Attack Chains

Threat actors change their tools constantly — loaders, C2 frameworks, ransomware brands, stealer families. But the prerequisite conditions they must satisfy at each stage never change. These mapped attack chains show how every actor, regardless of affiliation or toolset, converges on the same chokepoints. Detect the chokepoint; catch any actor.

More attack chains coming soon. BEC / business email compromise, initial access broker (IAB) operations, and supply chain compromise chains are in development. See CONTRIBUTING.md to propose or draft a new chain.