Trace Id is missing

Expert Profile: Dustin Duran

 A person standing in front of a blue and white background

How to think like a threat actor

My team tells the end-to-end attack story. We connect the dots between the different phases of an attacker kill chain to better understand the root causes of an attack, at a glance, while it’s happening.

We also copy attacker techniques and thinking.

Attackers approach the world in terms of objectives and sequences of activities. They chain different techniques together—it’s why we refer to these attack stories as “kill chains”—and move through pathways most beneficial to them. It’s not a linear process. We call it thinking in graphs.

As defenders, we must adopt the same mindset. We cannot condemn ourselves to think in lists, where we try to reassemble the entire jigsaw puzzle when an attack is underway. At a glance, we have to know how attackers gained access, how they’re moving laterally, what they’re working towards.

Defenders identify malicious activity more accurately when they understand the sequence of that activity together, not just individual techniques in isolation.

A great example is when we analyzed a recent series of financial fraud attacks and noticed how attackers were using a reverse proxy setup to bypass multifactor authentication (MFA). We noted the MFA bypass signals and drew communications to other instances where the emerging technique appeared. What we learned about credential harvesting from our ability to connect those dots allows us to respond earlier in the attack. It helps us be better defenders.

When asked what can be done to protect an organization better, I always say the same thing: Leveraging MFA consistently is critical. It’s one of the most important recommendations we provide. It’s one of the most essential things enterprises can do to defend themselves better, striving for that passwordless environment because that disables all the emerging attacker techniques. Using MFA properly makes attackers work harder. And if they can’t gain access to an identity and your org, launching an attack gets much more complicated.

Related articles

Anatomy of an external attack surface

The cybersecurity world continues to become more complex as organizations move to the cloud and shift to decentralized work. Today, the external attack surface spans multiple clouds, complex digital supply chains, and massive third-party ecosystems.

Cyber Signals Issue 4: Shifting tactics fuel surge in business email compromise

Business email compromise (BEC) is on the rise now that cybercriminals can obscure the source of their attacks to be even more nefarious. Learn about cyber-crime-as-a service (CaaS) and how to help protect your organization.

Cyber Signals Issue 1: Identity is the new battleground

Identity is the new battleground. Gain insights into evolving cyberthreats and what steps to take to better protect your organization.

Follow Microsoft