Cyber attacks follow surprisingly consistent patterns and existing frameworks describe many patterns. Existing frameworks…

  • Focus on attack tactics and milestones (MITRE ATT&CK, Mandiant Attack Lifecycle, Lockheed Kill Chain),
  • Categorize threats (Microsoft STRIDE, RAND operational capacities),
  • Outline defender objectives (CIA Triad),
  • Analyze business impacts (OCTAVE)

Attacks may also be examined through the lens of how the attacker intends to impact the victim. At the highest level, there are three fundamental objectives for an attacker to achieve against their victim: Extract, Disrupt, and Influence (EDI).

  • Extract: Collect information assets; typically sensitive like intellectual property, credentials, or regulated material
  • Disrupt: Impact operations; including malicious encryption, deletion, or covert modification
  • Influence: Cause involuntary behavior; often ransom or operational change

EDI impact objectives are not mutually exclusive. Notice that combining multiple objectives will express familiar attack patterns:

Extract Disrupt Influence Exemplar attack
Classic APT
Cyber-kinetic
Phantom ransom1
Warfare
Classic ransomware
Data ransom
Ransomware 2.0

The EDI impact model may help security teams focus their defensive strategy. When building security roadmaps or justifying investments, understanding an attack’s objectives provides a lens for prioritizing controls and contextualizing risk to senior leadership. This view zooms out to consider the fundamental question: what are we defending against?

I may revisit this topic to:

  • Detail examples of EDI attack patterns
  • Frame how EDI can support prioritization and contextualization
  • Discuss relationships between EDI objectives, including tensions between them and how attackers prioritize their activities

Originally raised January 2024