><ul><li><p>Early warning systems detect indicators of emerging threats, allowing organizations to prepare in advance. For example, an uptick in malware indicators might signal a malvertising campaign that has just started. These systems use data from past incidents and threat intelligence sources to predict the timing of potential threats, enabling ample preparation times.</p></li></ul><p><em>You can watch the following talk for more details about how to construct Early Warning Systems!</em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;0384a796-e834-4e3d-acb9-345ea7224133&quot;,&quot;caption&quot;:&quot;Introduction&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Predictive Defense: How to build Early Warning System with examples&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-20T09:43:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/67b3a2b9-c339-42a9-b198-15f08d73168a_1792x1024.webp&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/predictive-defense-how-to-build-early&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:144030115,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div id="youtube2-wfz00To4I0I" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;wfz00To4I0I&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/wfz00To4I0I?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p></p><p><strong>Geopolitical Risk Analysis (When):</strong></p><ul><li><p>Geopolitical risk analysis explores how factors like international relations, economic conditions, and regional conflicts can influence cyber threats. For instance, if a country faces sanctions, it may raise the likelihood of cyberattacks backed by that country. This analysis helps organizations better prepare for major risks, especially state-sponsored threats, by predicting how global events could trigger attacks. Common techniques used in this analysis include Indications &amp; Warnings Analysis, Signposts of Change Analysis, and Alternative Futures Analysis.</p></li></ul><p><em>You can find our book on this very topic, "Geopolitical Cyber Threat Intelligence," on Amazon!</em></p><h4><a href="https://www.amazon.com/dp/B0DGM4JKN6/">Geopolitical Cyber Threat Intelligence &#8212; by Robin Dimyanoglu</a></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://www.amazon.com/dp/B0DGM4JKN6/" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_nl2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1db68b35-1de9-4518-871b-8191bf26666b_2150x1606.png 424w, https://substackcdn.com/image/fetch/$s_!_nl2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1db68b35-1de9-4518-871b-8191bf26666b_2150x1606.png 848w, https://substackcdn.com/image/fetch/$s_!_nl2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1db68b35-1de9-4518-871b-8191bf26666b_2150x1606.png 1272w, https://substackcdn.com/image/fetch/$s_!_nl2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1db68b35-1de9-4518-871b-8191bf26666b_2150x1606.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_nl2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1db68b35-1de9-4518-871b-8191bf26666b_2150x1606.png" width="1456" height="1088" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1db68b35-1de9-4518-871b-8191bf26666b_2150x1606.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1088,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2868542,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:&quot;https://www.amazon.com/dp/B0DGM4JKN6/&quot;,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_nl2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1db68b35-1de9-4518-871b-8191bf26666b_2150x1606.png 424w, https://substackcdn.com/image/fetch/$s_!_nl2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1db68b35-1de9-4518-871b-8191bf26666b_2150x1606.png 848w, https://substackcdn.com/image/fetch/$s_!_nl2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1db68b35-1de9-4518-871b-8191bf26666b_2150x1606.png 1272w, https://substackcdn.com/image/fetch/$s_!_nl2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1db68b35-1de9-4518-871b-8191bf26666b_2150x1606.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><strong>Cone of Plausibility (Future Risks):</strong></p><ul><li><p>This forecasting tool maps possible future scenarios based on current trends and predictable variables. By outlining expected events and deviations, it provides a framework for understanding and preparing for potential risks. For instance, it can be used to assess how attackers might evolve their strategies if current credential stuffing techniques are no longer effective.</p></li></ul><p><em>You can check out our following posts for more details about how to use Cone of Plausibility for forecasting.</em></p><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;ef45b96b-1c5e-4ac9-85d0-a409104848b4&quot;,&quot;caption&quot;:&quot;Hi everyone,&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Predictive Defense: How to do cyber crime forecasting with examples&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-20T13:04:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/predictive-defense-how-to-do-cyber&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:144037080,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div class="digest-post-embed" data-attrs="{&quot;nodeId&quot;:&quot;57095298-c127-4eed-8c96-876c5e88ec3d&quot;,&quot;caption&quot;:&quot;Introduction&quot;,&quot;cta&quot;:null,&quot;showBylines&quot;:true,&quot;size&quot;:&quot;sm&quot;,&quot;isEditorNode&quot;:true,&quot;title&quot;:&quot;Trend Forecasting - How to spot the next big thing in cyber crime?&quot;,&quot;publishedBylines&quot;:[{&quot;id&quot;:227261963,&quot;name&quot;:&quot;Robin Dimyanoglu&quot;,&quot;bio&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2c68916e-4c73-4512-93f4-73a99fb29644_144x144.png&quot;,&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null}],&quot;post_date&quot;:&quot;2024-04-20T12:55:00.000Z&quot;,&quot;cover_image&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png&quot;,&quot;cover_image_alt&quot;:null,&quot;canonical_url&quot;:&quot;https://blog.predictivedefense.io/p/trend-forecasting-how-to-spot-the&quot;,&quot;section_name&quot;:null,&quot;video_upload_id&quot;:null,&quot;id&quot;:144036733,&quot;type&quot;:&quot;newsletter&quot;,&quot;reaction_count&quot;:0,&quot;comment_count&quot;:0,&quot;publication_id&quot;:null,&quot;publication_name&quot;:&quot;Predictive Defense Blog&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed49435b-696b-4060-99d8-d65468398a12_600x600.png&quot;,&quot;belowTheFold&quot;:true,&quot;youtube_url&quot;:null,&quot;show_links&quot;:null,&quot;feed_url&quot;:null}"></div><div><hr></div><h3>Conclusion</h3><p>Predictive Defense represents a paradigm shift in cybersecurity, moving beyond reactive methods to anticipate and counter future threats. By addressing uncertainties around "when, where, and how," it aims to enable organizations to build more dynamic, rapid, and effective defense strategies. This forward-thinking approach can optimize cybersecurity investments and ensures preparedness against emerging risks in an increasingly complex threat landscape.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Filling the Gap in Risk Management: Probabilistic Threat Modeling]]></title><description><![CDATA[Construct Markov Chains for enhanced risk analysis and incorporate predictions to better anticipate and mitigate potential threats.]]></description><link>https://blog.predictivedefense.io/p/filling-the-gap-in-risk-management</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/filling-the-gap-in-risk-management</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Thu, 22 Aug 2024 01:06:11 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EKr1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="pullquote"><p><em>Enjoyed this post? Explore more in my E-book "Geopolitical Cyber Risk Analysis Handbook"! - <a href="https://store.predictivedefense.io/l/geopolitical-cyber">predictivedefense.io</a></em></p></div><h2>Introduction</h2><p>Threat modeling is a method used to identify potential threats specific to a software's functionality during its design phase. By addressing these threats early, the software can be designed securely from the beginning, reducing the risk of overlooking security issues and aiming to launch with minimal vulnerabilities. Frameworks like STRIDE and OWASP Top 10 are often used in threat modeling.</p><p>However, this article isn't about those specific frameworks. While threat modeling is commonly linked to software development, its scope is much broader and can be applied to almost any area of cybersecurity. In this article, we'll explore how threat modeling, particularly probabilistic threat modeling, can complement risk management practices.</p><p>Probabilistic threat models can help clarify the "Likelihood" parameter, which often remains uncertain in risk analysis. Unfortunately, because threat models are often used in a superficial and qualitative way within risk management, this potential is not fully realized. In this article, we'll develop probabilistic models that allow us to directly calculate how anticipated changes within a company (such as hiring) might impact cyber risk.</p><p></p><h3>The Unknown in the Risk Equation: Likelihood</h3><p>In risk analysis, there's a commonly used equation: Risk = Impact x Likelihood. This equation helps compare different types of risks with each other. For instance, you can compare the risk of a DDOS attack with the risk of an SQL injection attack to determine where to invest more in protection. Although this equation seems simple in theory, it's more complex in practice. Some impacts are easier to quantify than others. For example, you can estimate the number of new customers lost and the financial cost to the company if a site goes down for X minutes due to a DDOS attack. However, calculating the impact of a personal data leak from an SQL injection isn't as straightforward.</p><p>Many companies address this by assigning categorical values (High, Medium, Low) to Impact. Fortunately, the industry is evolving. With the help of frameworks like FAIR and annual reports from organizations like the Cyentia Institute's IRIS and IBM's Cost of Data Breach, we can now use industry benchmarks to quantify Impact. This shift allows us to move beyond categorical values and perform risk calculations with greater accuracy.</p><p>The situation with the Likelihood parameter is even more challenging. Unfortunately, there are no industry benchmarks available to quantify the likelihood of an event, and it's unlikely that such benchmarks will be developed anytime soon. While efforts like EPSS try to address this issue within a narrow scope, they don't provide results that can be directly used in risk analysis. As a result, companies traditionally assign categorical values to likelihood. However, in this article, we'll explore how to assign probabilistic values to the Likelihood parameter, moving beyond the limitations of categorical values.</p><p></p><h3>Introducing Markov Chain</h3><p>Every event in life often depends on what happened just before it. For example, before you can enter your house, you need to unlock the door. But to unlock the door, you first need to find your key. Each of these steps is connected, and the chances of moving from one step to the next are based on probabilities. For instance, even if you find your key, there's no guarantee you&#8217;ll be able to unlock the door&#8212;maybe the lock is broken, or the key could get stuck. Similarly, you might not find the key at all; perhaps you left it in the car or misplaced it. This chain of events, where each step depends on the one before it, can be modeled using something called a Markov chain.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!tnrH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!tnrH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png 424w, https://substackcdn.com/image/fetch/$s_!tnrH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png 848w, https://substackcdn.com/image/fetch/$s_!tnrH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png 1272w, https://substackcdn.com/image/fetch/$s_!tnrH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!tnrH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png" width="454" height="272" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:272,&quot;width&quot;:454,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!tnrH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png 424w, https://substackcdn.com/image/fetch/$s_!tnrH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png 848w, https://substackcdn.com/image/fetch/$s_!tnrH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png 1272w, https://substackcdn.com/image/fetch/$s_!tnrH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda7cb190-e0f2-43aa-9a7d-044a29cf9345_454x272.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When you think about it, a cyber incident is really just a series of steps executed in sequence. We even have models like the Cyber Kill Chain that describe this exact process. However, these models often lack the probabilities needed to complete the Markov chain. In this section, we&#8217;ll explore how to easily assign these probabilities based on the information we have and build our own probabilistic models.</p><p>To make this clearer, imagine a company with the following scenario: It&#8217;s a typical software development firm that hosts its software in the cloud. The development environment is straightforward, including CI/CD elements. The company&#8217;s workforce is as follows:</p><ul><li><p>1 DevOps engineer</p></li><li><p>8 Developers</p></li><li><p>2 IT engineers</p></li><li><p>89 Non-IT employees</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EKr1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EKr1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png 424w, https://substackcdn.com/image/fetch/$s_!EKr1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png 848w, https://substackcdn.com/image/fetch/$s_!EKr1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png 1272w, https://substackcdn.com/image/fetch/$s_!EKr1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EKr1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png" width="1062" height="1184" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1184,&quot;width&quot;:1062,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EKr1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png 424w, https://substackcdn.com/image/fetch/$s_!EKr1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png 848w, https://substackcdn.com/image/fetch/$s_!EKr1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png 1272w, https://substackcdn.com/image/fetch/$s_!EKr1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff96a8666-d4a0-48d6-babb-fe509088c9fb_1062x1184.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In our scenario, the asset we want to protect is the "source code." Now, let's assume that the likelihood of a "compromised identity" has occurred. Regardless of the method used&#8212;whether phishing, brute force, or an info-stealer&#8212;a compromised identity could belong to one of the following groups, with the following probabilities:</p><ul><li><p>89% chance it&#8217;s a Non-IT employee</p></li><li><p>2% chance it&#8217;s an IT engineer</p></li><li><p>8% chance it&#8217;s a Developer</p></li><li><p>1% chance it&#8217;s a DevOps engineer</p></li></ul><p>Based on the diagram, there appear to be three possible ways for an attacker with a compromised identity to access the source code:</p><ol><li><p>If they&#8217;ve compromised a Developer&#8217;s identity, they can directly access the source code.</p></li><li><p>If they&#8217;ve compromised a DevOps engineer&#8217;s identity, they can access the deployment environment to steal the source code.</p></li><li><p>If they&#8217;ve compromised an IT engineer&#8217;s identity, they can remotely access the Developer&#8217;s computer to steal the source code.</p></li></ol><p>Now, let's begin by adding these probabilities to our model.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Rt6H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Rt6H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png 424w, https://substackcdn.com/image/fetch/$s_!Rt6H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png 848w, https://substackcdn.com/image/fetch/$s_!Rt6H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png 1272w, https://substackcdn.com/image/fetch/$s_!Rt6H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Rt6H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png" width="1450" height="1184" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1184,&quot;width&quot;:1450,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Rt6H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png 424w, https://substackcdn.com/image/fetch/$s_!Rt6H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png 848w, https://substackcdn.com/image/fetch/$s_!Rt6H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png 1272w, https://substackcdn.com/image/fetch/$s_!Rt6H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa5bf6fa8-1746-4fc2-8268-0a84e867baf0_1450x1184.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><p>Now that we know one of the key steps to stealing the source code is compromising an identity, let's look at the possible methods for achieving this. Here are a few scenarios that come to mind:</p><ul><li><p>Brute-forcing a Username and Password</p></li><li><p>Employee Credentials Being Sold on the Dark Web</p></li><li><p>A Spear Phishing Attack Targeting Employees</p></li><li><p>Malware Infection While Employees Browse the Internet</p></li></ul><p>Let's break down the controls in place for each scenario and the relevant information we have. (Note: The figures below are hypothetical.)</p><p>1. <strong>Brute-forcing a Username and Password</strong></p><ul><li><p><strong>Control:</strong> We have a lockout policy that triggers after three failed login attempts.</p></li><li><p><strong>Likelihood:</strong> 0% (due to the lockout policy)</p></li></ul><p><strong>2. Employee Credentials Sold on the Dark Web</strong></p><ul><li><p><strong>Control:</strong> Over the past year, our identity intelligence service detected that 15 employees had their credentials sold on the dark web.</p></li><li><p><strong>Additional Info:</strong> 60% of our employees have MFA enabled on their corporate accounts, so even if credentials are compromised, access cannot be gained without MFA.</p></li></ul><p><strong>3. Spear Phishing Attack</strong></p><ul><li><p><strong>Control:</strong> Our email security gateway blocked 1,700 phishing emails last year.</p></li><li><p><strong>Additional Info:</strong></p><ul><li><p>Employees manually reported 21 phishing emails that slipped through the gateway.</p></li><li><p>Based on previous phishing simulations, we know that employees report about 3% of suspicious emails. This suggests there were roughly 700 phishing emails that bypassed the gateway, giving it a detection rate of 70%.</p></li><li><p>On average, our employees click on phishing emails 13% of the time, according to past simulations.</p></li><li><p>Additionally, 60% of employees have MFA enabled on their accounts, so compromised credentials alone won&#8217;t grant access.</p></li></ul></li></ul><p><strong>4. Malware Infection Through Malvertising</strong></p><ul><li><p><strong>Control:</strong> Based on insights from purple team simulations and post-mortem analyses, we estimate our EDR (Endpoint Detection and Response) system has an 85% success rate in detecting malware.</p></li><li><p><strong>Additional Info:</strong> Last year, our EDR blocked 130 infections. Given the detection success rate, we estimate the total number of infections was likely around 150.</p></li></ul><p>These insights provide a clearer understanding of the controls and probabilities for each scenario, helping us further refine our threat model.</p><p>As you can see, by analyzing data like the number of blocked malware and phishing attempts, the number of leaked credentials detected by our intelligence services, the success and click-through rates observed in simulations, and the False Negative rates of our security products, we've been able to calculate the success probability of each attack vector as a percentage.</p><ul><li><p><strong>Brute-forcing a Username and Password:</strong> 0% success probability</p></li><li><p><strong>Credentials Sold on the Dark Web:</strong> 40% (proportion of accounts without MFA)</p></li><li><p><strong>Spear Phishing Attack:</strong> 30% (False Negative rate of our email security gateway) * 13% (phishing click-through rate) * 40% (proportion of accounts without MFA) = 1.5% success probability</p></li><li><p><strong>Malware Infection via Malvertising:</strong> 15% success probability</p></li></ul><p>Next, we can apply these probabilities to the proportion of employees who have access to the source code, allowing us to calculate the overall success probability of each attack vector in achieving the goal of stealing the source code.</p><ul><li><p><strong>Buying Credentials on the Dark Web -&gt; Stealing Source Code:</strong> 40% * 11% (proportion of employees with access to the source code) = 4.4% success probability</p></li><li><p><strong>Spear Phishing -&gt; Stealing Source Code:</strong> 1.5% * 11% = 0.17% success probability</p></li><li><p><strong>Malvertising -&gt; Stealing Source Code:</strong> 15% * 11% = 1.6% success probability</p></li></ul><p>If these calculations seem complex or lengthy, the following graphic will help clarify things. Notice how the attack chains are modeled as a Markov chain.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zdG9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zdG9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 424w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 848w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 1272w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zdG9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png" width="1456" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zdG9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 424w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 848w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 1272w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3><strong>Calculating Likelihood from Probabilities</strong></h3><p>In the model we developed, we calculated the success rates of different attack vectors as probabilities. But how do we determine the likelihood, which is crucial for our risk analysis? To do this, we simply multiply these success probabilities by the frequency with which each attack occurs over a specific period. Let's continue with our example of source code theft and calculate the likelihood of this event occurring through each attack vector over a one-year period.</p><h5><strong>Likelihood of a Credential Leak on the Dark Web Leading to Source Code Theft:</strong></h5><ul><li><p><strong>Calculation:</strong> Probability of success * Number of occurrences in a year</p></li><li><p><strong>Result:</strong> 4.4% * 15 = 66%</p></li></ul><h5><strong>Likelihood of Spear Phishing Leading to Source Code Theft:</strong></h5><ul><li><p><strong>Calculation:</strong> 0.17% * 2,400 = 4.7%</p></li></ul><h5><strong>Likelihood of Malvertising Leading to Source Code Theft:</strong></h5><ul><li><p><strong>Calculation:</strong> 1.6% * 150 = 240%</p></li></ul><p>With these likelihoods calculated, we can now multiply them by the Impact value to complete our risk analysis. For instance, if the impact of source code theft is estimated at $1,000,000, then our annual risk exposure would amount to $3,170,000.</p><p>One important observation is that, while the credential leak on the dark web initially appeared to have the highest probability of success, when we account for the frequency of events, malvertising turns out to have the highest likelihood. According to these calculations, our source code is exposed to the risk of theft from malvertising about 2.4 times per year.</p><p>This doesn&#8217;t mean our source code will be stolen every year&#8212;malvertising attacks often aim at simpler targets, like Bitcoin mining. However, a probabilistic threat model is an effective tool for understanding the factors that increase or decrease our risk exposure.</p><div><hr></div><h3>Getting Predictive Value from your Threat Model</h3><p>Probabilistic threat models are incredibly useful for risk analysis, evaluating investment decisions, and comparing the effectiveness of different security controls. For instance, look at the graph below and imagine you're about to implement a new security control. Consider the various controls that come to mind and estimate how much each one could reduce risk exposure. Which controls have the most significant impact? And how much should one invest in the most effective one? As you can see, once you have a model like this in place, making these kinds of assessments becomes much easier.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zdG9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zdG9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 424w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 848w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 1272w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zdG9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png" width="1456" height="720" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:720,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zdG9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 424w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 848w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 1272w, https://substackcdn.com/image/fetch/$s_!zdG9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F29a460f6-6e8b-4afb-b15d-2a642fe0f7c3_1600x791.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But their value doesn&#8217;t stop there&#8212;they can also help forecast future risks by incorporating predictions. Let&#8217;s consider a few scenarios:</p><ol><li><p>Your company plans to expand the software team next year, increasing the number of developers to 20.</p></li><li><p>A major news event (like M-pox) leads you to believe attackers might launch more phishing attacks.</p></li><li><p>Your early warning system detects a 40% increase in activity from malware families that have affected your company before.</p></li></ol><p>Each of these scenarios offers predictions with different levels of certainty. With probabilistic models in place, you can easily calculate the risks if these predictions come true.</p><ul><li><p><strong>Increasing the Software Team to 20 People:</strong> This would increase the percentage of employees with access to the source code from 11% to 20%. As a result, the likelihood of success for all identity-compromise-based attacks&#8212;and the associated risk exposure&#8212;would double, bringing the total risk exposure to $6.34 million.</p></li><li><p><strong>Anticipating an Increase in Phishing Attacks:</strong> We can estimate how much phishing attacks might increase by looking at similar past events (like the early days of COVID). Suppose we assume a 20% rise in phishing attacks. This would impact only one attack vector, increasing its likelihood of success from 4.7% to 5.64%, leading to a mere $9,400 increase in risk exposure.</p></li><li><p><strong>Surge in Malware Activity:</strong> A 40% increase in malware activity would mostly affect one attack vector. The likelihood of a successful malvertising attack would rise from 240% to 336%, temporarily increasing the total risk exposure by $960,000.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rePi!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rePi!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png 424w, https://substackcdn.com/image/fetch/$s_!rePi!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png 848w, https://substackcdn.com/image/fetch/$s_!rePi!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png 1272w, https://substackcdn.com/image/fetch/$s_!rePi!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rePi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png" width="1456" height="602" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:602,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:176396,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rePi!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png 424w, https://substackcdn.com/image/fetch/$s_!rePi!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png 848w, https://substackcdn.com/image/fetch/$s_!rePi!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png 1272w, https://substackcdn.com/image/fetch/$s_!rePi!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F83c45876-faa9-4f14-ad78-7cc0191a8fe2_1518x628.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Malware tracking Early Warning System (example)</figcaption></figure></div><p>These examples show how probabilistic threat modeling can effectively assess the impact of company changes, respond to early warning signals, and make informed decisions based on future predictions.</p><div><hr></div><h2>Conclusion</h2><p>Probabilistic threat modeling is a powerful tool that goes beyond traditional risk analysis. It allows organizations to not only assess current risks and the effectiveness of security controls but also to anticipate and prepare for future threats. By incorporating predictions&#8212;whether they stem from internal changes, emerging trends, or early warning signals&#8212;companies can make more informed decisions and better allocate resources to mitigate potential risks. As demonstrated, understanding how different factors influence risk exposure enables organizations to stay ahead of threats and protect their critical assets more effectively.</p><p>If you found this work insightful, consider supporting my efforts by purchasing a copy of my book, <em><a href="https://store.predictivedefense.io/l/geopolitical-cyber">Geopolitical Cyber Threat Intelligence</a></em>. I hope you'll like that as well!</p><p>Thank you for reading so far!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Analysing the Future of Cyber Conflicts Post Russia-Ukraine War]]></title><description><![CDATA[Enjoyed this post?]]></description><link>https://blog.predictivedefense.io/p/analysing-the-future-of-cyber-conflicts</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/analysing-the-future-of-cyber-conflicts</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Sun, 12 May 2024 04:00:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!zcQD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zcQD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zcQD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!zcQD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!zcQD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!zcQD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zcQD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;A panoramic view of four distinct futuristic landscapes side by side, each representing a different scenario of alternative futures. From left to right: 1. A serene, well-organized city with advanced, sustainable technology and harmonious international flags representing global cooperation. 2. A dense urban environment with chaotic traffic and fragmented digital screens showing conflicting information, symbolizing a lawfare zone. 3. A dark, dystopian cityscape with visible cyber attacks in the form of glowing red data streams, illustrating the 'Cult of the offensive'. 4. A diverse mixture of rural and urban settings with visible digital barriers and checkpoints, showing a world of agreed competition with individual states setting their own rules. Each landscape is distinct yet transitions smoothly into the next, showing the spectrum of possible futures.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="A panoramic view of four distinct futuristic landscapes side by side, each representing a different scenario of alternative futures. From left to right: 1. A serene, well-organized city with advanced, sustainable technology and harmonious international flags representing global cooperation. 2. A dense urban environment with chaotic traffic and fragmented digital screens showing conflicting information, symbolizing a lawfare zone. 3. A dark, dystopian cityscape with visible cyber attacks in the form of glowing red data streams, illustrating the 'Cult of the offensive'. 4. A diverse mixture of rural and urban settings with visible digital barriers and checkpoints, showing a world of agreed competition with individual states setting their own rules. Each landscape is distinct yet transitions smoothly into the next, showing the spectrum of possible futures." title="A panoramic view of four distinct futuristic landscapes side by side, each representing a different scenario of alternative futures. From left to right: 1. A serene, well-organized city with advanced, sustainable technology and harmonious international flags representing global cooperation. 2. A dense urban environment with chaotic traffic and fragmented digital screens showing conflicting information, symbolizing a lawfare zone. 3. A dark, dystopian cityscape with visible cyber attacks in the form of glowing red data streams, illustrating the 'Cult of the offensive'. 4. A diverse mixture of rural and urban settings with visible digital barriers and checkpoints, showing a world of agreed competition with individual states setting their own rules. Each landscape is distinct yet transitions smoothly into the next, showing the spectrum of possible futures." srcset="https://substackcdn.com/image/fetch/$s_!zcQD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp 424w, https://substackcdn.com/image/fetch/$s_!zcQD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp 848w, https://substackcdn.com/image/fetch/$s_!zcQD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp 1272w, https://substackcdn.com/image/fetch/$s_!zcQD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F34dea969-7c30-49ad-9b71-582fffc4b0fd_1792x1024.webp 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p>Enjoyed this post? Explore more in my E-book "Geopolitical Cyber Risk Analysis Handbook"! - <a href="https://store.predictivedefense.io/l/geopolitical-cyber">predictivedefense.io</a></p></div><h3>Introduction</h3><p>Hello everyone,</p><p>In this blog post, we'll use the "Alternative Futures Analysis" technique to explore the future of cyber norms in light of events from 2022-2023. Our goal is to discuss the history and current state of international norms, analyse how the ongoing Russia-Ukraine war affects cyber norms, and evaluate the impact of each scenario on civilian sectors to aid strategic security planning.</p><h4>What is a norm?</h4><p>A "norm" in international relations refers to shared expectations among states about appropriate behavior. Some norms develop from longstanding practices, while others are solidified through international treaties, like the European Convention on Human Rights, which safeguards rights such as the prohibition against torture and the right to life.</p><p>Realist theory in international relations views state interactions as inherently anarchic and is skeptical about international norms. Conversely, liberal theory advocates that norms can be enforced through international organizations like the United Nations. This view has predominated globally, especially in the West since World War I.</p><h4>History of cyber norms</h4><p>Communication technologies have influenced international relations by offering both opportunities and security risks. Cyber norm discussions began with the United Nations' first working group in 2004 but have not yet concluded due to the states' inability to come to a consensus&nbsp;[1]. Currently, there is no international cyber norms treaty. However, it is widely accepted in the West that existing armed conflict laws, like the Geneva Conventions, also apply to cyber conflicts. For example, in theory, a cyberattack on a NATO ally could trigger a military response under NATO's Article 5. However, such responses have not been triggered yet because cyberattacks are usually seen as below the threshold of war. Adapting armed conflict criteria&#8212;like 'weapon,' 'border,' and 'force'&#8212;to cyberspace complicates the evaluation of cyber operations.</p><p>Various states have expressed their expectations for rules in cyberspace, like the US has done regarding intellectual property theft, election security, and critical infrastructure. These diplomatic efforts are essential parts of the push to establish cyber norms.</p><ul><li><p>Obama Tells China President Hacking Must Stop [2]</p></li><li><p>Barack Obama ordered 'cyber bombs' for Russian network after hacking: report [3]</p></li></ul><h4>State of International Norms</h4><p>With the global economic center shifting from the West to Asia, countries like China and Russia have started transforming their economic wealth into political influence. This shift has led to policies that challenge the US-led international system during the transition to a multipolar world. Meanwhile, global adherence to norms on issues like women&#8217;s rights and gun control has declined. [4] Challenges to norms in the battle for global hegemony have naturally impacted the still-developing cyber norms. While China has used cyber operations to steal intellectual property, Russia and Iran have repeatedly breached norms with destructive attacks on critical infrastructure and election interference.</p><p>We are at a turning point for cyber norms. In 2022, Russia significantly increased its use of destructive cyberattacks due to its war against Ukraine. Likely under sanctions, Russia now appears more willing to accept the political risks of cyberattacks. This critical period's events are crucial for the future of cyber conflicts. If the US and Western countries cannot impose effective sanctions against these norm-violating cyberattacks, it suggests that cyberattacks will become more frequent in the future. This would mean that critical infrastructure and civilian sectors are likely to face more frequent and severe cyberattacks.</p><p>In the next section, we will use the Alternative Futures Analysis technique to explore possible scenarios.</p><div><hr></div><h3>Alternative Futures Analysis</h3><p>Alternative Futures Analysis is designed for strategic planning in uncertain and complex situations. It involves exploring how different factors (economic, technological, social, political, etc.) might interact in the future. For example, how might a technological innovation lead to social change, or how could an economic crisis impact political stability?</p><p>The scenario matrix is a central tool in this analysis, taking two main uncertain factors and creating four different scenarios based on their possible combinations. Each factor is considered at its extremes (e.g., high growth/low growth or high technology adoption/low technology adoption). These factors form the axes of the matrix, with each combination generating a different future scenario.</p><p>In our analysis, we will examine the following parameters:</p><ul><li><p><strong>Adherence to Norms:</strong> Reflects the presence of cyber norms and other states' adherence to these norms.</p></li><li><p><strong>Sanction Deterrence:</strong> Represents the effectiveness of sanctions applied against cyberattacks, regardless of consensus on norms.</p></li></ul><p>Let&#8217;s now explore our scenarios based on these combinations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N4kO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N4kO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png 424w, https://substackcdn.com/image/fetch/$s_!N4kO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png 848w, https://substackcdn.com/image/fetch/$s_!N4kO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png 1272w, https://substackcdn.com/image/fetch/$s_!N4kO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N4kO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png" width="1456" height="1445" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1445,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:588406,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N4kO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png 424w, https://substackcdn.com/image/fetch/$s_!N4kO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png 848w, https://substackcdn.com/image/fetch/$s_!N4kO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png 1272w, https://substackcdn.com/image/fetch/$s_!N4kO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F283c6a68-7823-4b86-9ced-568838001ece_1650x1638.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4>1 - Normative Zone</h4><p>In this scenario, there is an international consensus on cyber norms. International collaborations detect deviations and apply effective sanctions, ensuring general compliance among states. States commit to limited use of cyber operations, reducing risks to critical infrastructure and civilian sectors. This stability decreases the private sector's sensitivity to geopolitical developments.</p><h4>2 - Lawfare Zone</h4><p>Here, a legal framework for cyber norms exists, but enforcing sanctions for deviations is challenging or the sanctions are not deterrent enough. States may occasionally deviate from norms even as they generally try to adhere to them. Cyber norms become legal tools that states use to gain advantages over each other (Lawfare), undermining their intended purpose. Civil sectors overall become more susceptible to cyber conflicts in this scenario.</p><h4>3 - Cult of the Offensive</h4><p>In this dangerous scenario, there are no agreed norms or effective sanctions. This creates a fertile ground for the "Cult of the offensive," [5] where states believe that the best defense is a good offense. Trust in defensive strategies is low, and initiating attacks is seen as crucial. The frequency of destructive cyberattacks increases, along with a wider variety of targets in civilian sectors, significantly heightening their geopolitical sensitivity.</p><h4>4 - Agreed Competition</h4><p>In this scenario, the legal framework for cyber norms is either absent or vague. However, states begin to apply effective individual sanctions against cyberattacks. Each state&#8217;s response to a cyberattack varies, creating unique "red lines" instead of a common norm. This dynamic dictates the basic logic of cyber conflicts; each state crafts its own policy. The impact on civilian sectors largely depends on their respective country&#8217;s policies and enforcement capabilities. States with robust deterrent policies and enforcement capabilities better protect their civilian sectors, but cyber conflicts are expected to be more common than in the first two scenarios due to the anarchic nature of this setting.</p><h3>What should organizations do?</h3><p>The developments we've discussed affect not only state institutions but also private sector companies significantly. In an environment where civilian sectors are increasingly targeted, supply chains, for instance, become much more fragile, inevitably impacting operational processes. While data privacy remains a primary concern in private sector&#8217;s cyber security planning, the developments indicate a world where risks to <em>business continuity</em> are more pronounced, and resilience becomes crucial. Thus, it is essential for private sectors to monitor these developments as closely as states do and prepare for possible scenarios.</p><h4>Signposts of Change</h4><p>The emergence of the scenarios discussed in the previous section may be indicated by the following likely developments in the future:</p><ul><li><p>States effectively incorporate their own cyber engagement rules into their military and diplomatic frameworks.</p></li><li><p>The application of deterrent sanctions against cyberattacks becomes more widespread. (e.g., Albania cuts diplomatic ties with Iran over a cyberattack [6])</p></li><li><p>International collaborations in combating cybercrime strengthen.</p></li><li><p>The number of states adopting an active cyber defense [7] strategy increases, and various state institutions' powers are expanded.</p></li></ul><h3>Resources</h3><ol><li><p><a href="https://carnegieendowment.org/research/2021/05/the-un-struggles-to-make-progress-on-securing-cyberspace?lang=en">https://carnegieendowment.org/research/2021/05/the-un-struggles-to-make-progress-on-securing-cyberspace?lang=en</a></p></li><li><p><a href="https://news.sky.com/story/obama-tells-china-president-hacking-must-stop-10345126">https://news.sky.com/story/obama-tells-china-president-hacking-must-stop-10345126</a></p></li><li><p><a href="https://www.smh.com.au/world/barack-obama-ordered-cyber-bombs-for-russian-network-after-hacking-report-20170624-gwxo44.html">https://www.smh.com.au/world/barack-obama-ordered-cyber-bombs-for-russian-network-after-hacking-report-20170624-gwxo44.html</a></p></li><li><p><a href="https://www.dni.gov/index.php/gt2040-home/gt2040-deeper-looks/future-of-international-norms">https://www.dni.gov/index.php/gt2040-home/gt2040-deeper-looks/future-of-international-norms</a></p></li><li><p><a href="https://en.wikipedia.org/wiki/Cult_of_the_offensive">https://en.wikipedia.org/wiki/Cult_of_the_offensive</a></p></li><li><p><a href="https://www.aljazeera.com/news/2022/9/7/albania-cuts-diplomatic-ties-with-iran-over-cyberattack">https://www.aljazeera.com/news/2022/9/7/albania-cuts-diplomatic-ties-with-iran-over-cyberattack</a></p></li><li><p><a href="https://www.darpa.mil/program/active-cyber-defense">https://www.darpa.mil/program/active-cyber-defense</a></p></li></ol><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Geopolitical Cyber Risk: Cyber Operations in Modern Warfare]]></title><description><![CDATA[Introduction]]></description><link>https://blog.predictivedefense.io/p/geopolitical-cyber-risk-cyber-operations</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/geopolitical-cyber-risk-cyber-operations</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Sat, 20 Apr 2024 13:35:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ec2ec3e2-a646-40f9-b644-4759f8bfd5f8_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>In today&#8217;s world, it is widely recognized that cyber operations has become a key component in the conduct of modern warfare. However, due to our limited understanding of armed conflict and geopolitics, we often find it difficult to interpret these events in terms of their implications for our threat landscapes.</p><p>This blog post aims to offer a comprehensive analysis of cyber operations strategies, focusing on the typical targets and tactics employed by states during conflicts, drawing from historical observations. By studying these elements, we are going to have valuable insights for more accurate threat modelling, risk assessment, and forecasting in the realm of international cyber conflict.</p><h4>Likely Targets During a Conflict</h4><p>Before we begin, I strongly encourage everyone to view Lincoln Kaffenberger&#8217;s talk at the SANS CTI Summit. This presentation, which also served as an inspiration for this post, lays out a solid framework for analysing geopolitical cyber risks and offers some practical insights: <a href="https://www.youtube.com/watch?v=NJT0Y0Pj7e0">Lincoln Kaffenberger&#8217;s Talk</a>.</p><p>A notable point from the talk, which I&#8217;d like to highlight, pertains to the sectors frequently targeted in times of conflict. Below, I&#8217;ll list these common targets of cyber attacks during wartime. Following that, I will try to provide more context on military decision-making that result in this kind of targeting and discuss how this information can be integrated into our threat models.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZJu5!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZJu5!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png 424w, https://substackcdn.com/image/fetch/$s_!ZJu5!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png 848w, https://substackcdn.com/image/fetch/$s_!ZJu5!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png 1272w, https://substackcdn.com/image/fetch/$s_!ZJu5!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZJu5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png" width="1184" height="912" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:912,&quot;width&quot;:1184,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZJu5!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png 424w, https://substackcdn.com/image/fetch/$s_!ZJu5!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png 848w, https://substackcdn.com/image/fetch/$s_!ZJu5!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png 1272w, https://substackcdn.com/image/fetch/$s_!ZJu5!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd41cc8f8-a2e4-4f8b-8068-dff63205c938_1184x912.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Industries likely to be targeted by cyber operations during an armed conflict</figcaption></figure></div><h3>Wartime Activities Overview</h3><p>Ideally, the actions undertaken during or before a military operation should support at least one of these three purposes: 1. Achieving a tactical objective, 2. Gaining and sustaining a strategic advantage, and 3. Weakening the opponent&#8217;s war fighting capacity. Let&#8217;s explore a few examples:</p><p><strong>Supporting a Tactical Objective:</strong> These activities aim to disrupt various aspects of the opposing force, enabling free movement of friendly forces during an operation. They are primarily tactical and are therefore carried out in coordination with the military operation aimed at achieving the specific objective. Such activities may include kinetic attacks targeting logistics, command and control systems, ammunition, and other supplies.</p><p>There is an increasing trend in militaries utilising cyber attacks for similar purposes. Particularly, disruptive cyber attacks against information systems have proven to be highly effective. Some very recent examples are:</p><ul><li><p>U.S. conducting cyberattack on suspected Iranian spy ship to inhibit the ship&#8217;s ability to share intelligence with Houthi militants in Yemen. [<a href="https://www.reuters.com/world/us-conducted-cyberattack-suspected-iranian-spy-ship-nbc-news-2024-02-15/">*</a>]</p></li><li><p>DDoS attacks at websites that provide critical information and alerts to civilians on rocket attacks twelve minutes after the Hamas attack on Israel. [<a href="https://blog.cloudflare.com/cyber-attacks-in-the-israel-hamas-war">*</a>]</p></li></ul><p>In both of these cases, the attacks were coordinated with a kinetic military operation, and intended to disrupt some aspects of the opposing force.</p><p><strong>Gaining and Sustaining Strategic Advantage:</strong> The purpose of these actions is to indirectly affect the war fighting capabilities of the adversary, often by weakening their <a href="https://en.wikipedia.org/wiki/Center_of_gravity_(military)">Centers of Gravity</a> (COG). COGs are essentially the key strengths that enable a nation to maintain its war efforts. It&#8217;s common for nations to focus on undermining their enemy&#8217;s COGs during a conflict.</p><p>Potential COGs include:</p><ul><li><p>Advanced intelligence and situational awareness</p></li><li><p>Superior mobility of military forces</p></li><li><p>The quantity and/or quality of arms and personnel</p></li><li><p>Funding for the war effort</p></li><li><p>Domestic public support for the war</p></li><li><p>Alliances and backing from the international community</p></li></ul><p>The last three factors mentioned: funding, domestic, and international support for the war, play a significant role in influencing the war&#8217;s outcome. Therefore, parties engaged in a conflict actively seek to disrupt the financing, exert pressure on the economy, fracture alliances, hinder international support, and sway the public opinion of the opposing state through all available means.</p><p>It has been noted that cyber operations also play a significant role in this context. One common wartime activity is information operations (IO) targeting the citizens of the opposing nation and its allies. This heightened level of IO activity requires an increased effort in intelligence collection for use in disinformation campaigns. As a result, a rise in cyber espionage activities is often seen prior to or at the onset of a conflict. In some cases, these are accompanied by disruptive cyber attacks aimed at exerting pressure on media outlets or prominent individuals who publicly support the rival state. All these efforts can be viewed as strategies to achieve and maintain information dominance.</p><p>Disruptive cyber attacks targeting the key economic sectors of a rival state are often employed to exert economic strain. Additionally, these types of attacks can be used to apply diplomatic pressure on allies and neutral states, as outlined in my previous post: <a href="https://open.substack.com/pub/predictivedefense/p/geopolitical-cyber-risk-war-and-coercive">Geopolitical Cyber Risk: War and Coercive Diplomacy</a>. One thing to note that a COG typically deteriorates over an extended period. Therefore, efforts targeting these are also likely to be sustained over the long term.</p><p>I highly recommend checking out the following post from SecAlliance, which, in my view, excellently demonstrates the application of COG analysis in assessing potential cyber threats: <a href="https://www.secalliance.com/blog/factors-influencing-the-likelihood-of-a-systemically-significant-cyber-attack-on-western-european-financial-services">Factors Influencing the Likelihood of a Systemically Significant Cyber Attack on Western European Financial Services</a>.</p><p><strong>Weakening The Opponent&#8217;s War Fighting Capacity:</strong> The purpose of these actions is to undermine the material capabilities of the opposing state&#8217;s warfare. Cyber attacks aimed at disrupting key sectors such as manufacturing and energy can be seen in this light, depending on the targeted entity. For example, the aerospace, chemicals, automobiles, and parts organizations have all seen a significant rise in attacks. [<a href="https://www.reliaquest.com/blog/cyber-threats-to-manufacturing-industry-1h-2023/">*</a>] These attacks often exploit the low tolerance for outages in the manufacturing sector, where IT service disruptions can halt production and lead to significant revenue losses. Another notable example of such activities includes the Stuxnet, Duqu, and Flame malware families. While these attacks were not conducted during wartime, their objective was to significantly hinder the nuclear capabilities of Iran and potentially the DPRK, targeting their nuclear warhead production infrastructure.</p><div><hr></div><h3>Hierarchy of Targets and Possible Course of Actions</h3><p>As cyber defenders, our task is to realistically map out and prepare for various potential cyber threat scenarios that could arise in a conflict situation. This section is dedicated to outlining those scenarios, each defined by the nature of the potential target &#8212; opponent state, supportive states, or neutral states that might be drawn into the conflict. This process involves identifying the goals of potential adversaries (<strong>objectives</strong>), the conditions or events that could initiate their hostile actions (<strong>triggers</strong>), and the specific types of cyber operations they might employ at certain targets (<strong>actions</strong>).</p><p>Here&#8217;s a breakdown of how this mapping works:</p><p></p><h4>Opponent state</h4><p>For an opponent state, we can expect actions like persistent cyber intrusions targeting the government, military, and intelligence agencies for critical intelligence, as well as disruptive attacks aimed at key industries and communication channels. These are maneuvers aimed at gaining a strategic advantage and crippling the war fighting abilities of the opponent.</p><blockquote><p><strong>Triggers:</strong> Armed conflict</p><ol><li><p><strong>Objective: Gaining and sustaining strategic advantage</strong></p><ol><li><p>Persistent cyber intrusions targeting gov/mil/intel agencies and their contractors, the defense industry, and think tanks for political, military and technological intelligence</p></li><li><p>Persistent disruptive attacks targeting key economic sectors to exert economic strain (e.g: energy, banking and finance, tourism, manufacturing, large private companies)</p></li><li><p>Persistent disruptive attacks targeting media outlets and communication systems to interrupt the flow of information</p></li></ol></li><li><p><strong>Objective: Weakening of war fighting capacity</strong></p><ol><li><p>Persistent disruptive attacks targeting key industries to undermine the material production capability (e.g: chemicals, raw material, aerospace, energy, manufacturing and defense)</p></li></ol></li><li><p><strong>Objective: Supporting a tactical objective</strong></p><ol><li><p>Coordinated disruptive attacks targeting communication and information networks in support of an ongoing military operation</p></li></ol></li></ol></blockquote><p></p><h4>States offering political, economic, or military support to the opponent</h4><p>When considering states that provide support to the opponents of one party, we prepare for scenarios where these entities could face similar cyber intrusions and disruptive attacks. These are likely motivated by a desire to exert economic strain or to discourage their alignment with the opponent of that party.</p><blockquote><p><strong>Triggers:</strong> Providing political, economic, or military support to the opponent. Public statements or other signs of support to the opponent. Advocating or supporting hostile policies in favor of the opponent. (e.g: sanctions, embargo)</p><ol><li><p><strong>Objective: Gaining and sustaining strategic advantage</strong></p><ol><li><p>Persistent cyber intrusions targeting gov/mil/intel agencies, the defense industry, and think tanks for political, military and technological intelligence</p></li><li><p>Persistent disruptive attacks targeting primary industries to exert economic strain (e.g: energy, banking and finance, tourism, manufacturing, large private companies)</p></li><li><p>Persistent disruptive attacks targeting media outlets and communication systems to interrupt the flow of information</p></li></ol></li><li><p><strong>Objective: Discourage alignment with the opposing state</strong></p><ol><li><p>Disruptive attacks targeting key economic sectors or critical infrastructure in retaliation against any perceived political, economic or military support for the opponent state</p></li></ol></li><li><p><strong>Objective: Counteract the propaganda efforts of the opponent</strong></p><ol><li><p>Disruptive attacks targeting media outlets, large private companies, and prominent individuals that publicly support the opponent state to discourage public support</p></li></ol></li></ol></blockquote><p></p><h4>Neutral states</h4><p>Neutral states, often overlooked, can also be significant in the cyber conflict landscape. They could be subjected to cyber operations if they show any inclination towards supporting the opponent of either party. In these cases, the objective often shifts to gaining a strategic advantage or countering propaganda efforts.</p><blockquote><p><strong>Triggers:</strong> Providing political, economic, or military support to the opponent. Public statements or other signs of support to the opponent. Advocating or supporting hostile policies in favor of the opponent. (e.g: sanctions, embargo)</p><ol><li><p><strong>Objective: Gaining and sustaining strategic advantage</strong></p><ol><li><p>Cyber intrusions targeting gov/mil/intel agencies, the defense industry, and think tanks for political, military and technological intelligence</p></li></ol></li><li><p><strong>Objective: Discourage alignment with the opposing state</strong></p><ol><li><p>Disruptive attacks targeting key economic sectors or critical infrastructure in retaliation against any perceived political, economic or military support for the opponent state</p></li></ol></li><li><p><strong>Objective: Counteract the propaganda efforts of the opponent</strong></p><ol><li><p>Disruptive attacks targeting media outlets, large private companies, and prominent individuals that publicly support the opponent state to discourage public support</p></li></ol></li></ol></blockquote><div><hr></div><h3>Example: Russia-Ukraine Conflict</h3><p>In the specific context of the Russia-Ukraine conflict, with Russia as the acting party, the following detailed cyber operations strategy can be outlined:</p><h4>Opponent State (Ukraine)</h4><blockquote><ol><li><p><strong>Objective: Gaining and Sustaining Strategic Advantage</strong></p><ol><li><p>Cyber intrusions into Ukrainian government, military, and intelligence networks, especially targeting communication channels and data repositories, to gather intelligence that could offer strategic advantages.</p></li><li><p>Disruptive cyber attacks on Ukraine&#8217;s key economic sectors like energy, financial services, and manufacturing, aiming to weaken the national economy and disrupt daily life.</p></li><li><p>Systematic attacks on Ukrainian media outlets and internet service providers to control the narrative and disrupt the flow of accurate information within Ukraine.</p></li></ol></li><li><p><strong>Objective: Weakening of War Fighting Capacity</strong></p><ol><li><p>Targeting of Ukrainian defense manufacturing, including plants producing arms and ammunition, through cyber sabotage to hinder Ukraine&#8217;s military supply chain.</p></li></ol></li><li><p><strong>Objective: Supporting a Tactical Objective</strong></p><ol><li><p>Coordinated cyber attacks on Ukrainian military communication networks during key ground offensives to impair coordination and response capabilities.</p></li></ol></li></ol></blockquote><p></p><h4>States Offering Support to Ukraine (e.g., NATO Member Countries, European Union)</h4><blockquote><ol><li><p><strong>Objective: Gaining and Sustaining Strategic Advantage</strong></p><ol><li><p>Cyber espionage against governments and defense contractors in NATO and EU countries providing military aid to Ukraine, aiming to uncover future military plans and logistics.</p></li><li><p>Persistent cyber attacks on the energy and banking sectors of these supporting nations, particularly those that have imposed sanctions on Russia, to create economic repercussions.</p></li><li><p>Ongoing cyber operations against media and communication channels in these countries, aiming to disrupt pro-Ukraine propaganda and influence public opinion.</p></li></ol></li><li><p><strong>Objective: Discouraging Alignment with Ukraine</strong></p><ol><li><p>Retaliatory cyber attacks targeting critical infrastructure in countries that have provided significant military support to Ukraine.</p></li></ol></li><li><p><strong>Objective: Counteracting Propaganda Efforts of Ukraine</strong></p><ol><li><p>Cyber operations aimed at media outlets and prominent social figures in supporting states, particularly those vocally opposing Russian actions, to undermine public and international support for Ukraine.</p></li></ol></li></ol></blockquote><p></p><h4>Neutral States (e.g., Countries Not Actively Involved in the Conflict)</h4><blockquote><ol><li><p><strong>Objective: Gaining and Sustaining Strategic Advantage</strong></p><ol><li><p>Cyber intrusions into political and military intelligence networks of neutral states, especially those considering humanitarian or diplomatic support for Ukraine.</p></li></ol></li><li><p><strong>Objective: Discouraging Alignment with Ukraine</strong></p><ol><li><p>Disruptive cyber attacks on neutral states&#8217; key economic sectors as a warning against siding with Ukraine or imposing sanctions on Russia.</p></li></ol></li><li><p><strong>Objective: Counteracting Propaganda Efforts of Ukraine</strong></p><ol><li><p>Cyber campaigns targeting media and influential figures in neutral states to prevent the spread of pro-Ukraine sentiment and maintain a neutral or pro-Russia stance in the conflict.</p></li></ol></li></ol></blockquote><p>This strategic outline should be further refined with insights derived from the observation of the acting party&#8217;s behaviours in past conflicts. The capability to conduct cyber operations does not guarantee their use in every scenario. States may choose to refrain from targeting critical infrastructure or key economic sectors due to potential political backlash or other considerations. Therefore, developing behavioural models based on historical patterns and tendencies of the involved parties is crucial. They can help in anticipating the moves of the adversary more accurately and in preparing more targeted and effective defensive strategies.</p><h3>Conclusion</h3><p>To conclude, the study of cyber operations during times of armed conflict presents a detailed understanding of the strategic objectives and methodologies employed by nations in the digital domain. This analysis is instrumental in enhancing threat modelling, risk analysis, and forecasting in the context of geopolitics. By identifying the hierarchy of targets and the diverse tactics used, from disrupting an adversary&#8217;s economic stability to manipulating public perception, we gain critical insights into the evolving nature of digital warfare. This post underscores the importance of envisioning potential future scenarios, especially during periods of tension and conflict. By doing so, we can assess their potential impact on our security, allowing for better preparedness and response. And the most critical lesson here is the need to integrate foresight into our cybersecurity practices.</p><p>I hope you liked this post. See you in the next one!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Geopolitical Cyber Risk: War and Coercive Diplomacy]]></title><description><![CDATA[Introduction]]></description><link>https://blog.predictivedefense.io/p/geopolitical-cyber-risk-war-and-coercive</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/geopolitical-cyber-risk-war-and-coercive</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Sat, 20 Apr 2024 13:22:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/b9d331b8-326d-400e-9012-3027c21977ac_1024x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>Hello everyone,</p><p>Today, we&#8217;re diving into an intriguing case of cyber risk in the world of international politics, focusing on a specific cyber attack that occurred during the Russia-Ukraine conflict. This post aims to unpack the complexities of cyber attacks in the realm of global politics and their impact on international relationships.</p><p>Our focus will be on a series of cyber attacks targeting Turkish airports, an event that&#8217;s particularly interesting given Turkey&#8217;s unique position in the ongoing conflict between Russia and Ukraine. Through this analysis, we&#8217;ll get a glimpse into how cyber operations are used in modern diplomacy and conflict, and what this means for countries involved.</p><p>We&#8217;ll try to explore why these attacks happened, what Turkey&#8217;s role in the larger Russia-Ukraine conflict might mean in this context, and how cyber tactics are becoming key tools in the arsenal of countries and groups looking to push their agendas on the world stage.</p><p>Lastly, we&#8217;ll extract insights and make forecasts which we can use to preposition our defenses against potential changes in the geopolitical landscape. Understanding these dynamics is crucial for anticipating future threats and strengthening our cyber security posture proactively.</p><p>So, let&#8217;s get started and unravel this intriguing story of cyber conflict, strategy, and the delicate dance of international politics.</p><h3>The Incident</h3><p>During the earlier stages of the Russia-Ukraine conflict, several Turkish airports were hit by intense DDoS attacks, thought to be carried out by Ukrainian hacktivists. During this attack, messages demanding the halt of flights to Russia were inserted into the HTTP packets, specifically stating &#8220;Stop flights to Russia&#8221; and &#8220;Cancel flights to Russia&#8221;. Notably, Turkey is not directly involved in the conflict between Russia and Ukraine.</p><p>In response to these cyber attacks, the airports took action by blocking the HTTP requests that contained the word &#8220;Russia&#8221;. Afterwards, the hackers did not adapt their attack against this measure. Also, no hacktivist group claimed responsibility for it afterwards.</p><h4>Background and Turkey&#8217;s stance on the conflict:</h4><p>Turkey holds significant geopolitical significance in the context of the Russia-Ukraine conflict due to several key factors:</p><ul><li><p>Turkey controls the Bosporus and Dardanelles straits, which are vital maritime routes connecting the Black Sea to the Mediterranean. This control gives Turkey substantial influence over Russian naval access, especially for Russia&#8217;s Black Sea Fleet based in Sevastopol, Crimea.</p></li><li><p>Despite being a NATO member, Turkey has pursued an independent foreign policy that often includes cooperation with Russia. This includes purchasing the Russian S-400 missile defense system, which caused friction with NATO allies. Turkey&#8217;s ability to maintain relationships with both Western countries and Russia places it in a unique position to influence or mediate in the conflict.</p></li><li><p>Turkey has provided significant military support to Ukraine, most notably the Bayraktar TB2 drones, which have been effectively used by Ukrainian forces. This military assistance enhances Ukraine&#8217;s defense capabilities against Russian aggression.</p></li><li><p>Turkey is a key transit country for Russian oil and gas pipelines to Europe, notably the TurkStream pipeline. This role in energy transit gives Turkey leverage in the region&#8217;s energy dynamics, especially relevant given the conflict&#8217;s impact on global energy markets.</p></li><li><p>Turkey has offered to mediate between Russia and Ukraine and has hosted diplomatic talks. Its unique position as a country with good relations with both Russia and Ukraine enhances its potential as a mediator.</p></li><li><p>Turkey has significant trade relations with both Russia and Ukraine, including in the agricultural and energy sectors. The conflict has implications for Turkey&#8217;s trade dynamics, especially concerning grain and energy imports.</p></li><li><p>Turkey is a popular destination for Russian tourists, and the Russian market is important for Turkey&#8217;s tourism industry. Economic ties between Turkey and Russia, including Russian investments in Turkey, add another layer to their complex relationship.</p></li></ul><p>In summary, Turkey&#8217;s geopolitical significance in the Russia-Ukraine conflict stems from its strategic geographic location, its role in regional energy dynamics, its military capabilities, and its unique position in balancing relations with NATO, Russia, and Ukraine. Turkey&#8217;s actions and policies can significantly influence the conflict&#8217;s dynamics and the broader regional security landscape.</p><h3>Making sense of the DDoS incident</h3><p>DDoS and other disruptive cyber attacks have increasingly become tools of &#8220;coercive diplomacy&#8221;. In the past, various state and non-state actors have utilised these cyber tactics as a means to exert pressure, influence policy decisions, or retaliate against actions deemed contrary to their interests in a less confrontational way. In light of these precedents, let&#8217;s assume that the attack on Turkish airports is also an attempt at using cyber capabilities for coercive diplomacy, and try to explore possible objectives behind it. Without clear attribution, Turkey may find it challenging to respond diplomatically. The uncertainty could lead to heightened tensions and suspicions, not just towards Ukraine but potentially towards other nations or independent cyber groups.</p><p>In this brainstorming scenario, analysts can employ frameworks such as STEMPLES or DIMEFIL, along with SATs like Outside-in thinking and 1&#8211;2&#8211;4, to envision various scenarios and gain a comprehensive understanding of the factors at play in any given situation. Subsequently, these scenarios can be organised into broader hypotheses, followed by the application of contrarian techniques to question each hypothesis. Analysis of Competing Hypotheses can then be utilised to pinpoint the most probable scenarios.</p><p>In our case, the majority of scenarios center around four possibilities, assuming that the hacktivist group is indeed acting in alignment with Ukraine&#8217;s interests (which may not be the case):</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CfFQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CfFQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png 424w, https://substackcdn.com/image/fetch/$s_!CfFQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png 848w, https://substackcdn.com/image/fetch/$s_!CfFQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png 1272w, https://substackcdn.com/image/fetch/$s_!CfFQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CfFQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png" width="1456" height="340" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:340,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CfFQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png 424w, https://substackcdn.com/image/fetch/$s_!CfFQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png 848w, https://substackcdn.com/image/fetch/$s_!CfFQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png 1272w, https://substackcdn.com/image/fetch/$s_!CfFQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F856c4df9-07bd-46c1-8feb-acf64fd3ba10_2288x534.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Four key hypotheses</figcaption></figure></div><p>Hypothesis 2 appears less convincing because the attack was deliberately designed to have minimal disruptive effects. Similarly, Hypothesis 4 is not strong, as there was no immediate need for Ukraine to retaliate when the incident occurred. Additionally, the DDoS attack was not modified to sustain its disruptive impact, and the absence of any hacktivist group claiming responsibility further undermines Hypothesis 4.</p><p>This analysis primarily supports <strong>Hypotheses 1</strong> and <strong>3</strong> as the most probable scenarios. Next, we will focus on translating these conclusions into forecasting models for enhancing cyber defense strategies.</p><div><hr></div><h3>Forecasting</h3><p>We will now examine each scenario individually, assuming its validity, and attempt to identify the factors influencing decision-making in the context of cyber attacks for each case.</p><h4>Disruption of Russia-Turkey Connectivity: Potential Impact on Other Nations</h4><p>For this hypothesis, we assess that the targets should meet the following criteria:</p><ul><li><p>The country should be neutral or not actively supporting Ukraine in the conflict.</p></li><li><p>The country should have significant economic ties with Russia, especially in commerce or tourism.</p></li></ul><p>Countries that align with these criteria and may therefore be at risk in such attacks include:</p><ul><li><p><strong>Egypt:</strong> A favoured destination for Russian tourists. Before the suspension of direct flights in 2015, Russian tourists represented about a third of all inbound tourists to Egypt. [<a href="https://www.dailynewsegypt.com/2021/04/27/russian-flights-return-to-egypt-to-add-3bn-annual-tourism-revenues-goldman-sachs/">*</a>] Disrupting air travel could severely impact its tourism industry and harm economic ties with Russia.</p></li><li><p><strong>United Arab Emirates (UAE), particularly Dubai:</strong> As a global business hub with strong Russian connections [<a href="https://www.nytimes.com/2023/03/13/world/europe/russia-dubai-ukraine-war.html">*</a>], any disruption in air travel could affect not just Russian enterprises but also international businesses in the region.</p></li></ul><h4>Pressure on Neutrality: Potential Impact on Other Nations</h4><p>For this hypothesis, we assess that the targets should meet the following criteria:</p><ul><li><p>The country should be neutral or not actively supporting Ukraine in the conflict.</p></li><li><p>The country&#8217;s position should hold the potential to strategically affect the course of the conflict.</p></li></ul><p>Countries that align with these criteria and may therefore be at risk in such attacks include:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!nvP2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!nvP2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png 424w, https://substackcdn.com/image/fetch/$s_!nvP2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png 848w, https://substackcdn.com/image/fetch/$s_!nvP2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png 1272w, https://substackcdn.com/image/fetch/$s_!nvP2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!nvP2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png" width="1456" height="398" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:398,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!nvP2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png 424w, https://substackcdn.com/image/fetch/$s_!nvP2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png 848w, https://substackcdn.com/image/fetch/$s_!nvP2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png 1272w, https://substackcdn.com/image/fetch/$s_!nvP2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4e2592d4-cd54-4fd2-ab7c-eb7982dcea2e_2310x632.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Countries assessed to be at risk. <a href="https://en.wikipedia.org/wiki/BRICS">BRICS definition</a></figcaption></figure></div><h3>Indications of Change: What actions in the future could trigger a similar disruptive cyber attack against Turkey?</h3><p>While purely speculative, there are certain actions by Turkey that could hypothetically trigger a cyber-disruptive attack from either Russia or Ukraine, considering the complex dynamics of the Russia-Ukraine conflict. Here are some hypothetical scenarios:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!85EV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!85EV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png 424w, https://substackcdn.com/image/fetch/$s_!85EV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png 848w, https://substackcdn.com/image/fetch/$s_!85EV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png 1272w, https://substackcdn.com/image/fetch/$s_!85EV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!85EV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png" width="1456" height="560" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:560,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!85EV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png 424w, https://substackcdn.com/image/fetch/$s_!85EV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png 848w, https://substackcdn.com/image/fetch/$s_!85EV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png 1272w, https://substackcdn.com/image/fetch/$s_!85EV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F73087ec7-a993-4044-a3a6-041d394c3c16_2372x912.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s important to underline that these scenarios are speculative, formulated on the basis of historical patterns of cyber operations in international affairs. Nevertheless, devising these scenarios and monitoring substantial shifts in the geopolitical sphere can be immensely valuable for <em><strong>predictive defense</strong></em>. Armed with these insights, we can prepare for the most probable scenarios and their potential effects on our cyber security.</p><p>In a real-life application, it&#8217;s beneficial to have a behavioural model for each country&#8217;s cyber operations. This model would provide insights into the types of cyber operations a country might employ, the circumstances under which they would be used, and the potential targets. Such models can be developed by analysing historical data of cyber operations during times of war or diplomatic tension. This approach greatly aids in accurately predicting the type and targets of potential cyber attacks in a given scenario.</p><p>To track the unfolding of these scenarios, we could establish Google Alerts using keywords tailored to each specific scenario, thereby initiating our monitoring process.</p><p><strong>Google Alert Keywords for &#8220;Military&#8221;:</strong></p><ul><li><p>Scenario A: &#8220;Turkey UAV supply Ukraine&#8221;, &#8220;Bayraktar TB2 Ukraine&#8221;, &#8220;Turkey military support Ukraine&#8221;</p></li><li><p>Scenario B: &#8220;Turkey military aid Ukraine&#8221;, &#8220;Turkey intelligence support Ukraine&#8221;</p></li><li><p>Scenario C: &#8220;Turkey Bosporus straits NATO&#8221;, &#8220;Dardanelles straits military access&#8221;, &#8220;Turkey Black Sea NATO&#8221;</p></li></ul><p><strong>Google Alert Keywords for &#8220;Diplomatic&#8221;:</strong></p><ul><li><p>Scenario A: &#8220;Turkey recognizes Russia annexed territories&#8221;, &#8220;Turkey opposes sanctions Russia&#8221;, &#8220;Turkey diplomatic shift Ukraine&#8221;</p></li><li><p>Scenario B: &#8220;Turkey recognition political entities Russia&#8221;, &#8220;Turkey Russia diplomatic escalation&#8221;</p></li></ul><p><strong>Google Alert Keywords for &#8220;Economic&#8221;:</strong></p><ul><li><p>Scenario A: &#8220;Turkey Ukraine grain export deal&#8221;, &#8220;Black Sea grain export disruption&#8221;, &#8220;Turkey Russia grain deal Ukraine&#8221;</p></li><li><p>Scenario B: &#8220;Turkey economic sanctions Russia&#8221;, &#8220;Turkey energy sector sanctions&#8221;</p></li></ul><p>Setting up alerts in languages other than English can be highly beneficial, as the volume of news related to a conflict often increases nearer to its source, leading to faster updates. For our purposes, adding Russian, Ukrainian, and Turkish keywords in the alerts, tailored to specific scenarios, would be good. Additionally, Twitter serves as a valuable resource for rapid updates, although it usually requires more effort to filter through irrelevant or less useful information.</p><h3>Conclusion</h3><p>As we&#8217;ve explored in this post, cyber operations have become integral to the strategies of nations and non-state actors alike, often blurring the lines in between. This case study highlights the importance of analysing geopolitical tensions and alignments to anticipate and mitigate the risks of changing security landscape.</p><p>In conclusion, by dissecting such incidents, we gain valuable insights into the tactics and motivations driving cyber conflicts. This understanding is vital for developing more effective security measures and strategies in response to the complex interplay of technology, politics, and international relations.</p><p>I hope you found this article useful.</p><p>See you in the next one!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Geopolitical Cyber Risk: Going Beyond the Industry and Region]]></title><description><![CDATA[Introduction]]></description><link>https://blog.predictivedefense.io/p/geopolitical-cyber-risk-going-beyond</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/geopolitical-cyber-risk-going-beyond</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Sat, 20 Apr 2024 13:11:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0UzP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>When organizations assess threats relevant to them, they frequently try to pinpoint threat actors focusing on their industry and region. This method of limiting the research scope is typical. However, the question arises: are industry and region sufficient criteria for research scope? To comprehend this, a closer examination of intelligence requirements is necessary. We will explore this concept through a hypothetical example.</p><p><em><strong>Disclaimer: The following example, designed to demonstrate intelligence planning, is purely fictional.</strong></em></p><p>Located in Ukraine, <em>TechNovelties</em> is a firm that specializes in producing custom parts, catering to a wide range of clients in this area. It supplies a critical component for the UAVs of a Turkish defense industry client. Here is what is known about the relationship between these two companies:</p><ul><li><p>The company TechNovelties, based in Ukraine, is responsible for producing an essential part for the Armed Unmanned Aerial Vehicles (UAVs) that are made by the Turkish firm <em>SkyDefend Innovations</em>.</p></li><li><p>A portion of these UAVs from <em>SkyDefend</em> is incorporated into the arsenal of the Turkish Armed Forces.</p></li><li><p>Additionally, some of these UAVs are exported to Pakistan, where they are added to the Pakistani armed forces&#8217; inventory.</p></li><li><p>Pakistan aims to use these UAVs to counterbalance certain military threats posed by China.</p></li></ul><p>Given this information, it is reasonable to assume that the Ukrainian firm TechNovelties would be a target of espionage efforts from numerous countries.</p><p>In the context of cyber defense planning, the immediate inclination might be to investigate cyber espionage groups that focus on European technology companies. Yet, if we reverse our perspective and ponder which nations could be intrigued by the information held by TechNovelties, we gain a different insight. This requires us to reflect on the medium and long-term foreign policy, economic, and military goals of these countries.</p><p>From this perspective, several possible scenarios emerge (note that this is not meant to be a comprehensive list):</p><ul><li><p>Given its hostile relations with Ukraine, Russia might be interested in TechNovelties, especially because it exports to defense industry companies, making it an attractive target for Russia.</p></li><li><p><em>SkyDefend Innovations</em>, a customer of TechNovelties, produces UAVs that are slated to be part of the Turkish Armed Forces&#8217; (TSK) arsenal, presenting a potential threat to Turkey&#8217;s neighboring nations. The capability of these Turkish UAVs to shift the balance of power in the Aegean Sea is a known source of concern for Greece. In pursuit of insights into Turkey&#8217;s UAV production capabilities and the quantity of UAVs in the TSK&#8217;s arsenal, Greek intelligence might try to infiltrate TechNovelties to determine the annual volume of parts supplied to SkyDefend Innovations.</p></li><li><p>The effective use of UAVs manufactured by SkyDefend Innovations by the Azerbaijani military in the recent Nagorno-Karabakh conflict is well-documented. Consequently, Armenian intelligence could be interested in acquiring the technical specifications of the components made by TechNovelties, aiming to devise electronic warfare strategies to counter the UAV capabilities of Azerbaijan.</p></li><li><p>India, viewing the UAVs acquired by Pakistan as a potential threat, may consider infiltrating TechNovelties, paralleling Armenia&#8217;s approach.</p></li><li><p>Targeting the Asian market, French companies are intent on selling their drones to Pakistan&#8217;s armed forces. To support this aim, French intelligence might attempt to penetrate TechNovelties to further leverage this entry point into SkyDefend Innovations&#8217; systems, thereby uncovering the prices at which SkyDefend sells its UAVs to Pakistan.</p></li><li><p>For several years, Taiwan has been aspiring to develop UAV production capabilities. As a result, any entity (along with their suppliers) involved in manufacturing this technology would naturally be of interest to Taiwanese intelligence.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0UzP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0UzP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png 424w, https://substackcdn.com/image/fetch/$s_!0UzP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png 848w, https://substackcdn.com/image/fetch/$s_!0UzP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png 1272w, https://substackcdn.com/image/fetch/$s_!0UzP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0UzP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png" width="1400" height="742" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0eef412e-365c-4826-bd75-99857721a356_1400x742.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:742,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0UzP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png 424w, https://substackcdn.com/image/fetch/$s_!0UzP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png 848w, https://substackcdn.com/image/fetch/$s_!0UzP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png 1272w, https://substackcdn.com/image/fetch/$s_!0UzP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0eef412e-365c-4826-bd75-99857721a356_1400x742.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cyber pew pew map</figcaption></figure></div><p>It becomes evident that what is broadly termed &#8216;cyber espionage&#8217; can actually serve a range of different intelligence requirements. In this example, which is far from being comprehensive, we identified espionage activities meeting roughly three specific intelligence needs:</p><ol><li><p>In nations where UAV capabilities are posing a threat, there&#8217;s a need to determine the number of UAVs held by a rival country and to understand the technical characteristics of these UAV components (Military Intelligence).</p></li><li><p>In nations striving for dominance in the UAV market, there is a necessity to obtain the trade secrets and intellectual property of competing UAV manufacturers (Economic Intelligence).</p></li><li><p>In nations aspiring to develop UAV manufacturing abilities, there is a demand for detailed knowledge about this technology (Scientific &amp; Technical Intelligence).</p></li></ol><p>The type of threat landscape mentioned above is not actually something caused by the company itself, but rather a landscape arising from the customers to whom the company supplies its products. Therefore, every new customer, supplier, or market that a company enters introduces additional threats, influenced by the specific nature of its business activities.</p><p>Without a thorough understanding of intelligence planning and utilization of geopolitical analysis, relying exclusively on region and industry for your research will fall significantly short in pinpointing threats relevant to your organization. An effective threat model should determine whether anything an organization possesses concerns the political, economic, scientific, and military objectives of other countries, and it should also catalog the potential risks that arise from such alignments or conflicts.</p><p>I&#8217;ve formulated the following questions to assist organizations in creating this catalog as part of their risk assessment process. Please be aware that in the table below, &#8220;I&#8221; actually refers to the company.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!to5B!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!to5B!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png 424w, https://substackcdn.com/image/fetch/$s_!to5B!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png 848w, https://substackcdn.com/image/fetch/$s_!to5B!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png 1272w, https://substackcdn.com/image/fetch/$s_!to5B!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!to5B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png" width="1400" height="757" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:757,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!to5B!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png 424w, https://substackcdn.com/image/fetch/$s_!to5B!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png 848w, https://substackcdn.com/image/fetch/$s_!to5B!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png 1272w, https://substackcdn.com/image/fetch/$s_!to5B!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F96351d6e-c42c-4f98-8426-3e9661b23356_1400x757.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N3bY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N3bY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png 424w, https://substackcdn.com/image/fetch/$s_!N3bY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png 848w, https://substackcdn.com/image/fetch/$s_!N3bY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png 1272w, https://substackcdn.com/image/fetch/$s_!N3bY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N3bY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png" width="1400" height="859" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:859,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N3bY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png 424w, https://substackcdn.com/image/fetch/$s_!N3bY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png 848w, https://substackcdn.com/image/fetch/$s_!N3bY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png 1272w, https://substackcdn.com/image/fetch/$s_!N3bY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f4bce54-a60f-4664-ba87-ee12df3728cd_1400x859.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h3>Nation-state activities in cyber</h3><p>Throughout their history, states have principally striven for three objectives in their conflicts: military superiority, diplomatic deterrence, and information dominance. The rise of the internet has expanded this struggle into the cyber realm, meanwhile significantly incorporating civilian elements in this conflict. Now civilian sectors can easily find themselves in the crosshairs of military objectives alongside the conventional military-defense targets. Therefore it is necessary to comprehend the dynamics of these inter-state struggle.</p><p>The nation-state use of cyber intrusions/attacks can be categorized into three broad types: <strong>espionage</strong>, <strong>denial</strong>, and <strong>coercion</strong>. This categorisation deliberately leaves out the use of cyber intrusions for propaganda or deception, as these activities are inherently covert and therefore extremely difficult to accurately pinpoint.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eFsl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eFsl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png 424w, https://substackcdn.com/image/fetch/$s_!eFsl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png 848w, https://substackcdn.com/image/fetch/$s_!eFsl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png 1272w, https://substackcdn.com/image/fetch/$s_!eFsl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eFsl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png" width="1400" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:675,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eFsl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png 424w, https://substackcdn.com/image/fetch/$s_!eFsl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png 848w, https://substackcdn.com/image/fetch/$s_!eFsl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png 1272w, https://substackcdn.com/image/fetch/$s_!eFsl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F55d1a0bd-29fe-41e7-a48a-40ee45911e16_1400x675.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4>Cyber Espionage</h4><p>As mentioned earlier, nation-states often engage in cyber espionage to meet a wide range of intelligence needs. Over time, intelligence gathering has branched into specialised sub-disciplines, each catering to the unique requirements of different fields. Your organization is likely to become a target for intelligence agencies if it concerns any of the domains illustrated below.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HFsa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HFsa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png 424w, https://substackcdn.com/image/fetch/$s_!HFsa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png 848w, https://substackcdn.com/image/fetch/$s_!HFsa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png 1272w, https://substackcdn.com/image/fetch/$s_!HFsa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HFsa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png" width="1400" height="877" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:877,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!HFsa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png 424w, https://substackcdn.com/image/fetch/$s_!HFsa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png 848w, https://substackcdn.com/image/fetch/$s_!HFsa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png 1272w, https://substackcdn.com/image/fetch/$s_!HFsa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ae3609-6c70-4e8e-af44-e27308bbfcbf_1400x877.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While many of these areas are quite specialised, three of them concerns a broad spectrum of organizations: <em><strong>political</strong></em>, <em><strong>military</strong></em>, and <em><strong>economic</strong></em> espionage. Hence, it is useful to examine one&#8217;s own activities through the lens of an intelligence agency, using a set of questions like the ones I have provided earlier.</p><p>Another key aspect is differentiating between <strong>strategic collection </strong>and <strong>tactical collection</strong> efforts. It&#8217;s widely known that intelligence collection is guided by specific needs, named as Intelligence Requirements. This principle stems from the traditional discipline of intelligence, so it&#8217;s reasonable to believe that intelligence agencies function in a similar manner. Some of these requirements aim to address immediate, short-term gaps, while others are meant to aid long-term policy goals. As a result, the focus and methods of intelligence collection can shift based on these differing needs.</p><ol><li><p>If a target can provide information valuable for long-term goals, or can provide information the agency is in constant need, or can satisfy multiple intelligence requirements simultaneously, then it is likely to be a focus of <em><strong>strategic collection efforts</strong></em>. Such targets will likely face persistent intrusion attempts unless an alternative information source is found by the intelligence agency.</p></li><li><p>Conversely, if the intelligence need is immediate, (e.g: during diplomatic crises, internal security investigations, or active conflicts) or if the information is of a tactical nature, then the target is likely to be a focus of <em><strong>tactical collection efforts</strong></em>. Depending on the urgency and criticality of the information needed, advanced event-based capabilities[<a href="https://www.amazon.de/Offensive-Cyber-Operations-Understanding-Intangible/dp/1787385612">*</a>] like zero-day exploits might be used. This is less common in strategic collection, as the need for information is long-term and can often be met from multiple sources.</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TXTN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TXTN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png 424w, https://substackcdn.com/image/fetch/$s_!TXTN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png 848w, https://substackcdn.com/image/fetch/$s_!TXTN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png 1272w, https://substackcdn.com/image/fetch/$s_!TXTN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TXTN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png" width="1456" height="379" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:379,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TXTN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png 424w, https://substackcdn.com/image/fetch/$s_!TXTN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png 848w, https://substackcdn.com/image/fetch/$s_!TXTN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png 1272w, https://substackcdn.com/image/fetch/$s_!TXTN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc12f8330-50a3-4b31-8e0f-2d2a6a1a077f_2000x520.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Mapping it all together</h3><p>Creating a map of your organization&#8217;s geopolitical cyber risks is challenging but extremely rewarding. It enables security leadership to better comprehend how certain business decisions might expose your organization to different cyber risks, allowing them to proactively prepare. Let&#8217;s now construct a map using the fictional example provided at the start of this post. It would look like something like this:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C6eO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C6eO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png 424w, https://substackcdn.com/image/fetch/$s_!C6eO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png 848w, https://substackcdn.com/image/fetch/$s_!C6eO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png 1272w, https://substackcdn.com/image/fetch/$s_!C6eO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C6eO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png" width="1456" height="584" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:584,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C6eO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png 424w, https://substackcdn.com/image/fetch/$s_!C6eO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png 848w, https://substackcdn.com/image/fetch/$s_!C6eO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png 1272w, https://substackcdn.com/image/fetch/$s_!C6eO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F590f0d7d-d7a0-4c89-8590-9c849f535e07_2000x802.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I trust you found this post helpful. It was focused on the espionage aspect of cyber intrusions. In the next post, I&#8217;ll delve into their military and diplomatic applications, further aiding our geopolitical risk assessments. See you in the next one!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Predictive Defense: How to do cyber crime forecasting with examples]]></title><description><![CDATA[Hi everyone,]]></description><link>https://blog.predictivedefense.io/p/predictive-defense-how-to-do-cyber</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/predictive-defense-how-to-do-cyber</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Sat, 20 Apr 2024 13:04:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!La7T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!La7T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!La7T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!La7T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!La7T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!La7T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3258210,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!La7T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!La7T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!La7T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!La7T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F504024af-9544-458e-a4c8-7b9cdd7742bc_1792x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Hi everyone,</p><p>In this article, we will examine how to do forecasts on financially motivated cyber crime with examples. If you haven&#8217;t read my previous article on this topic yet, I recommend reading it: <a href="https://open.substack.com/pub/predictivedefense/p/trend-forecasting-how-to-spot-the">Trend Forecasting - How to spot the next big thing in cyber crime?</a></p><p>Before delving into the methodology, let&#8217;s examine the basic dynamics of the cyber crime economy.</p><h3>Understanding the profit dynamics</h3><p>The methods through which criminals can profit can be classified into four main groups.</p><ul><li><p><strong>Selling of commodities:</strong> Criminals may attempt to sell acquired goods such as customer databases, premium accounts, coupon codes, credit cards, bank accounts, or sensitive documents. This provides a quick way for attackers to make money with less risk, especially when there is high demand for the goods.</p></li><li><p><strong>Exploitation of computing resources:</strong> Sometimes, criminals can leverage the processing power of compromised systems. This can generate a reasonable income with a sufficiently large botnet. Examples include clicking on ads, generating fake video views/app downloads, creating website traffic, boosting social media followers, and the most notable, cryptocurrency mining.</p></li><li><p><strong>Extortion:</strong> Criminals may attempt to extort companies by launching DDoS attacks, encrypting files with ransomware, or threatening to release sensitive data that could lead to reputational damage, regulatory fines, and more.</p></li><li><p><strong>Providing services (tertiary sector):</strong> While a campaign itself may appear technically simple and straightforward, the process from preparation to cashing out can be lengthy and complex. Recognising this, some criminals offer services that facilitate various aspects of cyberattacks to other hackers. This is the most diverse market, with examples including advertising, malvertising, affiliate services, credit card checkers, cash-out and shipping services, cryptocurrency laundering, bulletproof hosting, encryptors, hash crackers, ready-to-use toolkits, DDoS-as-a-service, initial access brokers, and 2FA bypass services.</p></li></ul><h3>Changes in Market Conditions</h3><p>Within the context of the profit-making methods we have listed above, consumer demand plays a pivotal role, and when demand can be met by at least one provider, it gives rise to a market. The driving force behind all markets is demand, and thus, meaningful changes in supply cannot be expected without significant changes in demand. Therefore, it is crucial to monitor changes in supply &amp; demand and understand the factors influencing these changes. The factors we will list shortly are interrelated, and a change in one often triggers changes in several others.</p><h4>Possible causes of change in supply &amp; demand</h4><p><strong>Changes in consumer habits:</strong> Consumer habits sometimes change independently of the cybercrime ecosystem and can positively or negatively impact demand for a product. Particularly in markets targeting end-users, such as premium accounts and coupon codes, consumer habits directly influence the market&#8217;s size. For instance, the COVID-19 pandemic worldwide shifted consumers towards digital products and services independently of the cybercrime ecosystem. As a natural consequence, demand for products like premium accounts and coupon codes increased, triggering market growth. A future example could be, in case demand for NFTs continues to rise and NFT trading becomes a part of our daily lives, we can expect the emergence of a market for NFT art theft.</p><p><strong>Changes in the value of commodities:</strong> The value of a commodity can increase or decrease independently of the cybercrime ecosystem, and this has ramifications in the cybercrime economy. A striking example is the significant increase in the value of cryptocurrencies when they entered our daily lives, leading to the emergence of cryptocurrency-related attacks such as cryptominer botnets and cryptojacking. If the value of cryptocurrencies were to drop to a level where these attacks are no longer financially viable, we might no longer see such attacks. Significant increases in commodity values often lead to an increase in supply as more individuals seek to profit from the higher profit margins they offer.</p><p><strong>Expanding Target Range:</strong> The internet comprises a vast array of technological platforms, each of which presents potential opportunities for criminals. In their pursuit of increased profits, criminals expand their target base as far as their capabilities allow, often jumping onto different platforms. For example, the shift of various end-user applications, especially banking, to mobile platforms has naturally led attackers to target mobile platforms. This has been evident in the shift from traditional credit card fraud methods to mobile banking malware. The targeting of IoT devices by botnets and the extension of cryptominer attacks to cloud platforms are other examples. The desire of criminals to broaden their target range creates a natural demand for products and services in this direction. As the target range expands, the number of products entering the market, meaning the supply, increases.</p><p><strong>Proliferation of capabilities:</strong> Some attack methods are not executable by everyone due to the technical knowledge they require. In case a way can be developed to decouple a technique&#8217;s execution from its user, it results in the proliferation of attack capabilities, making what was previously a complex attack chain accessible to a wider audience. This decoupling sometimes occurs through the development of automated tools. Examples include exploit kits, phishing kits, botnet panels, etc. Sometimes, multi-step or technically complex attack types are offered to consumers as &#8220;managed services&#8221;. Ransomware-as-a-service, scanning-as-a-service, malware distribution services, stresser services, and the like fall into this category. This scenario increases the number of players in a market, thereby increasing supply, but an excessive proliferation of capabilities can lead to market saturation.</p><p><strong>Legal and technical measures:</strong> The increase in legal and technical measures against a particular type of cybercrime can both hinder its execution and reduce its profitability. For example, legal regulations developed against credit card fraud made banks responsible for customer protection and liable for compensating customers for losses due to fraud. Consequently, banks developed new technical measures against credit card fraud, making it more difficult to convert stolen credit card funds into cash. As a result, these technical measures made the task more costly and challenging for attackers. Such changes typically affect supply rather than demand since they increase the cost of executing the attack.</p><p><strong>Law enforcement pressure:</strong> At times, law enforcement agencies focus on specific types of crimes and prioritise capturing the individuals involved. This naturally creates pressure on those committing the targeted crimes. The aim here is to make the targeted crime riskier, thereby deterring criminals. Over time, law enforcement priorities can change, leading to varying degrees of pressure on different markets. Sometimes, law enforcement operations can shut down significant avenues of trade or disable a few major suppliers in a market, resulting in a temporary decrease in supply.</p><h3>How does the market respond to changing market conditions?</h3><p>Past experiences show that as a result of changing market conditions, there can be three types of outcomes: <strong>innovation, migration, consolidation </strong>and<strong> expansion</strong>.</p><h4>Innovation</h4><p>At times, while the demand for a product or service does not decrease, the market can shrink due to any pressure on supply. For example, supply might temporarily decrease because a technical measure makes an attack more difficult. In such cases, criminals first try to overcome whatever is causing the pressure on supply. Sometimes, criminals develop a new method to bypass existing technical measures, which is called technical innovation. At other times, criminals change the ways to make money from the same product, and this is referred to as market innovation. Features like the &#8220;pre-order&#8221; option introduced in some markets where Infostealer logs are sold, or dark web forums starting to sell forum messages through a paid API, are examples of market innovation.</p><h4>Migration</h4><p>If the demand for a product or service significantly decreases or disappears, we usually observe the actors serving in that market migrating to more profitable markets. In rarer cases, these actors can create new markets by developing a market innovation.</p><h4>Consolidation</h4><p>When the cost of an attack significantly increases or the attack becomes too risky, we see that the market consolidates in the hands of the major players. For example, as it became harder to convert stolen credit card information into cash, it necessitated the development of new methods. Following this, we observed that the credit card market consolidated into the hands of a minority group familiar with these new methods. This minority group, knowledgeable in cashing out the stolen credit cards, started to buy credit card data in bulk. This demand encouraged those who stole credit card data to sell their data in bulk to these actors instead of trying to cash them out on their own. As a result, the market consolidated.</p><h4>Expansion</h4><p>Changes causing an expanding target range and proliferation of capabilities can increase the profit margin of that type of attack. This situation leads to more actors entering the market, resulting in the market&#8217;s expansion.</p><h3>How to do forecasting step-by-step</h3><h4>Step 1: Choose a market and conduct basic market research</h4><p>Based on the types of threats relevant to your organization, identify markets of interest. Then, using the parameters mentioned above, conduct research to gain insights into the current state of the market. The following questions, which I&#8217;ve listed for basic market research, might help guide your inquiry.</p><p><strong>Intelligence Requirements for Basic Market Research:</strong></p><ul><li><p>How many successful trades have been conducted within a certain time frame, if applicable?</p></li><li><p>What&#8217;s the estimated trade volume within a certain time frame, if applicable?</p></li><li><p>Who are the regular suppliers, if relevant?</p></li><li><p>Who are the primary buyers, if relevant?</p></li><li><p>What is the nature of the relationship between these individuals, showcased in a relationship matrix?</p></li></ul><p>As an example, let&#8217;s take a look at the market for selling premium accounts/coupon codes, which is closely related to credential stuffing attacks. The research doesn&#8217;t necessarily need to provide completely accurate results, especially regarding market volume and the number of transactions. What&#8217;s essential is to have insights into market distribution, operational methods, and the relationships among the actors.</p><p><strong>Premium Account/Coupon Code Market Research</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vfIC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vfIC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png 424w, https://substackcdn.com/image/fetch/$s_!vfIC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png 848w, https://substackcdn.com/image/fetch/$s_!vfIC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png 1272w, https://substackcdn.com/image/fetch/$s_!vfIC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vfIC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png" width="1400" height="963" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:963,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vfIC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png 424w, https://substackcdn.com/image/fetch/$s_!vfIC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png 848w, https://substackcdn.com/image/fetch/$s_!vfIC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png 1272w, https://substackcdn.com/image/fetch/$s_!vfIC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb73f6781-5041-43b3-86e9-d4918b40d09a_1400x963.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4>Step 2: Assess Possible Changes in Defined Conditions</h4><p>List the market drivers we outlined in the earlier sections of the article for your target market. Then, considering the current situation, speculate on potential changes in any of these parameters.</p><p><strong>Potential Changes in Premium Account/Coupon Code Market Conditions</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yaFE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yaFE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png 424w, https://substackcdn.com/image/fetch/$s_!yaFE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png 848w, https://substackcdn.com/image/fetch/$s_!yaFE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png 1272w, https://substackcdn.com/image/fetch/$s_!yaFE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yaFE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png" width="1400" height="929" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:929,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yaFE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png 424w, https://substackcdn.com/image/fetch/$s_!yaFE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png 848w, https://substackcdn.com/image/fetch/$s_!yaFE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png 1272w, https://substackcdn.com/image/fetch/$s_!yaFE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa87d13d4-05e6-4ab6-aafa-1103a92ebbc9_1400x929.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XGDz!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XGDz!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png 424w, https://substackcdn.com/image/fetch/$s_!XGDz!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png 848w, https://substackcdn.com/image/fetch/$s_!XGDz!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png 1272w, https://substackcdn.com/image/fetch/$s_!XGDz!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XGDz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png" width="1400" height="928" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:928,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XGDz!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png 424w, https://substackcdn.com/image/fetch/$s_!XGDz!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png 848w, https://substackcdn.com/image/fetch/$s_!XGDz!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png 1272w, https://substackcdn.com/image/fetch/$s_!XGDz!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F28afe1aa-5d9e-47e1-8097-a9a9958fe2ba_1400x928.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4><strong>Step 3: Brainstorm Scenarios for Potential Outcomes</strong></h4><p>In this third step, we&#8217;ll use a method called the &#8216;cone of plausibility&#8217; to brainstorm how the market might respond to the changes we listed in the previous section. While brainstorming, we&#8217;ll also consider the patterns of innovation, consolidation, expansion, and migration that we discussed in earlier sections.</p><p><strong>Scenarios in response to changing market conditions:</strong></p><ul><li><p>Criminals will find a way to circumvent the CIAM and bot protections, and continue their attacks as usual. (<strong>innovation</strong>)</p></li><li><p>The profit margin for attacks substantially increases due to decreased infostealer log prices, leading to more players entering the market. (<strong>expansion</strong>)</p></li><li><p>With their source of income diminishing due to decreased customer demand, criminals migrate to other markets, such as initial access brokerage, where they can repurpose their skills. (<strong>migration</strong>)</p></li><li><p>Due to the increasing difficulty of exploitation, the market will consolidate around a few players with high capabilities. (<strong>consolidation</strong>)</p></li><li><p>Criminals will abandon the credential stuffing technique and shift their focus to exploiting application vulnerabilities for account takeover. (<strong>innovation</strong>)</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!t19T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!t19T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png 424w, https://substackcdn.com/image/fetch/$s_!t19T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png 848w, https://substackcdn.com/image/fetch/$s_!t19T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png 1272w, https://substackcdn.com/image/fetch/$s_!t19T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!t19T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png" width="1456" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!t19T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png 424w, https://substackcdn.com/image/fetch/$s_!t19T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png 848w, https://substackcdn.com/image/fetch/$s_!t19T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png 1272w, https://substackcdn.com/image/fetch/$s_!t19T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F369f21a5-c2be-4ba1-9fd4-fb5dafd83563_2000x541.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cone of plausibility</figcaption></figure></div><h4>Step 4: Determine Early Indicators to Monitor Scenario Emergence</h4><p>In this final step, for every scenario we anticipate, we will hypothesise how we might observe its emergence and create a list of early signs to monitor. Our assumption is that changes observed in these indicators will reflect the transformations we expect in the market. For instance, in the case study we examined, we could use the indicators listed below as early signs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!e7OM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!e7OM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png 424w, https://substackcdn.com/image/fetch/$s_!e7OM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png 848w, https://substackcdn.com/image/fetch/$s_!e7OM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png 1272w, https://substackcdn.com/image/fetch/$s_!e7OM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!e7OM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png" width="1204" height="982" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:982,&quot;width&quot;:1204,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!e7OM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png 424w, https://substackcdn.com/image/fetch/$s_!e7OM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png 848w, https://substackcdn.com/image/fetch/$s_!e7OM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png 1272w, https://substackcdn.com/image/fetch/$s_!e7OM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1fd7b03c-9aeb-479e-9c75-f3312cbf622d_1204x982.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>However, it&#8217;s essential to note that these signs may not always support the assumed hypothesis. Therefore, testing these assumptions analytically and trying to validate or refute them using available data, wherever possible, is crucial.</p><p>For instance, in the chart below, coupon sales and initial access sales are compared. Observations indicate a trend that began in 2023 and reversed in April. However, this shift in trend does not necessarily imply that those involved in credential stuffing have migrated to the initial access market. After observing such a trend change, a more in-depth investigation should be conducted to determine whether the two events are genuinely related.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J3tH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J3tH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png 424w, https://substackcdn.com/image/fetch/$s_!J3tH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png 848w, https://substackcdn.com/image/fetch/$s_!J3tH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png 1272w, https://substackcdn.com/image/fetch/$s_!J3tH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J3tH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png" width="1400" height="743" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:743,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!J3tH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png 424w, https://substackcdn.com/image/fetch/$s_!J3tH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png 848w, https://substackcdn.com/image/fetch/$s_!J3tH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png 1272w, https://substackcdn.com/image/fetch/$s_!J3tH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcf9e99b7-ce38-442b-9f8b-cd1359e45958_1400x743.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Coupon vs. Initial access sales compared</figcaption></figure></div><p>If it turns out that the two events are unrelated, then our assumption is incorrect, and this event can no longer be used as an indicator.</p><h3>Ok.. so what? &#8212; Assess and prepare for impacts on your security strategy</h3><p>Changes in cybercrime markets, as mentioned, could lead to outcomes such as certain types of attacks becoming more or less frequent in the future or the sophistication level of the techniques used in the attacks increasing. Incorporating these kinds of forecasts into defense planning can better position organizations against potential future threats. Companies can leverage these predictions to prioritize their security investments. Or, they can establish prerequisites to respond more effectively to anticipated threats (e.g., enhancing inter-departmental collaboration, developing incident response plans, conducting drills, etc.). Moreover, forecasting how the market might evolve can facilitate refining intelligence gathering objectives and pre-positioning them. By doing so, we can transition from a security approach that merely responds to the present to one that anticipates and positions itself for the future.</p><p>I hope you&#8217;ve enjoyed reading. Until next time!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Trend Forecasting - How to spot the next big thing in cyber crime?]]></title><description><![CDATA[Introduction]]></description><link>https://blog.predictivedefense.io/p/trend-forecasting-how-to-spot-the</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/trend-forecasting-how-to-spot-the</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Sat, 20 Apr 2024 12:55:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Go0m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>In this blog post, we will discuss how to forecast the evolution of cyber crime landscape. We&#8217;ll first examine the underlying drivers of market, and discuss two powerful techniques for envisioning future scenarios. By understanding the forces at play and applying analytical methodologies, analysts can gain valuable insights into the market&#8217;s potential evolution.</p><h3>Drivers for demand</h3><p>There are four very common ways a cyber criminal can make money:</p><ol><li><p><strong>Extortion: </strong>Criminals can try to extort money from companies by launching DDoS attacks, encrypting their files with ransomware, or threatening to release sensitive data that will lead to loss of reputation, regulatory fines etc. for the company.</p></li><li><p><strong>Selling of commodities: </strong>Criminals may try to sell the goods that they obtained such as customer databases, premium accounts, coupon codes, credit cards, bank accounts or sensitive documents. It is a quick way for attackers to make money with less risk if the commodity has a high demand.</p></li><li><p><strong>Providing services to facilitate others: </strong>While a campaign itself may seem technically simple and straightforward, the process from preparing the attack to cashing out can be long and grueling. Knowing this, criminals can offer services to other hackers that will facilitate some part of their campaigns. This is <em>the</em> most diverse market in the true sense. Some examples; advertising, malvertising, affiliate services, cc checkers, cash out and drop shipping services, crypto laundering, bullet proof hosting, crypters, hash crackers, ready-to-use toolkits, ddos as a service, initial access brokers, 2fa bypass&#8230; and the list goes on and on :D</p></li><li><p><strong>Utilization of computing resources: </strong>Criminals can sometimes utilize the processing power of the systems they have compromised. This can create a decent amount of income with a botnet large enough. Clicking on ads, inauthentic video views/app downloads, generating website traffic, increasing social media followers, and most famously crypto mining are some of the examples.</p></li></ol><p>Once we understand the ways criminals make money, we need to focus on the underlying causes. Without demand, there is no supply. What is produced must be consumed. Let&#8217;s take a look at the types of consumers that underlie these markets, which are the true drivers of the demand.</p><h4>Customers not willing to pay for products or services</h4><p>It is well known that there are people who want to use products and services without paying for them. The more popular a product is, the more people want to use it for free. This creates a demand that will lead to the natural formation of a market. Think of the Netflix accounts, Amazon coupons, Steam gift codes, premium VPNs etc. that are being sold on the underground markets. Some markets even offer paying your bills with a stolen credit card for a low fee (e.g: 10% of the bill amount). This is by far the largest market in terms of quantity.</p><h4>Companies engaging in illicit marketing practices</h4><p>When you think of stolen customer data, first thing that comes to your mind might be identity theft. But the biggest consumers of such data are actually other companies that want to market their own products (and by extension, marketing firms). Instead of curating their own leads, they will take the shortcut and illegally purchase customer data of a company similar to them.</p><h4>Criminals looking to facilitate their operations</h4><p>As mentioned before, criminals may need help at some stages in the end-to-end execution of a campaign. They can purchase certain services to scale their campaigns more effectively. This creates a <a href="https://en.wikipedia.org/wiki/Tertiary_sector_of_the_economy#:~:text=The%20tertiary%20sector%20consists%20of,well%20as%20to%20final%20consumers.">tertiary sector</a> where cybercrime-related services abound. These services are often designed to supplement cybercriminals&#8217; lack of expertise in certain areas.</p><h4>Companies not willing to take responsibility for a breach</h4><p>For companies, disclosing a breach is a financial decision as well as a technical one. Damaged reputation, loss of customers, drop in share prices, and regulatory penalties are some of the direct financial losses that may occur. Certain investments and preparations can significantly reduce this risk. Nevertheless, some companies that don&#8217;t take these steps may want to avoid the consequences when caught off guard.</p><h3>How trends emerge?</h3><p>Based on my observations, there are four ways in which a trend can emerge.</p><h4>Market innovation</h4><p>This is the market&#8217;s way of solving a bottleneck by developing new products or services. It can result in a new market or enhancement of an existing one. For example, the market has responded to law enforcement pressure on ransomware by developing the Ransomware-as-a-Service. Another example is the emergence of initial access brokerage and infostealer markets to assist others in scaling their campaigns.</p><p>As an analyst, watch out for developments that shrink a market significantly. Soon you can expect a market innovation to happen there. Because people(criminals) are less likely to give up on the ways they are used to for making money. Instead, they will seek ways to overcome the obstacles. If the pressure on a market is too much, sometimes you will find that the market begins to consolidate in the hands of the big players. This is simply what has happened to the stolen credit card market over the past few years.</p><h4>Technological advancement</h4><p>Whenever there is a technological breakthrough, attackers will look for ways to exploit it. For example, the introduction of bitcoin into our daily lives has given birth to cryptominer botnets and ransomware. Similarly, the increasing role of smartphones in our daily lives has led criminals to start targeting these platforms as well.</p><p>As an analyst, when you become aware of a new mainstream technology, adopt an adversarial mindset to identify the opportunities with it.</p><h4>Changes in demand</h4><p>Sometimes events occur that lead to a change in consumer behavior. Often the market follows this change in demand. For example, the demand for online products and services spiked during the Covid. This was due to people spending significantly more time at their homes. Cybercrime markets have followed suit, with an increase in credential stuffing attacks.</p><p>As an analyst, we have to keep an eye on the consumer habits, as they may have an influence in the cyber world as well.</p><h4>Cross transference</h4><p>Trends usually start in a single market and then spread to the others. For example, mobile malware was already used in the US market before it became a trend in the Turkish market. If you have visibility into cybercrime ecosystems around the world, you can keep a close eye on the trends you observe in one of them.</p><h3>Thinking of possible futures</h3><p>Having grasped the dynamics of market forces, I would like to discuss two techniques for envisioning future scenarios. Essentially, our objective is to make predictions about how the market may develop given specific factors.</p><h4>1. User journey mapping to identify new market opportunities</h4><p>User journey is a term borrowed from the field of UX research. It means a path a user may take to reach their goal when using a particular website. Once a user journey has been mapped, insights are gained for pain points and opportunities. These insights are then used to design the feature that will enable the user to achieve their goals more easily.</p><p>In our case, users are cybercriminals and the journey is the path they follow to achieve their goal of making money. To begin, select a user persona and try to list all the steps and methods they employ. Next, consider their potential pain points, as each one can reveal opportunities for a new market. By adopting this entrepreneurial approach, you can identify potential services that may emerge in the future.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Go0m!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Go0m!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png 424w, https://substackcdn.com/image/fetch/$s_!Go0m!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png 848w, https://substackcdn.com/image/fetch/$s_!Go0m!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png 1272w, https://substackcdn.com/image/fetch/$s_!Go0m!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Go0m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png" width="1400" height="967" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:967,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Go0m!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png 424w, https://substackcdn.com/image/fetch/$s_!Go0m!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png 848w, https://substackcdn.com/image/fetch/$s_!Go0m!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png 1272w, https://substackcdn.com/image/fetch/$s_!Go0m!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3eeb92ac-443e-4286-81e3-ced6564d3f9f_1400x967.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">User journey of an access broker</figcaption></figure></div><h4>2. Cone of plausibility to forecast impact of events</h4><p>Before diving into the topic, I highly recommend you to read the following blog posts. They make great explanations of the concept with practical examples.</p><ul><li><p><a href="https://www.secalliance.com/blog/applying-cone-of-plausibility-to-cti">Applying Cone of Plausibility to CTI</a></p></li><li><p><a href="https://www.reliaquest.com/blog/forecasting-ransomware-scenarios-in-2022/">Cone of Plausibility: Forecasting Ransomware Scenarios in 2022</a></p></li></ul><p>Now quoting from the first article:</p><blockquote><p>Cone of Plausibility is a structured analytic technique that can be used by intelligence analysts to generate possible threat actor scenarios based on known drivers and events.</p></blockquote><p>By gaining a thorough understanding of the market drivers, it becomes easier to anticipate the impact that any change could have on that particular market. Here is an example that explores the consequences of legal and technical measures implemented to combat credit card theft within this market.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dS-W!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dS-W!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png 424w, https://substackcdn.com/image/fetch/$s_!dS-W!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png 848w, https://substackcdn.com/image/fetch/$s_!dS-W!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png 1272w, https://substackcdn.com/image/fetch/$s_!dS-W!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dS-W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png" width="1400" height="516" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:516,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dS-W!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png 424w, https://substackcdn.com/image/fetch/$s_!dS-W!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png 848w, https://substackcdn.com/image/fetch/$s_!dS-W!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png 1272w, https://substackcdn.com/image/fetch/$s_!dS-W!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd1113b42-0cf5-4198-86eb-d00356677f8d_1400x516.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Cone of plausibility for the stolen credit card market</figcaption></figure></div><p>As you can see, the listed scenarios demonstrate realistic possibilities for the future trajectory of the market. As an analyst, we can try to observe the early signs of each scenario.</p><h3>Cultivating the indicators</h3><p>After engaging in extensive brainstorming regarding market opportunities and potential future scenarios, it is essential to consider the early signs that can be observed if a scenario were to materialize. After a scenario has been laid out clearly and concisely the early signs become apparent. When choosing our early indicators it is important to ensure that they are feasible to observe. There should also be distinctive indicators for different scenarios so that we can differentiate them.</p><p>Once we have identified the early signs, it is time to observe them and wait for our predictions to come true.</p><p>I hope you found this blog post useful.</p><p>See you in the next one!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[ADAPT Framework for Modelling Adversary Behaviour]]></title><description><![CDATA[Hey everyone,]]></description><link>https://blog.predictivedefense.io/p/adapt-framework-for-modelling-adversary</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/adapt-framework-for-modelling-adversary</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Sat, 20 Apr 2024 12:29:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!eyis!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Hey everyone,</p><p>Today I will share my thoughts on one of our industry&#8217;s favourite terms: <strong>Advanced Persistent Threats.</strong></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!eyis!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!eyis!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png 424w, https://substackcdn.com/image/fetch/$s_!eyis!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png 848w, https://substackcdn.com/image/fetch/$s_!eyis!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png 1272w, https://substackcdn.com/image/fetch/$s_!eyis!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!eyis!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png" width="912" height="684" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:684,&quot;width&quot;:912,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!eyis!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png 424w, https://substackcdn.com/image/fetch/$s_!eyis!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png 848w, https://substackcdn.com/image/fetch/$s_!eyis!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png 1272w, https://substackcdn.com/image/fetch/$s_!eyis!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcfb94fa4-4c6c-4ffc-b0f6-5e3a759f5a9e_912x684.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the infosec circles, APT has been a buzzword for quite some time, usually pointing to cyber intrusions backed by nation-states. But in my opinion, this term is far from useful. For instance, what does &#8220;Advanced&#8221; mean exactly? We see lots of reports labelling attacks as &#8220;advanced&#8221; or &#8220;sophisticated&#8221; without really defining what that entails. The truth is, many of these so-called APT intrusions aren&#8217;t all that advanced. They&#8217;re often just good at adapting their tactics and being OPSEC aware.</p><p>Let&#8217;s take a look at the decision chart provided below, which presents the most detailed criteria for identifying APTs I have seen to date.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!VF7N!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!VF7N!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png 424w, https://substackcdn.com/image/fetch/$s_!VF7N!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png 848w, https://substackcdn.com/image/fetch/$s_!VF7N!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png 1272w, https://substackcdn.com/image/fetch/$s_!VF7N!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!VF7N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png" width="952" height="771" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:771,&quot;width&quot;:952,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!VF7N!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png 424w, https://substackcdn.com/image/fetch/$s_!VF7N!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png 848w, https://substackcdn.com/image/fetch/$s_!VF7N!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png 1272w, https://substackcdn.com/image/fetch/$s_!VF7N!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ae08d30-c122-42fc-98fb-7387e213ec67_952x771.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">source: <a href="https://socradar.io/a-for-apt-criteria-for-classifying-cyber-threats/">https://socradar.io/a-for-apt-criteria-for-classifying-cyber-threats/</a></figcaption></figure></div><p>Note that many of the questions in the chart require assessments rather than straightforward facts to be answered. For example:</p><ul><li><p>Is the Group Nation-State Sponsored?</p></li><li><p>Does the Group Engage in Long-Term Intelligence Gathering?</p></li><li><p>Does the Group Exhibit a High Degree of Organisational Sophistication?</p></li></ul><p>This complexity in classifying something as an &#8216;APT&#8217; tends to make the process unnecessarily complex, without offering much add-value for those defending against these threats.</p><p>This blogpost will propose a more accurate way to talk about adversaries, which I call ADAPT. It stands for <strong>Ad</strong>vanced, <strong>A</strong>daptive, <strong>P</strong>ersistent, and <strong>T</strong>argeted. Let&#8217;s break it down.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!BHqP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87940f58-92af-421d-b75d-4787d74336e0_1400x803.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!BHqP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87940f58-92af-421d-b75d-4787d74336e0_1400x803.png 424w, https://substackcdn.com/image/fetch/$s_!BHqP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87940f58-92af-421d-b75d-4787d74336e0_1400x803.png 848w, https://substackcdn.com/image/fetch/$s_!BHqP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87940f58-92af-421d-b75d-4787d74336e0_1400x803.png 1272w, https://substackcdn.com/image/fetch/$s_!BHqP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87940f58-92af-421d-b75d-4787d74336e0_1400x803.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!BHqP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87940f58-92af-421d-b75d-4787d74336e0_1400x803.png" width="1400" height="803" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/87940f58-92af-421d-b75d-4787d74336e0_1400x803.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:803,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!BHqP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87940f58-92af-421d-b75d-4787d74336e0_1400x803.png 424w, https://substackcdn.com/image/fetch/$s_!BHqP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87940f58-92af-421d-b75d-4787d74336e0_1400x803.png 848w, https://substackcdn.com/image/fetch/$s_!BHqP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87940f58-92af-421d-b75d-4787d74336e0_1400x803.png 1272w, https://substackcdn.com/image/fetch/$s_!BHqP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F87940f58-92af-421d-b75d-4787d74336e0_1400x803.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>1. Advanced</h3><p>In our field, it is a tendency to slap the label &#8220;advanced&#8221; on nearly every cyber threat. But if everything is advanced, then really, nothing is. &#8220;Advanced&#8221; here should mean something specific: those really high-end, costly capabilities that only a few adversaries can get their hands on. We&#8217;re talking about less than 1% of all cyber attacks. Examples include:</p><ul><li><p>Commercial Spyware (e.g: Pegasus)</p></li><li><p>Zero-day exploits</p></li><li><p>ICS-tailored Malware</p></li><li><p>Deep packet inspection and similar ISP-level attacks</p></li></ul><p>So one may look at the capabilities employed in an intrusion set, and if either of the above capabilities are present, then we can speak about an Advanced adversary.</p><h3>2. Adaptive</h3><p>This trait reflects an adversary&#8217;s willingness to modify tactics in response to environmental changes. Adaptiveness often correlates with high-precision targeting. In targeted campaigns, adversaries typically engage in target-specific information gathering and tailor their tactics accordingly. Conversely, opportunistic campaigns tend to use a similar set of tools across numerous targets simultaneously. Adaptiveness is a spectrum rather than a binary value, and it can vary across different phases of an intrusion.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TeZw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TeZw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png 424w, https://substackcdn.com/image/fetch/$s_!TeZw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png 848w, https://substackcdn.com/image/fetch/$s_!TeZw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png 1272w, https://substackcdn.com/image/fetch/$s_!TeZw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TeZw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png" width="1400" height="430" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:430,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!TeZw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png 424w, https://substackcdn.com/image/fetch/$s_!TeZw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png 848w, https://substackcdn.com/image/fetch/$s_!TeZw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png 1272w, https://substackcdn.com/image/fetch/$s_!TeZw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F31a3e6e6-abea-4747-a58f-9917f60ac35f_1400x430.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>3. Persistent</h3><p>Persistence is the adversary&#8217;s dedication to continue their attacks until achieving their objective. While sometimes related to adaptiveness or high-precision targeting, persistence can manifest independently as well. For example, the Leery Turtle[<a href="https://malpedia.caad.fkie.fraunhofer.de/details/vbs.cageychameleon">*</a>] campaigns during the period of 2017&#8211;2020 exhibited high persistence but little tactical variation over time. Thus, it&#8217;s more useful to assess this trait separately, on a spectrum.</p><h3>4. Targeted</h3><p>As implied, this property indicates the specificity of targeted individuals or entities during an intrusion. According to ProofPoint, over 95% of APT campaigns target no more than five customers at a time. Despite challenges in assessment due to collection gaps, understanding the targeted nature of an attack can be insightful. This property should also be viewed as a spectrum, from low-precision to high-precision.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!n8gF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!n8gF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png 424w, https://substackcdn.com/image/fetch/$s_!n8gF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png 848w, https://substackcdn.com/image/fetch/$s_!n8gF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png 1272w, https://substackcdn.com/image/fetch/$s_!n8gF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!n8gF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png" width="1400" height="394" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:394,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!n8gF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png 424w, https://substackcdn.com/image/fetch/$s_!n8gF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png 848w, https://substackcdn.com/image/fetch/$s_!n8gF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png 1272w, https://substackcdn.com/image/fetch/$s_!n8gF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb5bb28ee-a9eb-4b66-86ea-5e67aa609982_1400x394.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Mapping ADAPT to Defense Strategies</h3><p>The ADAPT framework is very useful for cyber defense planning.</p><p><strong>Using ADAPT with Adversary Persona Cards</strong></p><p>We can integrate ADAPT properties into <strong><a href="https://robindimyan.medium.com/a-threat-is-not-a-threat-actor-36aee4f3d6cc">Adversary Persona Cards</a></strong> and assign ratings to each attribute to calculate an overall ADAPT Score. This allows ADAPT to be used as an additional factor in prioritising different types of adversaries, with a higher ADAPT Score signifying a more difficult adversary to defend against.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!imel!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!imel!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png 424w, https://substackcdn.com/image/fetch/$s_!imel!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png 848w, https://substackcdn.com/image/fetch/$s_!imel!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png 1272w, https://substackcdn.com/image/fetch/$s_!imel!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!imel!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png" width="1400" height="1029" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1029,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!imel!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png 424w, https://substackcdn.com/image/fetch/$s_!imel!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png 848w, https://substackcdn.com/image/fetch/$s_!imel!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png 1272w, https://substackcdn.com/image/fetch/$s_!imel!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb71bfdd5-f808-48ba-bc30-951b1b4d5afe_1400x1029.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Adversary personas &amp; ADAPT</figcaption></figure></div><p><strong>Strategising for High-End ADAPT Properties</strong></p><p>ADAPT also allows tailored strategies for mitigating threats at the higher end of each property. Defense planners can ask the following questions to initiate a brainstorming:</p><ul><li><p>How can we defend ourselves against an adversary with advanced (0-day, DPI etc.) capabilities?</p></li><li><p>How can we defend ourselves against an adversary who is highly adaptive to our environment?</p></li><li><p>How can we defend ourselves against an adversary who is very persistent?</p></li><li><p>How can we defend ourselves against an adversary who is very selective in its targets?</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7pcZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7pcZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png 424w, https://substackcdn.com/image/fetch/$s_!7pcZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png 848w, https://substackcdn.com/image/fetch/$s_!7pcZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png 1272w, https://substackcdn.com/image/fetch/$s_!7pcZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7pcZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png" width="1456" height="459" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:459,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7pcZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png 424w, https://substackcdn.com/image/fetch/$s_!7pcZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png 848w, https://substackcdn.com/image/fetch/$s_!7pcZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png 1272w, https://substackcdn.com/image/fetch/$s_!7pcZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8e167fbc-40ca-4cc5-91fe-b188d1b50d32_1908x602.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">ADAPT Defense Planning</figcaption></figure></div><h2><strong>Assigning ADAPT to Threat Actor Profiles</strong></h2><p>Lastly, similar to the first approach, ADAPT can also be applied to threat actor profiles. It&#8217;s very straightforward to assign ADAPT values by examining the facts related to an intrusion set.</p><p>Let&#8217;s take the following example of <strong><a href="https://attack.mitre.org/groups/G0125/">HAFNIUM</a></strong>:</p><blockquote><ul><li><p>ADVANCED: <strong>YES</strong> (4 pts)<strong> </strong>&#8212; <a href="https://www.microsoft.com/security/blog/2021/03/02/hafnium-targeting-exchange-servers/">MSTIC. (2021, March 2). HAFNIUM targeting Exchange Servers with 0-day exploits.</a></p></li><li><p>ADAPTIVE: <strong>HIGH</strong> (4 pts) &#8212; Usage of 0days, targeted nature of the attacks, target-specific information gathering (T1592.004, T1589.002, T1590), and internal discovery (T1057, T1018, T1016, T1033)</p></li><li><p>PERSISTENT: <strong>HIGH</strong> (4 pts) &#8212; Threat group is known to be operating since at least 2021 with a perceived objective of intelligence collection.</p></li><li><p>TARGETED: <strong>MEDIUM-HIGH</strong> (3 pts) &#8212; <a href="https://attack.mitre.org/groups/G0125">HAFNIUM</a> primarily targets entities in the US across a number of industry sectors, including infectious disease researchers, law firms, higher education institutions, defense contractors, policy think tanks, and NGOs.</p></li></ul><p>HAFNIUM&#8217;s ADAPT Score: 15 / 16</p></blockquote><p>Another example of <strong><a href="https://cyberstruggle.org/delta/LeeryTurtleThreatReport_05_20.pdf">Leery Turtle</a></strong>:</p><blockquote><ul><li><p>ADVANCED: <strong>NO</strong> (0 pts) &#8212; No observed usage of advanced capabilities.</p></li><li><p>ADAPTIVE: <strong>MEDIUM</strong> (2 pts) &#8212; Change of tactics in response to public CTI reports.</p></li><li><p>PERSISTENT: <strong>HIGH</strong> (4 pts) &#8212; Campaigns have been ongoing from at least 2017 up to the 2023.</p></li><li><p>TARGETED: <strong>MEDIUM-HIGH</strong> (3 pts) &#8212; Cryptocurrency exchanges are targeted worldwide.</p></li></ul><p>Leery Turtle&#8217;s ADAPT Score: 9 / 16</p></blockquote><h3>Conclusion</h3><p>Using ADAPT gives us a clearer picture of cyber adversary behaviour. Understanding these four aspects &#8212; <strong>Ad</strong>vanced, <strong>A</strong>daptive, <strong>P</strong>ersistent, and <strong>T</strong>argeted &#8212; helps us better gauge the strength and strategies of our cyber defences. Ultimately, ADAPT is intended to provide a framework to guide cybersecurity efforts in a more targeted and effective manner.</p><p>I hope you found this article useful. See you in the next one!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[From Warnings to Actions: Proactive Countermeasures Framework]]></title><description><![CDATA[Introduction]]></description><link>https://blog.predictivedefense.io/p/from-warnings-to-actions-proactive</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/from-warnings-to-actions-proactive</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Sat, 20 Apr 2024 09:56:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>In the previous posts, we&#8217;ve delved into the use of predictive analysis methods for anticipating cyber threats, focusing on the development of early warning systems and techniques for forecasting changes in threat landscape. I recently had the opportunity to speak on this very topic during the SANS Threat Analysis Rundown webcast, hosted by Katie Nickels. For those who haven&#8217;t yet seen it, I highly recommend watching the webcast here: </p><div id="youtube2-YifJ8vrBz3g" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;YifJ8vrBz3g&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/YifJ8vrBz3g?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>One critical aspect to understand about predictive analysis is that its outputs are inherently estimative, not definitive. In simpler terms, this method provides us with probabilistic outcomes, such as predicting a 60% likelihood of a spear-phishing attack within the next three weeks. This probabilistic nature can be challenging, especially for cyber defenders who are traditionally more accustomed to working with concrete facts, like Indicators of Compromise.</p><p>The question then arises: how do we effectively act on these probabilistic predictions from early warning systems? To address this, I&#8217;ll introduce what I&#8217;ve termed the &#8220;<strong>Proactive Countermeasures Framework</strong>&#8221; in this post. This framework is designed to complement Early Warning Systems, translating warnings into actionable steps by integrating pre-emptive and temporary security measures.</p><h3><strong>The Proactive Countermeasure Framework (PCF): An Overview</strong></h3><p>The PCF is structured around two types of security actions: Pre-emptive Measures (PMs) and Temporary Measures (TMs). PMs are safety-oriented actions taken regularly to mitigate risks proactively. Unlike static defenses, they are dynamic and adapt to evolving circumstances, but their deployment is considered safe and routine for the organization. TMs, on the other hand, are dynamic, implemented in response to heightened threat levels indicated by the early warning and forecasting systems.</p><h3>Pre-emptive Measures (PMs)</h3><p>PMs are essential to the PCF, tailored to respond to the patterns revealed through security analytics. For instance, analytics may indicate a cyclical compromise of employee credentials. Here&#8217;s how PMs would proactively address this:</p><p><strong>Example of PM Implementation:</strong></p><p>Let&#8217;s assume that we have detected a pattern of credential compromise every six weeks. Before the anticipated time of compromise we could take the following actions:</p><ul><li><p><strong>User Risk Profiling:</strong> Every six weeks, security teams generate a list of high-risk user accounts by analysing login behaviours, such as date/time, location, failed attempts etc.</p></li><li><p><strong>Forced Password Reset:</strong> For the identified users, the system enforces a password reset. This measure, while dynamic, is safe as it&#8217;s limited to users assessed as high-risk based on objective telemetry, minimising operational disruption.</p></li></ul><p>This dynamic approach to PMs ensures routine security actions remain both effective and unobtrusive.</p><h3>Temporary Measures (TMs)</h3><p>TMs are stricter controls temporarily applied in response to elevated threat levels. These are not meant to be permanent due to potential disruptions or resource intensity. They&#8217;re designed for short-term use to counter imminent threats and are usually lifted once the threat passes.</p><p><strong>Example of TM Activation:</strong></p><p>Upon receiving an early warning of an imminent spear phishing campaign targeting the finance department we could take the following actions:</p><ul><li><p><strong>Access Control Tightening:</strong> Access to critical applications is immediately restricted to essential personnel only.</p></li><li><p><strong>Enhanced Authentication:</strong> Multi-factor authentication requirements are intensified for those with access to sensitive data.</p></li><li><p><strong>Monitoring Upscale:</strong> Email traffic is scrutinised with advanced filtering techniques to intercept phishing attempts.</p></li></ul><h3>Executing the Proactive Countermeasure Framework</h3><p>Having introduced the concept let&#8217;s now explore its practical implementation. The implementation of PCF is achieved through a <strong>Proactive Countermeasure Plan (PCP)</strong>, which is essentially a repertoire of pre-emptive and temporary measures tailored to correspond with different levels of confidence in our predictive analyses.</p><p>Creating a Proactive Countermeasure Plan (PCP) means setting up a careful plan that aligns with the varying degrees of confidence associated with potential threat scenarios. Here&#8217;s how to develop an effective PCP:</p><p><strong>Define Threat Levels Based on Confidence:</strong></p><ul><li><p>Establish clear threat levels that correspond to different confidence thresholds in your predictive analysis.</p></li><li><p>These thresholds will serve as triggers for executing specific countermeasures. For instance, a low confidence threshold might initiate basic PMs, while a higher threshold could trigger more intensive TMs.</p></li></ul><p><strong>List Pre-emptive and Temporary Measures for Each Level:</strong></p><ul><li><p>For each defined threat level, enumerate the specific PMs and TMs that will be implemented.</p></li><li><p>This list should detail what actions are to be taken and under what circumstances, ensuring a tailored response that&#8217;s proportional to the assessed threat level.</p></li></ul><p>Take a look at the more detailed example below. This PCP is specifically designed to respond to early warnings regarding imminent spear phishing attacks. Pay attention to how different threat levels are defined and the specific actions associated with each of these levels becoming increasingly stringent.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iOGj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iOGj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png 424w, https://substackcdn.com/image/fetch/$s_!iOGj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png 848w, https://substackcdn.com/image/fetch/$s_!iOGj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png 1272w, https://substackcdn.com/image/fetch/$s_!iOGj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iOGj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png" width="1456" height="522" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/dcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:522,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iOGj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png 424w, https://substackcdn.com/image/fetch/$s_!iOGj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png 848w, https://substackcdn.com/image/fetch/$s_!iOGj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png 1272w, https://substackcdn.com/image/fetch/$s_!iOGj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdcba0d3f-cce1-4098-8060-675e1301695f_2000x717.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Example Proactive Countermeasures Plan for spear phishing attacks</figcaption></figure></div><p>To implement the PCP effectively consider the following:</p><ul><li><p>Use predictive analytics to inform when PMs should be updated or when TMs should be activated.</p></li><li><p>Establish protocols that clearly outline when and how TMs are to be deployed in response to threats.</p></li><li><p>Ensure staff are well-versed in PM and TM protocols through regular training and simulated exercises.</p></li><li><p>After any PM or TM activation, conduct debriefs to refine tactics, addressing any inefficiencies or oversights.</p></li><li><p>Keep all relevant parties informed about current security postures and any changes to routines or access.</p></li></ul><h3>Conclusion</h3><p>The Proactive Countermeasure Framework provides organizations with a methodology to proactively counteract potential cyber threats. By combining PMs and TMs, security teams can maintain responsive defense posture, adjusting swiftly to the threat landscape&#8217;s ebb and flow. As cyber threats continue to grow in complexity, such an adaptable, predictive approach to cybersecurity is not just recommended but required to protect our organisations effectively.</p><p>I hope you enjoyed this post! Feel free to reach out to let me know your thoughts.</p><p>See you in the next one.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Predictive Defense: How to build Early Warning System with examples]]></title><description><![CDATA[Introduction Predictive approach aims to organise cyber defense based on scenarios with probability to materialize in the future, unlike the traditional approach that relies on what has already happened. It utilizes predictive analysis methods and a red team perspective.]]></description><link>https://blog.predictivedefense.io/p/predictive-defense-how-to-build-early</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/predictive-defense-how-to-build-early</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Sat, 20 Apr 2024 09:43:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/67b3a2b9-c339-42a9-b198-15f08d73168a_1792x1024.webp" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!qv5c!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!qv5c!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!qv5c!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!qv5c!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!qv5c!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!qv5c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png" width="1456" height="832" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:832,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2833080,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!qv5c!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png 424w, https://substackcdn.com/image/fetch/$s_!qv5c!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png 848w, https://substackcdn.com/image/fetch/$s_!qv5c!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!qv5c!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa65ef37b-a62f-4b2e-a34b-658a390d9659_1792x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3>Introduction</h3><p>Predictive approach aims to organise cyber defense based on scenarios with probability to materialize in the future, unlike the traditional approach that relies on what has already happened. It utilizes predictive analysis methods and a red team perspective.</p><p>As a result of these efforts, two types of predictions are obtained: forecasts (long-term) and early warnings (short-term). Forecasts provide information about conditions that may occur in the long term (1+ year) and assist in shaping security strategy. Early warnings, on the other hand, provide us with information about impending attacks (ranging from a few weeks to one month in advance) and enable us to initiate preparatory activities early.</p><p>In this article, we will focus on the second type of prediction, which is early warning.</p><h2>Research Methods for Early Warning System</h2><p>In previous articles, we discussed that there are various approaches that can be used to create an early warning system. However, we can categorise all of these approaches into two groups:</p><ol><li><p>Profile-driven research methods</p></li><li><p>Correlation-guided research methods</p></li></ol><h3><strong>Profile-driven Research</strong></h3><p>The actor-centric method can be primarily defined as tracking the digital footprints of actors of interest. This can involve monitoring the patterned behaviours of actors in attack preparation or observing their activities on forums or similar platforms. This method requires an analyst to closely follow an actor or a series of cyber campaigns. While it demands more resources, it produces more reliable and actionable signals. This method is particularly useful when dealing with persistent actors targeting your organization.</p><p>Here is an example:</p><p><strong>Leery Turtle &#8212; Tracking the Actor&#8217;s Attack Preparation Stages</strong></p><blockquote><p>When these attacks were investigated, some characteristics were discovered in the C2 servers used in the attack. The following signs were defined for the observed characteristics.</p><ul><li><p>Purchase of a new domain with the same pattern as Leery Turtle, containing at least two of the words google, drive, cloud, share, upload. (Sign 1: potential Leery Turtle domain)</p></li><li><p>Having ports 80 and 8080 open at the same time on the server directed by the domain name. (Sign 2: potential Leery Turtle host)</p></li><li><p>A domain/server was tagged as &#8220;Leery Turtle&#8221; when both of the conditions we defined met simultaneously.</p></li></ul></blockquote><p>Full report: <a href="https://cyberstruggle.org/delta/LeeryTurtleThreatReport_05_20.pdf">Leery Turtle Threat Report</a></p><h3>Correlation-guided Research</h3><p>The second method is based on investigating correlations among various internal and external signals. If these correlations can be found, they can be used as probabilistic indicators of a cyber attack. This method can be implemented with lower costs but produces signals with lower reliability and are not generalisable.</p><p>Now, let&#8217;s take a brief look at an example of this correlation-based approach, which I discussed in the article &#8220;<a href="https://open.substack.com/pub/predictivedefense/p/early-warning-intelligence-how-to?r=3rb0gb&amp;utm_campaign=post&amp;utm_medium=web">Early Warning Intelligence &#8212; How to predict cyber attacks?</a>&#8221;</p><h3>Collecting data</h3><p><em>Disclaimer: The example I will discuss below is fictional and does not reflect the data of any real organization.</em></p><p>In the first step, data was collected from various internal and external sources related to various events and visualised on a time series. These events were randomly selected, and in the next step, it will be examined to see whether there is a correlation among them. The events that were selected was:</p><ol><li><p>Darkweb mentions (source: intel vendor)</p></li><li><p>Exposed credential through infostealer (source: intel vendor)</p></li><li><p>Phishing/spam emails (source: user reports)</p></li><li><p>Coupon code sales (source: intel vendor)</p></li><li><p>DDoS attacks (source: WAF)</p></li><li><p>Web exploitation attempts (source: WAF)</p></li><li><p>Azure risky sign-ins (source: Azure)</p></li></ol><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7oe0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7oe0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png 424w, https://substackcdn.com/image/fetch/$s_!7oe0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png 848w, https://substackcdn.com/image/fetch/$s_!7oe0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png 1272w, https://substackcdn.com/image/fetch/$s_!7oe0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7oe0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png" width="1400" height="474" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:474,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7oe0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png 424w, https://substackcdn.com/image/fetch/$s_!7oe0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png 848w, https://substackcdn.com/image/fetch/$s_!7oe0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png 1272w, https://substackcdn.com/image/fetch/$s_!7oe0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c948c5f-9563-475f-bec6-5fb92b666506_1400x474.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Time series visualisation of events</figcaption></figure></div><h3>Investigating for correlations</h3><p>The second step was to filter out data sets with low variation among them. For example, an event that occurs almost every day renders any correlation with itself meaningless. Afterward, the binary combinations of these events were compared using the correlation function. This process was repeated by shifting one of the compared data sets forward in time. In other words, we&#8217;re attempting to find an answer to the question, &#8216;Is there a correlation between the event A from one week ago and the event B today?&#8217;</p><p>Then, something interesting surfaced. When the data was shifted by two weeks, a moderate inverse correlation between Infostealer and DDoS events was observed. What this data was telling us is that some of the DDoS attacks were happening in the midst of two Infostealer-related credential leakage events. Despite not giving a strong signal, lets investigate this intriguing occurrence further.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!67ya!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!67ya!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png 424w, https://substackcdn.com/image/fetch/$s_!67ya!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png 848w, https://substackcdn.com/image/fetch/$s_!67ya!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png 1272w, https://substackcdn.com/image/fetch/$s_!67ya!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!67ya!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png" width="1138" height="190" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/da70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:190,&quot;width&quot;:1138,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!67ya!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png 424w, https://substackcdn.com/image/fetch/$s_!67ya!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png 848w, https://substackcdn.com/image/fetch/$s_!67ya!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png 1272w, https://substackcdn.com/image/fetch/$s_!67ya!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fda70b367-8afc-44a1-82af-d2a602d254a3_1138x190.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Moderate amount of inverse correlation between Infostealer and DDoS instances</figcaption></figure></div><h3>Going down the rabbit hole</h3><p>Between the seemingly unrelated events of Infostealer infection and DDoS attack, two things needed to be investigated to uncover the connection:</p><ol><li><p>What information was present in the Infostealer logs where credential leaks were detected, and what was the content of other logs published around the same time?</p></li><li><p>What were the scale, type, and impact of the DDoS attacks?</p></li></ol><p>Upon examining the first case, everything seemed to be normal. The logs we identified were typical Infostealer logs containing passwords, some belonging to the customers and others to the employees. Actions had been taken for all the leaks, and there were no signs of exploitation for the leaked accounts.</p><p>However, upon a closer look to the DDoS incidents, something interesting came up. Some of the events classified as DDoS attacks were actually credential stuffing attacks! The attack&#8217;s execution involved making repeated requests to the system, and the WAF was categorising them as DDoS attacks. That&#8217;s when it hit me.</p><h3>Constructing the hypothesis</h3><p>Using threat intelligence sources, I conducted research on credential stuffing attacks. I learned that attackers commonly create custom username/password lists tailored to the platforms they target, using various sources, including data breaches and Infostealer logs. These public sources were easy pickings for the attackers!</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!oefE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!oefE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png 424w, https://substackcdn.com/image/fetch/$s_!oefE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png 848w, https://substackcdn.com/image/fetch/$s_!oefE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png 1272w, https://substackcdn.com/image/fetch/$s_!oefE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!oefE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png" width="1400" height="127" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:127,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!oefE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png 424w, https://substackcdn.com/image/fetch/$s_!oefE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png 848w, https://substackcdn.com/image/fetch/$s_!oefE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png 1272w, https://substackcdn.com/image/fetch/$s_!oefE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7b0df798-7f83-4c18-a20b-b1b5f9a22f06_1400x127.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Credential stuffing attack tactics</figcaption></figure></div><p>The correlation we observed here was likely related to this. Attackers were using publicly shared Infostealer logs to generate new combolists and launching attacks a few days later. With this newfound information, I was able to formulate the following hypothesis:</p><blockquote><p>If accounts belonging to our organization or our customers have been leaked in publicly shared Infostealer logs (and data breaches), there is a 40% probability that a DDoS/credential stuffing attack will occur within two weeks.</p></blockquote><h3><strong>Building the Early Warning System</strong></h3><p>At this point, the system we are going to establish is very straightforward:</p><ol><li><p>Identify and monitor sources where Infostealer logs and data breaches are publicly shared.</p></li><li><p>Detect compromised accounts belonging to our organization and customers.</p></li><li><p>Generate alerts if the number of these compromised accounts exceeds a certain threshold.</p></li></ol><p>This series of actions, which can be easily automated, will essentially become our early warning system!</p><h3><strong>Ok.. so what?</strong></h3><p>This system, being based on correlation rather than intelligence, cannot produce alerts with absolute certainty. You may rightfully ask, <em>&#8216;What can I do with information about an attack that may never happen?&#8217;</em> This situation actually highlights how static our current defense approach is. A defense structure that only acts on facts and consistently produces the same type of actions will never go beyond being reactive. That&#8217;s why I believe we need to shift our perspectives about cyber defense. While facts are undoubtedly important, we should also incorporate predictions into our defense planning. With more flexible and creative action plans, we can fully harness the benefits of predictions and truly achieve proactive defense.</p><p>At this point, I want to introduce a concept that I call <strong>temporary countermeasures</strong>. These are security controls that we cannot permanently implement for various reasons but could be temporarily useful in situations where the threat level is elevated.</p><p>Let&#8217;s take an example of an alert generated by the system we designed above. You are expecting a credential stuffing attack with a 40% probability within the next two weeks. In this case, temporarily implementing the following controls can help reduce its impact when the credential stuffing attack occurs.</p><ol><li><p>Adjusting rate limits, bot scores etc. to be more restrictive</p></li><li><p>Configure k8s pods to use increased resources</p></li><li><p>Disable certain features temporarily to mitigate impact</p></li></ol><p>If you noticed, these controls are not feasible to implement permanently, mainly due to their cost or the friction they might create for users. However, in high-risk and high-threat environments, the cost of temporarily implementing these controls can become tolerable. A striking example of this is a cryptocurrency exchange that, during an attack, temporarily subjects normally automated withdrawal processes to manual verification, preventing the theft of customer funds.</p><p>I hope you enjoyed my post. See you in the next one!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Early Warning Intelligence — How to predict cyber attacks?]]></title><description><![CDATA[Introduction]]></description><link>https://blog.predictivedefense.io/p/early-warning-intelligence-how-to</link><guid isPermaLink="false">https://blog.predictivedefense.io/p/early-warning-intelligence-how-to</guid><dc:creator><![CDATA[Robin Dimyanoglu]]></dc:creator><pubDate>Sat, 20 Apr 2024 09:23:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Dis0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h3>Introduction</h3><p>When you read any CTI report, you will often find that it answers more or less the same questions. How did the attacker get into the system? What were the steps following the initial compromise? And what is the impact?</p><p>But is it possible to predict a cyberattack? The methods used for that today are based on several assumptions. To explain simply; We assume that a threat actor will repeat the same post-compromise behaviour we observed. But in my opinion, we are focusing on the wrong part of the &#8220;kill chain&#8221;.</p><p>In this article, instead of focusing on post-exploit indicators, we will look at how to construct an early warning system by observing the preparation stages.</p><h3><strong>What is an Early Warning?</strong></h3><p>Let&#8217;s start by defining what we should expect from an &#8220;early warning&#8221;.</p><ul><li><p>Time period in which the attack is expected to occur</p></li><li><p>Type of the attack (e.g: malspam, phishing, exploitation)</p></li><li><p>Certainty / confidence (e.g: with 60% chance)</p></li><li><p>Threat duration</p></li><li><p>Observables (if available)</p></li><li><p>Signals used to make the prediction</p></li></ul><p>Sample memo:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Dis0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Dis0!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png 424w, https://substackcdn.com/image/fetch/$s_!Dis0!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png 848w, https://substackcdn.com/image/fetch/$s_!Dis0!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png 1272w, https://substackcdn.com/image/fetch/$s_!Dis0!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Dis0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png" width="1206" height="610" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:610,&quot;width&quot;:1206,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Dis0!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png 424w, https://substackcdn.com/image/fetch/$s_!Dis0!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png 848w, https://substackcdn.com/image/fetch/$s_!Dis0!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png 1272w, https://substackcdn.com/image/fetch/$s_!Dis0!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc30fa0d0-c9df-43d5-9423-703130e2a272_1206x610.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>A Closer Look at Initial Access Vectors</strong></h3><p>When we read through the CTI reports, we see that there are several initial access vectors that are frequently used by cybercriminals.</p><ul><li><p>Network service exploitation</p></li><li><p>Malspam campaign</p></li><li><p>Spear phishing</p></li><li><p>Credential attacks (wordlist attacks)</p></li><li><p>Buying access</p></li></ul><p>This is also beautifully illustrated in the <a href="https://github.com/curated-intel/Initial-Access-Broker-Landscape/blob/main/InitialAccessBrokers.png">IAB Landscape</a> chart prepared by the CuratedIntel community.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!19t6!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!19t6!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png 424w, https://substackcdn.com/image/fetch/$s_!19t6!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png 848w, https://substackcdn.com/image/fetch/$s_!19t6!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png 1272w, https://substackcdn.com/image/fetch/$s_!19t6!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!19t6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png" width="1400" height="525" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:525,&quot;width&quot;:1400,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!19t6!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png 424w, https://substackcdn.com/image/fetch/$s_!19t6!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png 848w, https://substackcdn.com/image/fetch/$s_!19t6!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png 1272w, https://substackcdn.com/image/fetch/$s_!19t6!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F27b1db85-c256-4d54-ab7d-b9ce5630b65e_1400x525.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Since these are preparatory stages, we can assume that an attack of a certain type will only occur when the corresponding conditions are met.</p><p>The question we must now ask is: which of these stages can we observe from the outside? And how?</p><h3><strong>Identifying Observation Opportunities</strong></h3><p>If we can deduce patterns about the preparatory phases, we can use them as an opportunity for observation. For instance, the main goal of network service exploiters is to hijack as many devices as possible. Therefore, they generally target widely used network protocols such as Email, file sharing, VPN.</p><p>In addition, most actors who do this work do not have the skills to develop the exploit code themselves. Therefore, they use ready-made exploit modules published by companies such as Metasploit, Cobalt Strike, or other security researchers.</p><p>Using these patterns, we can develop the following signals to predict an NSE campaign.</p><ul><li><p><strong>Signal 1:</strong> A new vulnerability of a widely used network service has been discovered.</p><ul><li><p><em>Observe: NVD, CVE</em></p></li></ul></li><li><p><strong>Signal 2:</strong> The exploit module for the given vulnerability has become available.</p><ul><li><p><em>Observe: Rapid7, Exploit-db, Github, Cobalt Strike, Dark web</em></p></li></ul></li><li><p><strong>Signal 3:</strong> A new exploit code has become available for a known vulnerability.</p><ul><li><p><em>Observe: same as Signal 2</em></p></li></ul></li><li><p><strong>Signal 4:</strong> An exploit kit has begun to be advertised in crime markets.</p><ul><li><p><em>Observe: Dark web</em></p></li></ul></li><li><p><strong>Signal 5:</strong> An exploit has been observed in the wild.</p><ul><li><p><em>Observe: CISA, Greynoise</em></p></li></ul></li></ul><p>The same process can be done for other vectors too. Let&#8217;s take malspam as another example.</p><p>Malspam is another type of vector in which actors go after quantity and are very opportunistic. For that reason they&#8217;re often delivered through cracked software or ads.</p><p>Using these patterns, we can develop the following signals to predict a malspam campaign:</p><ul><li><p><strong>Signal 1:</strong> A popular game or software has become available on torrent websites.</p><ul><li><p><em>Observe: Popular torrent sharing websites</em></p></li></ul></li><li><p><strong>Signal 2:</strong> A new season of a popular series has been released.</p><ul><li><p><em>Observe: News, movie sharing websites</em></p></li></ul></li><li><p><strong>Signal 3:</strong> There is an increase in the activity of a certain botnet/trojan family.</p><ul><li><p><em>Observe: Malware bazaar, C2 feeds</em></p></li></ul></li><li><p><strong>Signal 4:</strong> New distribution hosts are identified for a certain botnet/trojan family.</p><ul><li><p><em>Observe: URLhaus, Virustotal</em></p></li></ul></li><li><p><strong>Signal 5: </strong>Crack of a commercial RAT has been shared in the forums.</p><ul><li><p><em>Observe: Dark web</em></p></li></ul></li><li><p><strong>Signal 6:</strong> New crypter has been shared publicly.</p><ul><li><p><em>Observe: Dark web, Github</em></p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DEvj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DEvj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png 424w, https://substackcdn.com/image/fetch/$s_!DEvj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png 848w, https://substackcdn.com/image/fetch/$s_!DEvj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png 1272w, https://substackcdn.com/image/fetch/$s_!DEvj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DEvj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png" width="1200" height="1012" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1012,&quot;width&quot;:1200,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DEvj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png 424w, https://substackcdn.com/image/fetch/$s_!DEvj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png 848w, https://substackcdn.com/image/fetch/$s_!DEvj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png 1272w, https://substackcdn.com/image/fetch/$s_!DEvj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2faa23c3-bab4-4a76-a298-54b41f619fed_1200x1012.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Building the Early Warning System</strong></h3><p>If you have developed some observable signals with the above process, now it&#8217;s time to construct the early warning system.</p><p>This process is similar to creating a mathematical equation where each of the signals we defined is a boolean variable (0 or 1). We multiply each of our events by a weight value, add them together or combine them with logical operators, and generate an alert when it exceeds a predefined threshold.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GyhY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GyhY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png 424w, https://substackcdn.com/image/fetch/$s_!GyhY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png 848w, https://substackcdn.com/image/fetch/$s_!GyhY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png 1272w, https://substackcdn.com/image/fetch/$s_!GyhY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GyhY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png" width="958" height="80" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:80,&quot;width&quot;:958,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GyhY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png 424w, https://substackcdn.com/image/fetch/$s_!GyhY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png 848w, https://substackcdn.com/image/fetch/$s_!GyhY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png 1272w, https://substackcdn.com/image/fetch/$s_!GyhY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff112dd80-e6fa-44e1-866f-21105acbd4b9_958x80.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p><strong>EWS for network service exploitation:</strong></p><blockquote><p><em>if (S1*0.1 + S2*0.3 + S3*0.1 + S4*0.3 + S5*0.3) &gt; 0.5</em></p></blockquote><ul><li><p><strong>Signal 1:</strong> A new vulnerability of a widely used network service has been discovered. (<em>Weight = 0.1)</em></p></li><li><p><strong>Signal 2:</strong> The exploit module for the given vulnerability has become available. (<em>Weight = 0.3)</em></p></li><li><p><strong>Signal 3:</strong> A new exploit code has become available for a known vulnerability. (<em>Weight = 0.1)</em></p></li><li><p><strong>Signal 4:</strong> An exploit kit has begun to be advertised in crime markets. (<em>Weight = 0.2)</em></p></li><li><p><strong>Signal 5:</strong> An exploit has been observed in the wild. (<em>Weight = 0.3)</em></p></li></ul><p><strong>EWS for malspam campaigns:</strong></p><blockquote><p><em>if (S1*0.1 + S2*0.3 + S3*0.1 + S4*0.3 + S5*0.3 + S6*0.3 + S7*0.2) &gt; 1.0</em></p></blockquote><ul><li><p><strong>Signal 1:</strong> A popular game or software has become available on torrent websites. (<em>Weight = 0.4)</em></p></li><li><p><strong>Signal 2:</strong> A new season of a popular series has been released. (<em>Weight = 0.1)</em></p></li><li><p><strong>Signal 3:</strong> There is an increase in the activity of a certain botnet/trojan family. (<em>Weight = 0.3)</em></p></li><li><p><strong>Signal 4:</strong> New distribution hosts are identified for a certain botnet/trojan family. (<em>Weight = 0.2)</em></p></li><li><p><strong>Signal 5: </strong>Crack of a commercial RAT has been shared in the forums. (<em>Weight = 0.3)</em></p></li><li><p><strong>Signal 6:</strong> New crypter has been shared publicly. (<em>Weight = 0.2)</em></p></li></ul><p>Weights and thresholds are subjective to your organisation and type of attack. You may experiment and find out what works for you best.</p><p>I hope you liked this blog post. See you in the next one!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://blog.predictivedefense.io/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Predictive Defense Blog! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item></channel></rss>