Relational Framework of Cyberattacks: Empirical Evidence from Multistage Incidents †
Abstract
1. Introduction
2. Literature Review and Theoretical Framework
2.1. Cybersecurity Taxonomies and Traditional Threat Classification
2.2. Limitations of Static Taxonomies and the Need for Relational Models
2.3. Dynamic Taxonomies and Attack Progression in Real-World Scenarios
3. Proposed Cyberattack Taxonomy
3.1. Classification of Attack Groups
- Social Engineering (SE): This includes psychological manipulation techniques aimed at inducing users to disclose information or perform unsafe actions. It constitutes one of the most frequent access vectors, with examples such as phishing, vishing, or baiting, whose effectiveness has been widely documented in both corporate and governmental contexts [34,36].
- Malware-Based Attacks (MBAs): This encompasses the use of malicious software to compromise the confidentiality, integrity or availability of systems. It includes everything from trojans and ransomware to hybrid botnets combining cryptomining with denial-of-service capabilities, as seen in the case of the Lucifer malware [37,71].
3.2. Relational Dependency Matrix
3.3. Taxonomy Framework
4. Analysis and Study of Real Cases
- Identity and Authentication Attacks (IAAs) → Social Engineering (SE): The attack known as SIM swapping demonstrates how the compromise of authentication mechanisms can activate social engineering vectors. In this case, attackers manage to duplicate a SIM card by using techniques such as pretexting with the mobile operator, thereby gaining access to SMS messages and calls from the legitimate number. This enables them to bypass verification mechanisms and impersonate the victim or third parties, which facilitates new phases of social manipulation [80].
- Identity and Authentication Attacks (IAAs) → Malware-Based Attacks (MBAs): Unauthorised access through compromised credentials has been used as an entry point for malware deployment in corporate networks. A representative case is that of the DarkSide ransomware, where attackers gained access to systems using valid credentials, allowing them to deploy malware without triggering alert mechanisms. This pattern demonstrates how authentication attacks can facilitate the execution of malicious code in later phases [81].
- Identity and Authentication Attacks (IAAs) → Exploiting Software Vulnerabilities (ESVs): The exploitation of software vulnerabilities can be facilitated by the prior compromise of valid identities. In recent incidents, malicious actors used stolen credentials to access enterprise environments and, once inside, exploited unpatched critical vulnerabilities such as those detected in Microsoft Exchange servers. This chaining allowed for persistence and privilege escalation within compromised networks, demonstrating how initial access via compromised identities can serve as a vector for covert software exploitation [82].
- Identity and Authentication Attacks (IAAs) → Attacks on Protocols and Communications (APCs): Credential compromise can facilitate attacks against communication protocols when attackers use legitimate identities to bypass security controls. A notable case is the 2013 breach suffered by Target, in which a “Pass-the-Hash” attack was executed after accessing the network with credentials stolen from a third-party vendor. This approach enabled lateral movement within the infrastructure without directly exploiting vulnerabilities, manipulating authentication and transmission protocols to maintain persistence and evade detection [83].
- Identity and Authentication Attacks (IAAs) → Network Infrastructure Attacks (NIA): The use of compromised credentials has enabled botnets such as Mozi to infiltrate exposed network devices, including routers and IP cameras. Once credentials are obtained through brute force or password reuse, attackers compromise the infrastructure to launch distributed denial-of-service (DDoS) attacks or maintain persistent access within the network. This demonstrates how a failure in authentication can trigger direct compromises at the infrastructure layer [84].
- Social Engineering (SE) → Malware-Based Attacks (MBAs): Social engineering campaigns continue to serve as a key channel for the initial distribution of malware. The Emotet case illustrates this transition; it began as a banking trojan and evolved into a modular malware distribution platform for strains such as TrickBot and QakBot, used by multiple criminal groups. These attacks typically begin with phishing emails impersonating legitimate entities or hijacking compromised email threads. Once the user interacts with the malicious content (attachment or link), malware download is initiated. This pattern highlights how social engineering acts as an entry point for more complex and persistent infections [85].
- Social Engineering (SE) → Exploiting Software Vulnerabilities (ESVs): In recent malspam campaigns, attackers initiated the chain through social engineering by convincing victims to open RTF documents sent via email. Once opened, these files exploited vulnerabilities in Microsoft Office (such as CVE-2017-11882), enabling the automatic execution of malicious code. This case reflects how an initial manipulation technique can directly lead to the exploitation of previously identified software vulnerabilities [86].
- Malware-Based Attacks (MBAs) → Attacks on Protocols and Communications (APCs): The global WannaCry outbreak demonstrated how malware can be designed to directly exploit network protocols. After infecting a machine, the worm used the EternalBlue vulnerability to propagate automatically via the SMBv1 protocol, compromising communications between connected systems. This transition shows how a malware-based attack can escalate into protocol-level compromise, amplifying both reach and propagation speed [87].
- Malware-Based Attacks (MBAs) → Network Infrastructure Attacks (NIA): Malware can serve as a gateway to infrastructure-level compromises, as seen in the Mirai botnet case. This attack used IoT devices infected with malware to launch massive DDoS attacks that directly impacted DNS providers such as Dyn. The large-scale propagation and exploitation of weak configurations directed the attack against key infrastructure, demonstrating how malware-based threats can escalate and disrupt critical network services [88].
- Malware-Based Attacks (MBAs) → Attacks on Critical IT/OT Infrastructure (CIIA): The NotPetya incident exemplifies how malware can severely impact critical infrastructures. In this case, the malicious code was introduced via a compromised update of the M.E.Doc accounting software and spread using tools like EternalBlue and Mimikatz. The malware directly affected Maersk’s logistics and port operations on a global scale. The infection spread across more than 45,000 devices, causing a total shutdown of operations in 17 port terminals. This demonstrates how malware can evolve into operational sabotage, targeting essential OT infrastructure within global maritime supply chains [89].
- Malware-Based Attacks (MBAs) → Exploiting Software Vulnerabilities (ESVs): Malware-based attacks are often used as initial vectors to compromise systems and prepare the ground for the exploitation of software vulnerabilities. This is the case with Emotet and TrickBot, which have been used to deliver payloads such as Ryuk, enabling the execution of exploits like EternalBlue. These vulnerabilities allow for the execution of arbitrary code on vulnerable machines without user interaction, thereby facilitating lateral movement and persistence within the compromised network [90].
- Exploiting Software Vulnerabilities (ESVs) → Attacks on Protocols and Communications (APCs): Breaches originating from vulnerable software (such as the OpenSSL library affected by Heartbleed) enabled attackers to exploit insecure configurations and gain remote access to industrial systems without authentication. This initial software exploitation facilitated subsequent intrusions into critical communication channels (e.g., SCADA and HTTP), clearly illustrating a transition from software exploitation to direct compromise of industrial communication protocols, particularly in internet-exposed ICS environments [91].
- Exploiting Software Vulnerabilities (ESVs) → Network Infrastructure Attacks (NIAs): The exploitation of vulnerabilities such as Log4Shell (CVE-2021-44228) has shown how a flaw in software libraries can lead to attacks on entire network infrastructures. In this case, remote code execution allowed malicious actors to take control of exposed servers and infiltrate connected systems, enabling lateral movement and manipulation of critical network services. The widespread use of these libraries across both IT and OT environments amplified the attack’s propagation and jeopardised essential components of the digital infrastructure [92].
- Exploiting Software Vulnerabilities (ESVs) → APTs and Cyberespionage (APT): Sophisticated cyberespionage campaigns have demonstrated the ability to escalate from the initial exploitation of widely used software vulnerabilities (such as those found in SolarWinds Orion) to persistent intrusions in critical infrastructures. These attacks exploit backdoors inserted via legitimate updates, enabling covert and privileged remote access to victim systems. Once inside, threat actors such as APT29 establish hard-to-detect persistence mechanisms, use advanced evasion techniques, and manipulate cloud services to consolidate their presence and extract sensitive information covertly and over extended periods [93].
- Attacks on Protocols and Communications (APCs) → Network Infrastructure Attacks (NIAs): Attacks targeting communication protocols (such as DNS hijacking) can serve as initial vectors to compromise large-scale network infrastructures. These interferences manipulate legitimate traffic routes to redirect them to malicious servers, facilitating malware deployment or credential theft. In the documented Sea Turtle campaign, DNS records were altered to intercept connections and take control of high-level servers. This initial compromise enabled deeper access to critical infrastructures through persistent redirection techniques [94].
- Attacks on Protocols and Communications (APCs) → APTs and Cyberespionage (APT): Certain cyberespionage campaigns have begun by manipulating fundamental protocols such as DNS to facilitate covert and persistent access. The Sea Turtle operation is a representative example; attackers modified DNS records of government agencies and technology companies to intercept communications, harvest credentials and then deploy espionage tools to maintain prolonged access to compromised systems. This technique enables the execution of APT activities without directly exploiting software vulnerabilities or conducting overt forced access attempts [95].
- Attacks on Protocols and Communications (APCs) → Attacks on Critical IT/OT Infrastructure (CIIA): The Industroyer case illustrates how the exploitation of industrial protocols can trigger direct attacks against critical infrastructures. This malware included support for several industrial control protocols (such as IEC 60870-5-101 [96], IEC 60870-5-104 [97], IEC 61850-5 [98] and OPC Data Access [99]), which were used to interact with electrical substation systems, enabling attackers to operate switches and circuit breakers directly. Manipulating these protocols not only facilitated access to systems but also granted operational control over key components of the power grid, disrupting functionality and compromising both physical and logical security [100].
- Network Infrastructure Attacks (NIAs) → APTs and Cyberespionage (APT): Manipulating network infrastructure can act as a preparatory phase for advanced cyberespionage campaigns. A clear example is VPNFilter, a campaign attributed to APT actors that compromised over 500,000 routers and network devices worldwide. The malware enabled traffic interception, credential theft, and the establishment of persistence for prolonged operations. These capabilities supported covert information gathering and the deployment of targeted attacks against strategic objectives, demonstrating how control over network infrastructure can enable actions characteristic of advanced espionage [101].
- Network Infrastructure Attacks (NIAs) → Attacks on Critical IT/OT Infrastructure (CIIA): Attacks on network infrastructure are often precursors to deeper compromises of critical infrastructures. A prominent example is the evolution of the BlackEnergy group into GreyEnergy, which (after compromising internet-exposed routers and servers) used this access to deploy backdoors and malware targeting industrial systems. This approach enabled lateral movement into OT networks, affecting strategic sectors such as the energy industry in Ukraine and Poland through tools designed to sabotage operations and conceal their presence [102].
- APTs and Cyberespionage (APT) → Attacks on Critical IT/OT Infrastructure (CIIA): The Stuxnet case clearly illustrates a transition from a highly sophisticated cyberespionage operation to direct sabotage of critical industrial infrastructures. This malware, attributed to an advanced persistent threat, was specifically designed to infiltrate SCADA systems in Iranian nuclear facilities and silently modify the operational parameters of centrifuges. The intrusion was made possible through zero-day vulnerabilities and stolen digital certificates, enabling privilege escalation and undetected execution of malicious code. Once inside, the worm directly affected physical devices such as Siemens PLCs, altering the behaviour of frequency converters and causing prolonged and untraceable damage, thereby disrupting enriched uranium production. This example shows how an APT campaign can escalate into direct aggression against strategic OT infrastructures without requiring conventional physical attacks [103].
Illustrative Dark Web Evidence for the Relational Matrix
5. Methodology
5.1. Alignment with MITRE ATT&CK
5.2. Application Method
5.2.1. Purpose and Scope
5.2.2. Unit of Analysis and One-Step Rule
5.2.3. Per-Edge Acceptance Checklist
- Meaning of each term:
- ○
- d (unambiguous direction): Evidence supports the arrow direction (A enables B) and rules out reverse causality or mere co-occurrence.
- ○
- v (technical feasibility): The transition is technically plausible given attacker capabilities, environment, and existing controls.
- ○
- o (observability): Data sources exist that can log the hop or its traces, even if not all are present in the case.
- ○
- a (ATT&CK mapping at origin): The initial event aligns with concrete ATT&CK tactics and techniques (verifiable IDs).
- ○
- z (ATT&CK mapping at destination): The facilitated event aligns with concrete ATT&CK tactics and techniques (verifiable IDs).
- ○
- u (operational usefulness): The transition provides practical value for detection, containment, or control prioritisation in an SOC.
- Decision rule:
- ○
- Acceptance threshold: accept the edge if score ≥ 5.
- ○
- Labels:
- ▪
- 6/6: when all six items are satisfied.
- ▪
- 5/6: when exactly one item fails.
- ▪
- <5/6: edge not accepted (documented as hypothesis or insufficient evidence).
- ○
- The ≥5 threshold balances parsimony (avoids weak hops) and operational robustness (tolerates one missing item under incomplete telemetry). The 6/6 label identifies canonical edges (strong evidence and consensus) that serve as references and cores of frequent routes. The 5/6 label captures strong edges typical of real-world settings where one of the six conditions may be uncertain or partially observable.
5.2.4. Inputs
- Chronological incident narrative and artefacts.
- Technical evidence (logs, alerts, forensics, IOCs).
- Group-level ATT&CK alignment table.
- Templates: 8 × 8 matrix, per-edge checklist, edge → ATT&CK table.
5.2.5. Seven-Step Protocol
- Define scope: time window, assets, evidence sources, inclusion criteria.
- Label by group: assign each event to the appropriate group with ATT&CK support.
- Extract transitions: identify initial attack→ facilitated attack linked by technical causality and temporal order.
- Assess with checklist: score the six items, compute score, decide acceptance.
- Populate the 8 × 8 matrix: mark 1 in (origin, destination) for accepted edges; de-duplicate per campaign.
- Graph and routes: build the directed graph with accepted edges; derive routes by chaining, respecting the one-step rule.
- Edge → ATT&CK and report: document tactic(s) and technique(s) at origin and destination, detection exemplars, and controls.
5.2.6. Quality Criteria and Bias Control
- Inter-rater consistency: double coding of a sample and consensus resolution.
- Traceable reasoning: each checklist tick links to verifiable evidence.
- No causal conflation: distinguish co-occurrence from enablement and justify arrow direction.
- Parsimony: prefer immediate transitions; longer paths are modelled by chaining.
5.2.7. Minimal Deliverables
- Updated 8 × 8 matrix.
- Edge table with checklist and totals.
- Directed graph with derived routes.
- Edge → ATT&CK table to support detection and hunting.
- Executive summary with cut-points and control prioritisation.
6. Taxonomy Validation
6.1. Worked Example
- Context. A spear phishing campaign delivers a payload with persistence and C2, progresses towards network infrastructure, and culminates in availability impact.
- Timeline:
- ○
- Day 1: Targeted email with malicious attachment.
- ○
- Day 2: User execution and persistence.
- ○
- Day 3: Outbound C2 and initial exfiltration.
- ○
- Day 4: DNS manipulation and progression to critical systems.
- ○
- Day 5: Impact on availability.
- Evaluated transitions, formula application and decision:
- SE → MBA
- ○
- Formula application (1)
- ▪
- d = 1 (clear temporal and causal chain from email to execution)
- ▪
- v = 1 (documented spear phishing and user execution techniques)
- ▪
- o = 1 (email gateway, EDR, autostart events)
- ▪
- a = 1 (TA0001/T1566; T1204)
- ▪
- z = 1 (TA0002/TA0003; T1059, T1547)
- ▪
- u = 1 (strong control leverage at mail and execution layers)
- ▪
- score = 6 → 6/6 → Accepted
- ○
- Operational notes
- ▪
- Advanced filtering and execution hardening reduce this hop.
- MBA → APC
- ○
- Formula application (1)
- ▪
- d = 1 (payload establishes C2 and initiates exfiltration)
- ▪
- v = 1 (beaconing and encrypted channels are feasible)
- ▪
- o = 1 (proxy, NDR, exfiltration patterns)
- ▪
- a = 1 (TA0002/TA0003; T1059, T1053)
- ▪
- z = 1 (TA0011/TA0010; T1071, T1573, T1041)
- ▪
- u = 0 (immature controls to fully suppress the channel in this setting)
- ▪
- score = 5 → 5/6 → Accepted
- ○
- Operational notes
- ▪
- Prioritise C2 detection and egress limitations.
- APC → NIA
- ○
- Formula application (1)
- ▪
- d = 1 (network-level control enables progression to infrastructure assets)
- ▪
- v = 1 (DNS/remote services and tool transfer are viable)
- ▪
- o = 0 (partial telemetry in network devices)
- ▪
- a = 1 (TA0011; T1071.004)
- ▪
- z = 1 (TA0008; T1021, T1570)
- ▪
- u = 1 (segmentation and DNS control as cut-points)
- ▪
- score = 5 → 5/6 → Accepted
- ○
- Operational notes
- ▪
- Improve visibility across infrastructure devices.
- NIA → CIIA
- ○
- Formula application (1)
- ▪
- d = 1 (network changes precipitate impact)
- ▪
- v = 1 (plausible impact techniques against services)
- ▪
- o = 1 (downtime logs and config changes)
- ▪
- a = 1 (TA0008; T1021/T1040)
- ▪
- z = 0 (no specific ATT&CK impact sub-technique cited and insufficient operational evidence)
- ▪
- u = 1 (BCP and containment playbooks)
- ▪
- score = 5 → 5/6 → Accepted
- ○
- Operational notes
- ▪
- Rehearse recovery and block impact actions.
- MBA → CIIA (direct variant)
- ○
- Formula application (1)
- ▪
- d = 1 (payload embeds direct impact capability)
- ▪
- v = 1 (e.g., encryption for impact)
- ▪
- o = 1 (EDR/AM and system events)
- ▪
- a = 1 (TA0002/TA0003; T1059/T1543)
- ▪
- z = 0 (generic impact description without a precise sub-technique or supporting telemetry)
- ▪
- u = 1 (specific controls against execution/impact)
- ▪
- score = 5 → 5/6 → Accepted
- ○
- Operational notes
- ▪
- Harden execution policies and protect immutable backups.
- Derived routes:
- (a)
- Route A (primary): SE → MBA → APC → NIA → CIIA
- ○
- Priority cut-points:
- ▪
- SE → MBA (mail and execution policies)
- ▪
- MBA → APC (C2/exfiltration detection)
- ▪
- APC → NIA (segmentation and DNS)
- (b)
- Route B (variant): SE → MBA → CIIA
- ○
- Priority cut-points:
- ▪
- SE→MBA (mail)
- ▪
- MBA→CIIA (execution blocking and recovery protection)
- Edge → ATT&CK table
- ○
- The following Table 4 summarises the validated transitions from the worked example. Each row presents the ATT&CK tactic at origin and at destination together with representative techniques that characterise the operational hop. Its purpose is to ease route interpretation guide detection and threat hunting and prioritise controls without claiming exhaustiveness.
6.2. Expert Validation
6.2.1. Acceptance Criteria and Methodological Justification
- Robustness of parametric summaries: Parametric summaries of Likert-type data are empirically robust to modest violations of intervality and normality, legitimising their use for descriptive synthesis and design decisions [106].
- Interval-based interpretation on five-point scales: A five-point scale has an approximate category width of 0.80, which enables meaningful interpretation of means in bands and motivates an SD ≤ 0.8 criterion as evidence of concentrated responses within a single band [107].
- Operational decision rule:
- ○
- Keep if mean ≥ 4.0 and SD ≤ 0.8 (high/very high agreement with limited dispersion).
- ○
- Minor revise if 3.5 ≤ mean < 4.0 and SD ≤ 0.8 (adequate agreement; small clarifications recommended).
- ○
- Revise if mean < 3.5 or SD > 0.8 (insufficient agreement and/or diffuse responses).
6.2.2. Items Evaluated by the Expert Panel (Q1–Q8)
- ○
- Q1—Process flow (clarity): comprehensibility and executability of the methodological sequence.
- ○
- Q2—Checklist coverage: adequacy of the six items (d, v, o, a, z, u) for per-edge decisions.
- ○
- Q3—Granularity and evidence: sufficiency of operational detail and ease of attaching verifiable evidence.
- ○
- Q4—Preconditions and criteria: clarity and applicability of preconditions and progress/rework gates.
- ○
- Q5—Rule and threshold (≥5/6): practical utility of the threshold and its labelling for prioritisation and traceability.
- ○
- Q6—ATT&CK mappings: coherence and operational usefulness of origin/destination mappings.
- ○
- Q7—Traceability and perceived reproducibility: clarity of the item–evidence–decision trail and expected rater convergence.
- ○
- Q8—Internal coherence and applicability: fit across components and platform-independent execution.
6.2.3. Expert Responses
6.2.4. Item Results and Decision for the Method
6.2.5. Validation Conclusion
7. Discussion
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Sánchez-García, I.D.; Gilabert, T.S.F.; Calvo-Manzano, J.A. Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review. Comput. Secur. 2023, 128, 103170. [Google Scholar] [CrossRef]
- Prasad, N.; Diro, A.; Warren, M.; Fernando, M. A survey of cyber threat attribution: Challenges, techniques, and future directions. Comput. Secur. 2025, 157, 104606. [Google Scholar] [CrossRef]
- Rabitti, G.; Chokami, A.K.; Coyle, P.; Cohen, R.D. A taxonomy of cyber risk taxonomies. Risk Anal. 2024, 45, 376–386. [Google Scholar] [CrossRef]
- de Nobrega, K.M.; Rutkowski, A.-F.; Saunders, C. The whole of cyber defense: Syncing practice and theory. J. Strateg. Inf. Syst. 2024, 33, 101861. [Google Scholar] [CrossRef]
- Al-Sada, B.; Sadighian, A.; Oligeri, G. MITRE ATT&CK: State of the Art and Way Forward. ACM Comput. Surv. 2025, 57, 1–37. [Google Scholar] [CrossRef]
- Sasi, T.; Lashkari, A.H.; Lu, R.; Xiong, P.; Iqbal, S. A comprehensive survey on IoT attacks: Taxonomy, detection mechanisms and challenges. J. Inf. Intell. 2024, 2, 455–513. [Google Scholar] [CrossRef]
- Al-Sada, B.; Sadighian, A.; Oligeri, G. Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database. IEEE Access 2023, 11, 70560–70573. [Google Scholar] [CrossRef]
- Branescu, I.; Grigorescu, O.C.; Dascalu, M. Automated Mapping of CVES to MITRE ATT&CK Tactics. Information 2024, 15, 214. [Google Scholar] [CrossRef]
- Javeed, D.; MohammedBadamasi, U.; Ndubuisi, C.O.; Soomro, F.; Asif, M. Man in the Middle Attacks: Analysis, Motivation and Prevention. Int. J. Comput. Netw. Commun. Secur. 2020, 8, 52–58. [Google Scholar] [CrossRef]
- Niño, F.Y.Á. Ransomware, una amenaza latente en Latinoamérica. InterSedes 2023, 24, 92–119. [Google Scholar] [CrossRef]
- Gillard, S.; David, D.P.; Mermoud, A.; Maillart, T. Efficient collective action for tackling time-critical cybersecurity threats. J. Cybersecur. 2023, 9, tyad021. [Google Scholar] [CrossRef]
- Connolly, K.; Klempay, A.; McCann, M.; Brenner, P. Dark Web Marketplaces: Data for Collaborative Threat Intelligence. ACM Digit. Threat. Res. Pract. 2023, 4, 1–12. [Google Scholar] [CrossRef]
- Santos, P.R.; Resende, P.A.; Gondim, J.J.; Costa, A. Towards Robust Cyber Attack Taxonomies: A Survey with Requirements, Structures, and Assessment. ACM Comput. Surv. 2025, 57, 1–36. [Google Scholar] [CrossRef]
- Dimitriadis, A.; Papoutsis, A.; Kavalieros, D.; Tsikrika, T.; Vrochidis, S.; Kompatsiaris, I. EVACTI: Evaluating the Actionability of Cyber Threat Intelligence. Int. J. Inf. Secur. 2025, 24, 123. [Google Scholar] [CrossRef]
- ATT&CK: Adversarial Tactics, Techniques, and Common Knowledge, MITRE, 2025. Available online: https://attack.mitre.org/ (accessed on 19 March 2025).
- Li, L.; Huang, C.; Chen, J. Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence. Comput. Secur. 2024, 140, 103815. [Google Scholar] [CrossRef]
- Sun, H.; Shu, H.; Kang, F.; Zhao, Y.; Huang, Y. Malware2ATT&CK: A sophisticated model for mapping malware to ATT&CK techniques. Comput. Secur. 2024, 140, 103772. [Google Scholar] [CrossRef]
- CIRCL. MISP Taxonomies and Classification as Machine Tags. CIRCL.LU. Available online: https://www.misp-project.org/ (accessed on 19 March 2025).
- Delvecchio, P.; Galantucci, S.; Iannacone, A.; Giuseppe, P. CARIOCA: Prioritizing the use of IoC by threats assessment shared on the MISP platform. Int. J. Inf. Secur. 2025, 24, 98. [Google Scholar] [CrossRef]
- STIX Version 2.1. Committee Specification 02, O.C.T.I.TC, 2021-01-25. 2025. Available online: https://docs.oasis-open.org/cti/stix/v2.1/cs02/stix-v2.1-cs02.html (accessed on 19 March 2025).
- TAXII Version 2.1. Committee Specification 01, O.C.T.I.TC, 2020-01-27. 2025. Available online: https://docs.oasis-open.org/cti/taxii/v2.1/cs01/taxii-v2.1-cs01.html (accessed on 19 March 2025).
- Sadlek, L.; Yamin, M.M.; Čeleda, P.; Katt, B. Severity-based triage of cybersecurity incidents using kill chain attack graphs. J. Inf. Secur. Appl. 2025, 89, 103956. [Google Scholar] [CrossRef]
- VERIS Community. VERIS: Vocabulary for Event Recording and Incident Sharing. VERIS Community. Available online: https://verisframework.org/ (accessed on 19 March 2025).
- Hutchins, E.M.; Cloppert, M.J.; Amin, R.M. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. Lead. Issues Inf. Warf. Secur. Res. 2011, 1, 80–106. Available online: https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf (accessed on 19 March 2025).
- Caltagirone, S.; Pendergast, A.; Betz, C. The Diamond Model of Intrusion Analysis. ADA586960. 2013. Available online: https://www.researchgate.net/publication/379381999_The_Diamond_Model_of_Intrusion_Analysis?channel=doi&linkId=6606c3f3390c214cfd240ad8&showFulltext=true (accessed on 19 March 2025).
- Roshan, K.; Zafar, A. Black-box adversarial transferability: An empirical study in cybersecurity perspective. Comput. Secur. 2024, 141, 103853. [Google Scholar] [CrossRef]
- Benmalek, M. Ransomware on Cyber-Physical Systems: Taxonomies, case studies, security gaps, and open challenges. Internet Things Cyber-Phys. Syst. 2024, 4, 186–202. [Google Scholar] [CrossRef]
- Zenitani, K. From attack graph analysis to attack function analysis. Inf. Sci. 2023, 650, 119703. [Google Scholar] [CrossRef]
- Pirca, A.M.; Lallie, H.S. An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers. Comput. Secur. 2023, 130, 103254. [Google Scholar] [CrossRef]
- Palma, A.; Bonomi, S. Behind the scenes of attack graphs: Vulnerable network generator for in-depth experimental evaluation of attack graph scalability. Comput. Secur. 2025, 157, 104576. [Google Scholar] [CrossRef]
- Salim, M.M.; Rathore, S.; Park, J.H. Distributed denial of service attacks and its defenses in IoT: A survey. J. Supercomput. 2019, 76, 5320–5363. [Google Scholar] [CrossRef]
- Konsta, A.-M.; Lafuente, A.L.; Spiga, B.; Dragoni, N. Survey: Automatic generation of attack trees and attack graphs. Comput. Secur. 2024, 137, 103602. [Google Scholar] [CrossRef]
- Zhang, J.; Zheng, J.; Zhang, Z.; Chen, T.; Tan, Y.-A.; Zhang, Q.; Li, Y. ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks. Comput. Netw. 2024, 245, 110376. [Google Scholar] [CrossRef]
- Bhardwaj, A.; Sapra, V. Why is Phishing Still Successful? Comput. Fraud. Secur. 2020, 2020, 15–19. [Google Scholar] [CrossRef]
- CISA; FBI. TrickBot Malware; AA21-076A; Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI): Washington, DC, USA, 2021. Available online: https://www.cisa.gov (accessed on 5 March 2025).
- Álvarez, A.L.; Cruz, J.A.; Cruz, S.B.; Gallardo, J.D.C.; López, I.M.; García, R.E. El phishing como amenaza en la ciberseguridad corporativa de grandes empresas. Investig. Latinoam. Ing. Arquit. 2024, 1, 26–33. [Google Scholar] [CrossRef]
- Networks, P.A. Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices. Palo Alto Networks-Unit 42, USA, 2025. Available online: https://unit42.paloaltonetworks.com (accessed on 5 March 2025).
- Gelgi, M.; Guan, Y.; Arunachala, S.; Rao, M.S.S.; Dragoni, N. Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques. Sensors 2024, 24, 3571. [Google Scholar] [CrossRef]
- Wu, Q.; Zhang, S.; Zheng, B.; You, C.; Zhang, R. Intelligent Reflecting Surface-Aided Wireless Communications: A Tutorial. IEEE Trans. Commun. 2021, 69, 3313–3351. [Google Scholar] [CrossRef]
- ENISA. ENISA Threat Landscape for Supply Chain Attacks. European Union Agency for Cybersecurity (ENISA), 2021. Available online: https://www.enisa.europa.eu/sites/default/files/publications/ENISA%20Threat%20Landscape%20for%20Supply%20Chain%20Attacks.pdf (accessed on 19 March 2025).
- Arnolnt, S.; Kougioumtzidou, A.; Papoutsis, A.; Darra, E.; Kavallieros, D.; Tziouvaras, A.; Tsikrika, T.; Vrochidis, S.; Kompatsiaris, I. A comprehensive survey of manual and dynamic approaches for cybersecurity taxonomy generation. Knowl. Inf. Syst. 2025, 67, 4785–4811. [Google Scholar] [CrossRef]
- Tang, H.; Lin, D.; Li, W.; Zhang, W.; Zhao, J. Cyber threat indicators extraction based on contextual knowledge prompt. Comput. Netw. 2024, 254, 110839. [Google Scholar] [CrossRef]
- Ainslie, S.; Thompson, D.; Maynard, S.; Ahmad, A. Cyber-Threat Intelligence for Security Decision-Making: A Review and Research Agenda for Practice. Comput. Secur. 2023, 132, 103352. [Google Scholar] [CrossRef]
- Mahboubi, A.; Luong, K.; Aboutorab, H.; Bui, H.T.; Jarrad, G.; Bahutair, M.; Camtepe, S.; Pogrebna, G.; Ahmed, E.; Barry, B.; et al. Evolving techniques in cyber threat hunting: A systematic review. J. Netw. Comput. Appl. 2024, 232, 104004. [Google Scholar] [CrossRef]
- Tatam, M.; Shanmugam, B.; Azam, S.; Kannoorpatti, K. A review of threat modelling approaches for APT-style attacks. Heliyon 2021, 7, e05969. [Google Scholar] [CrossRef]
- Bratsas, C.; Anastasiadis, E.K.; Angelidis, A.K.; Ioannidis, L.; Kotsakis, R.; Ougiaroglou, S. Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review. J. Cybersecur. Priv. 2024, 4, 518–545. [Google Scholar] [CrossRef]
- Shin, J.; Choi, J.-G.; Lee, J.-W.; Lee, C.-K.; Song, J.-G.; Son, J.-Y. Application of STPA-SafeSec for a cyber-attack impact analysis of NPPs with a condensate water system test-bed. Nucl. Eng. Technol. 2021, 53, 3319–3326. [Google Scholar] [CrossRef]
- Staves, A.; Gouglidis, A.; Maesschalck, S.; Hutchison, D. Risk-based safety scoping of adversary-centric security testing on Operational Technology. Saf. Sci. 2024, 174, 106481. [Google Scholar] [CrossRef]
- Badawy, M.; Sherief, N.H.; Abdel-Hamid, A.A. Legacy ICS Cybersecurity Assessment Using Hybrid Threat Modeling. Appl. Sci. 2024, 14, 8398. [Google Scholar] [CrossRef]
- Cascavilla, G.; Tamburri, D.A.; van den Heuvel, W.J.; Intelligence, C.T. Cybercrime Threat Intelligence: A Systematic Multi-Vocal Literature Review. Comput. Secur. 2021, 105, 102258. [Google Scholar] [CrossRef]
- Jia, J.; Yang, L.; Wang, Y.; Sang, A. Hyper attack graph: Constructing a hypergraph for cyber threat intelligence analysis. Comput. Secur. 2025, 149, 104194. [Google Scholar] [CrossRef]
- Zhao, X.; Jiang, R.; Han, Y.; Li, A.; Peng, Z. A survey on cybersecurity knowledge graph construction. Comput. Secur. 2024, 136, 14. [Google Scholar] [CrossRef]
- Basheer, R.; Alkhatib, B.K. Threats from the Dark: A Review of Dark Web Investigation Research for Cyber Threat Intelligence. J. Comput. Netw. Commun. 2021, 2021, 1302999. [Google Scholar] [CrossRef]
- Raman, R.; Nair, V.K.; Nedungadi, P. Darkweb research: Past, present, and future trends (and mapping to sustainable development goals). Heliyon 2023, 9, e22269. [Google Scholar] [CrossRef]
- Rust-Nguyen, N.; Sharma, S.; Stamp, M. Darknet traffic classification and adversarial attacks using machine learning. Comput. Secur. 2023, 127, 103098. [Google Scholar] [CrossRef]
- Al-Nabki, M.W.; Fidalgo, E.; Alegre, E.; Fernández-Robles, L. ToRank: Identifying the most influential suspicious domains in the Tor network. Expert Syst. Appl. 2019, 123, 212–226. [Google Scholar] [CrossRef]
- Chen, S.-S.; Hwang, R.-H.; Ali, A.; Lin, Y.-D.; Wei, Y.-C.; Pai, T.-W. Improving Quality of Indicators of Compromise Using STIX Graphs. Comput. Secur. 2024, 144, 103972. [Google Scholar] [CrossRef]
- Pastor-Galindo, J.; Sandlin, H.-Â.; Marmol, F.G.; Bovet, G. A Big Data Architecture for Early Identification and Categorization of Dark Web Sites. Future Gener. Comput. Syst. 2024, 157, 67–81. [Google Scholar] [CrossRef]
- Xu, Y.; Fang, Y.; Huang, C.; Liu, Z.; Cao, W. Hacker group identification based on dynamic heterogeneous graph node update. Appl. Soft Comput. 2024, 158, 111587. [Google Scholar] [CrossRef]
- Kumaran, S.Y.; Krishnan, S.B.; Shankar, S.; Chakrabarti, P. DeepWebNet Analytics: Enhancing Dark Web Surveillance for Effective Cyber Threat Detection and Mitigation. Inf. Secur. J. Glob. Perspect. 2025, 34, 1–19. [Google Scholar] [CrossRef]
- Bhardwaj, S.; Dave, M. Enhanced neural network based attack investigation framework for network forensics (Identification, detection and analysis of the attack). Comput. Secur. 2023, 135, 103521. [Google Scholar] [CrossRef]
- Kritika, E. A comprehensive literature review on ransomware detection using deep learning. Cyber Secur. Appl. 2025, 3, 100078. [Google Scholar] [CrossRef]
- Connolly, A.Y.; Borrion, H. Reducing Ransomware Crime: Analysis of Victims’ Payment Decisions. Comput. Secur. 2022, 119, 102760. [Google Scholar] [CrossRef]
- Kim, S.; Lee, S.; Ramachandran, S.; Alzahrani, I. Cryptocurrency-driven ransomware syndicates operating on the darknet. Egypt. Inform. J. 2025, 30, 100665. [Google Scholar] [CrossRef]
- CASE Community. CASE: Cyber-Investigation Analysis Standard Expression; CASE Community: Washington, DC, USA, 2021; Available online: https://caseontology.org/ (accessed on 19 March 2025).
- Tok, Y.C.; Zheng, D.Y.; Chattopadhyay, S. A Smart City Infrastructure ontology for threats, cybercrime, and digital forensic investigation. Forensic Sci. Int. Digit. Investig. 2025, 52, 301883. [Google Scholar] [CrossRef]
- Hellemann, D.N. Human Risk Review 2023. SoSafe Awareness GmbH, Colonia, Alemania, Report 2023. Available online: https://www.sosafe-awareness.com/ (accessed on 19 March 2025).
- Connolly, L.Y.; Wall, D.S. The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. Comput. Secur. 2019, 87, 101568. [Google Scholar] [CrossRef]
- Mesa, M.V.C.; Patino-Rodriguez, C.E.; Carazas, F.J.G. Cybersecurity at Sea: A Literature Review of Cyber-Attack Impacts and Defenses in Maritime Supply Chains. Information 2024, 15, 710. [Google Scholar] [CrossRef]
- Rauf, U.; Mohsen, F.; Wei, Z. A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions & Recommendations. J. Cyber Secur. Mobil. 2023, 12, 221–252. [Google Scholar] [CrossRef]
- Beaman, C.; Barkworth, A.; Akande, T.D.; Hakak, S.; Khan, M.K. Ransomware: Recent advances, analysis, challenges and future research directions. Comput. Secur. 2021, 111, 102490. [Google Scholar] [CrossRef]
- Raghi, K.R.; Paramarthalingam, A. Proactive detection of Mirai botnet threats: Leveraging XGBoost for enhanced cybersecurity. In Proceedings of the IET Conference Proceedings, Coimbatore, India, 11–12 December 2024; Volume 2024, pp. 34–39. [Google Scholar] [CrossRef]
- Alrwais, S.; Yuan, K.; Alowaisheq, E.; Liao, X.; Oprea, A.; Wang, X.; Li, Z. Catching predators at watering holes: Finding and understanding strategically compromised websites. In Proceedings of the 32nd Annual Conference on Computer Security Applications, Los Angeles, CA, USA, 5–8 December 2016; pp. 153–166. [Google Scholar]
- Pinzón, J.J.S. El contexto actual e histórico de la ingeniería social. LATAM Rev. Latinoam. Cienc. Soc. Humanid. 2024, 5, 5. [Google Scholar] [CrossRef]
- Crosignani, M.; Macchiavelli, M.; Silva, A.F. Pirates without borders: The propagation of cyberattacks through firms’ supply chains. J. Financ. Econ. 2023, 147, 432–448. [Google Scholar] [CrossRef]
- Andreoli, A.; Lounis, A.; Debbabi, M.; Hanna, A. On the prevalence of software supply chain attacks: Empirical study and investigative framework. Forensic Sci. Int. Digit. Investig. 2023, 44, 301508. [Google Scholar] [CrossRef]
- Nassir, N.F.M.; Rauf, U.F.A.; Zainol, Z.; Ghani, K.A. Revealing the multi-perspective factors behind insider threats in cybersecurity. J. Media Inf. Warf. 2025, 17, 65–82. [Google Scholar]
- Ivanov, M.A.; Kliuchnikova, B.V.; Chugunkov, I.V.; Plaksina, A.M. Phishing Attacks and Protection Against Them. In Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg, Moscow, Russia, 26–29 January 2021. [Google Scholar]
- Priya, P.M.; Ranganathan, A. Cyber Awareness Learning Imitation Environment (CALIE): A Card Game to provide Cyber Security Awareness for Various Group of Practitioners. Adv. Netw. Appl. 2022, 14, 5334–5341. [Google Scholar] [CrossRef]
- Insikt Group. The Business of Fraud: SIM Swapping; Recorded Future: Somerville, MA, USA, 2021. [Google Scholar]
- CISA. Darkside Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks; Cybersecurity and Infrastructure Security Agency (CISA): Arlington, VA, USA; Federal Bureau of Investigation (FBI): Washington, DC, USA, 2021.
- CISA. Mitigate Microsoft Exchange On-Premises Product Vulnerabilities. Cybersecurity and Infrastructure Security Agency (CISA), 2021. Available online: https://www.cisa.gov/ED2102 (accessed on 19 March 2025).
- United States Senate Committee on Commerce, Science, and Transportation. “Kill Chain” Analysis of the 2013 Target Data Breach; United States Senate Committee on Commerce, Science, and Transportation: Washington, DC, USA, 2014.
- The Council to Secure the Digital Economy; Ustelecom; Consumer Technology Association. International Botnet and Iot Security Guide; USTelecom: Washington, DC, USA; Consumer Technology Association (CTA): Arlington, VA, USA, 2021. [Google Scholar]
- ANSSI. The Malware-As-Service-Emotet; Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI): Paris, France, 2021. Available online: https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-003.pdf (accessed on 19 March 2025).
- Cysiv. Threat Report: Formbook Infostealer; Cysiv Inc.: Irving, TX, USA, 2021; Available online: www.cysiv.com (accessed on 19 March 2025).
- Smart, W. Lessons learned review of the WannaCry Ransomware Cyber Attack; NHS: Leeds, UK, 2018. [Google Scholar]
- Cloudflare. DNS and the Threat of DDoS; Cloudflare Inc.: San Francisco, CA, USA, 2022. [Google Scholar]
- Steinberg, S.; Stepan, A.; Neary, K.; Rattray, G.; Healey, J. NotPetya: A Columbia University Case Study; SIPA-21-022.1; Case Consortium @ Columbia, School of International and Public Affairs, Columbia University: New York, NY, USA, 2021. [Google Scholar]
- ANSSI. Ryuk Ransomware; Agence Nationale de la Sécurité des Systèmes d’Information (ANSSI): Paris, France, 2021. Available online: https://www.cert.ssi.gouv.fr/uploads/CERTFR-2021-CTI-006.pdf (accessed on 19 March 2025).
- ICS-CERT. ICS-CERT MONITOR January–April 2014; U.S. Department of Homeland Security (DHS), National Cybersecurity and Communications Integration Center (NCCIC): Washington, DC, USA, 2014. Available online: https://www.cisa.gov/sites/default/files/Monitors/ICS-CERT_Monitor_Jan-April2014.pdf (accessed on 19 March 2025).
- Cybersecurity and Infrastructure Security Agency; Federal Bureau of Investigation, National Security Agency; Australian Cyber Security Centre; Canadian Centre for Cyber Security; Computer Emergency Response Team New Zealand; New Zealand National Cyber Security Centre; National Cyber Security Centre (United Kingdom). Mitigating Log4Shell and other Log4j-Related Vulnerabilities (Joint Cybersecurity Advisory AA21-356A); Cybersecurity and Infrastructure Security Agency: Washington, DC, USA, 2021. Available online: https://www.cisa.gov/sites/default/files/publications/AA21-356A_Joint_CSA_Mitigating_Log4Shell_and_Other_Log4j-Related_Vulnerabilities.pdf (accessed on 19 March 2025).
- Federal Energy Regulatory Commission; Electricity Information and Analysis Sharing Center. SolarWinds and Related Supply Chain Compromise: Lessons for the North American Electricity Industry; Federal Energy Regulatory Commission (FERC): Washington, DC, USA; Electricity Information and Analysis Sharing Center (E-ISAC): Washington, DC, USA, 2021.
- CISCO. Threats of the Year: A look back at the tactics and tools of 2019. In Cisco Cybersecurity Series 2019; Threat Report; Cisco: San Jose, CA, USA, 2019; Available online: http://www.cisco.com/go/securityreports (accessed on 19 March 2025).
- Cisco TALOS. 2024 Cisco Talos Year in Review; Cisco: San Jose, CA, USA, 2025. [Google Scholar]
- IEC 60870-5-101:2003; Telecontrol Equipment and Systems—Part 5-101: Transmission Protocols—Companion Standard for Basic Telecontrol Tasks. International Electrotechnical Commission: Geneva, Switzerland, 2003.
- IEC 60870-5-104:2006; Telecontrol Equipment and Systems—Part 5-104: Transmission Protocols—Network Access for IEC 60870-5-101 Using Standard Transport Profiles. International Electrotechnical Commission: Geneva, Switzerland, 2006.
- IEC 61850-5:2013; Communication Networks and Systems for Power Utility Automation—Part 5: Communication Requirements for Functions and Device Models. International Electrotechnical Commission: Geneva, Switzerland, 2013.
- OPC Foundation. OPC Data Access (OPC DA) 2.05a: Data Access Custom Interface Standard; OPC Foundation: Scottsdale, AZ, USA, 2002. [Google Scholar]
- Cherepanov, A. WIN32/INDUSTROYER A New Threat for Industrial Control Systems; ESET: Bratislava, Slovak Republic, 2017. [Google Scholar]
- Symantec. ISTR. Internet Security Threat Report Volume 24; Symantec: Mountain View, CA, USA, 2019. [Google Scholar]
- Cherepanov, A. GREYENERGY A Successor to BlackEnergy; ESET: Bratislava, Slovak Republic, 2018. [Google Scholar]
- Shakarian, P. Stuxnet: Revolución de Ciberguerra en los Asuntos Militares. Air Space Power J. 2012, 11, 50–59. [Google Scholar]
- Boone, H.; Boone, D. Analyzing Likert Data. J. Ext. 2012, 50, 48. [Google Scholar] [CrossRef]
- Sullivan, G.M.; Artino, A.R., Jr. Analyzing and Interpreting Data From Likert-Type Scales. J. Grad. Med. Educ. 2013, 5, 541–542. [Google Scholar] [CrossRef]
- Norman, G. Likert scales, levels of measurement and the “laws” of statistics. Adv. Health Sci. Educ. Theory Pract. 2010, 15, 625–632. [Google Scholar] [CrossRef]
- Nyutu, E.; Cobern, W.W.; Pleasants, B.A.S. Correlational Study of Student Perceptions of their Undergraduate Laboratory Environment with respect to Gender and Major. Int. J. Educ. Math. Sci. Technol. 2020, 9, 83–102. [Google Scholar] [CrossRef]
- Ferrer-Oliva, M.; Medina-Merodio, J.-A.; Martínez-Herraiz, J.-J.; Cilleruelo-Rodríguez, C. Relational Taxonomy of Cyberattacks: A Model for Threat Classification and Connection in Digital Environments. In Proceedings of the 12th Multidisciplinary International Social Networks Conference (MISNC 2025), Oviedo, Spain, 3–5 September 2025. [Google Scholar] [CrossRef]

| Initial Attack ↓/Facilitated Attack → | SE | MBA | ESV | APC | NIA | CIIA | APT |
|---|---|---|---|---|---|---|---|
| IAA | 1 | 1 | 1 | 1 | 1 | 0 | 0 |
| SE | 0 | 1 | 1 | 0 | 0 | 0 | 0 |
| MBA | 0 | 0 | 1 | 1 | 1 | 1 | 0 |
| ESV | 0 | 0 | 0 | 1 | 1 | 0 | 1 |
| APC | 0 | 0 | 0 | 0 | 1 | 1 | 1 |
| NIA | 0 | 0 | 0 | 0 | 0 | 1 | 1 |
| APT | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
| Evidence Source | Observed Phenomenon | Mapped Transition(s) | Justification |
|---|---|---|---|
| Marketplace datasets and forum studies [9,54,60,61] | Sale of valid accounts and initial access; credential dumps. | IAA → MBA IAA → NIA | Traded credentials enable stealthy payload deployment and lateral movement. |
| Crimeware-as-a-service/kit ecosystems [54,60,61,62] | Phishing kits and loaders delivering modular payloads with C2. | SE → MBA MBA → APC | Social delivery triggers execution; malware establishes C2 and exfiltration. |
| Ransomware leak sites and affiliate operations [62,63] | End-to-end campaigns from access to extortion. | MBA → CIIA | Payloads impair operations; leak sites document sequencing and impact. |
| Tor domain centrality/influence [58] | Concentration of brokers, kits, and monetisation hubs. | IAA → MBA IAA → NIA SE → MBA MBA → APC MBA → CIIA | Structural centrality explains frequent co-occurrence of enabling steps. |
| Taxonomy Group | Primary ATT&CK Tactic(s) | ATT&CK Techniques |
|---|---|---|
| SE | TA0001 Initial Access | T1189: Drive-by Compromise T1204.001: User Execution Malicious Link T1204.002: User Execution Malicious File T1566: Phishing T1566.001: Spear phishing Attachment T1566.002: Spear phishing Link T1566.003: Spear phishing via Service |
| IAA | TA0004: Privilege Escalation TA0006: Credential Access | T1003: Credential Dumping T1003.001: OS Credential Dumping LSASS Memory T1078: Valid Accounts T1110: Brute Force T1110.003: Password Spraying T1550.002: Pass-the-Hash T1550.003: Pass-the-Ticket T1621: Multifactor Authentication Interception |
| MBA | TA0002 Execution TA0003 Persistence | T1053: Scheduled Task Job T1059: Command and Scripting Interpreter T1059.001: PowerShell T1059.006: Python T1543.003: Windows Service T1547.001: Registry Run Keys Startup Folder T1574.001: DLL Search Order Hijacking T1129: Shared Modules |
| NIA | TA0007 Discovery TA0008 Lateral Movement | T1018: Remote System Discovery T1021: Remote Services T1021.001: RDP T1021.002: SMB Windows Admin Shares T1040: Network Sniffing T1570: Lateral Tool Transfer T1557.002: ARP Cache Poisoning |
| ESV | TA0001 Initial Access TA0004 Privilege Escalation | T1068: Exploitation for Privilege Escalation T1189: Drive-by Compromise T1190: Exploit Public-Facing Application T1203: Exploitation for Client Execution T1210: Exploit Remote Services |
| APC | TA0010 Exfiltration TA0011 Command and Control | T1041: Exfiltration Over C2 Channel T1048: Exfiltration Over Unencrypted Obfuscated Non-C2 Protocol T1071: Application Layer Protocol T1071.001: Web Protocols T1071.004: DNS T1567: Exfiltration Over Web Services T1573: Encrypted Channel |
| APT | TA0003 Persistence TA0005 Defence Evasion | T1027: Obfuscated Compressed Files and Information T1078: Valid Accounts T1218: Signed Binary Proxy Execution T1547: Boot or Logon Autostart Execution T1562.001: Disable Security Tools T1564: Hide Artefacts |
| CIIA | TA0040 Impact | T1485: Data Destruction T1486: Data Encrypted for Impact T1489: Service Stop T1490: Inhibit System Recovery T1496: Resource Hijacking T1499: Endpoint Denial of Service |
| Edge | Tactic at Origin | Example Technique(s) | Tactic at Destination | Example Technique(s) |
|---|---|---|---|---|
| SE → MBA | TA0001 Initial Access | T1204 User Execution T1566.001 Spear phishing Attachment | TA0002 Execution TA0003 Persistence | T1059 Command and Scripting Interpreter T1547 Boot or Logon Autostart Execution |
| MBA → APC | TA0002 Execution TA0003 Persistence | T1053 Scheduled Task/Job T1059 Command and Scripting Interpreter | TA0010 Exfiltration TA0011 Command and Control | T1041 Exfiltration Over C2 Channel T1071 Application Layer Protocol T1573 Encrypted Channel |
| APC → NIA | TA0011 Command and Control | T1071.004 Application Layer Protocol: DNS | TA0008 Lateral Movement | T1021 Remote Services T1570 Lateral Tool Transfer |
| NIA → CIIA | TA0008 Lateral Movement | T1021 Remote Services T1563 Remote Service Session Hijacking | TA0040 Impact | T1486 Data Encrypted for Impact T1490 Inhibit System Recovery |
| MBA → CIIA | TA0002 Execution TA0003 Persistence | T1059 Command and Scripting Interpreter T1543 Create or Modify System Process | TA0040 Impact | T1485 Data Destruction T1486 Data Encrypted for Impact T1499 Endpoint Denial of Service |
| Expert | Q1 | Q2 | Q3 | Q4 | Q5 | Q6 | Q7 | Q8 |
|---|---|---|---|---|---|---|---|---|
| E01 | 5 | 5 | 4 | 4 | 5 | 5 | 5 | 4 |
| E02 | 4 | 4 | 3 | 4 | 4 | 3 | 4 | 4 |
| E03 | 5 | 4 | 5 | 5 | 5 | 4 | 4 | 4 |
| E04 | 4 | 4 | 4 | 4 | 4 | 4 | 5 | 4 |
| E05 | 5 | 4 | 4 | 5 | 5 | 4 | 4 | 5 |
| Code | Short Label | Mean | SD | Decision |
|---|---|---|---|---|
| Q1 | Process flow (clarity) | 4.60 | 0.55 | Keep |
| Q2 | Checklist coverage | 4.20 | 0.45 | Keep |
| Q3 | Granularity and evidence | 4.00 | 0.71 | Keep |
| Q4 | Preconditions and criteria | 4.40 | 0.55 | Keep |
| Q5 | Rule and threshold (≥5/6) | 4.60 | 0.55 | Keep |
| Q6 | ATT&CK mappings | 4.00 | 0.71 | Keep |
| Q7 | Traceability and perceived reproducibility | 4.40 | 0.55 | Keep |
| Q8 | Internal coherence and applicability | 4.20 | 0.45 | Keep |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ferrer-Oliva, M.; Medina-Merodio, J.-A.; Martínez-Herraiz, J.-J.; Cilleruelo-Rodríguez, C. Relational Framework of Cyberattacks: Empirical Evidence from Multistage Incidents. Sensors 2025, 25, 7124. https://doi.org/10.3390/s25237124
Ferrer-Oliva M, Medina-Merodio J-A, Martínez-Herraiz J-J, Cilleruelo-Rodríguez C. Relational Framework of Cyberattacks: Empirical Evidence from Multistage Incidents. Sensors. 2025; 25(23):7124. https://doi.org/10.3390/s25237124
Chicago/Turabian StyleFerrer-Oliva, Mikel, José-Amelio Medina-Merodio, José-Javier Martínez-Herraiz, and Carlos Cilleruelo-Rodríguez. 2025. "Relational Framework of Cyberattacks: Empirical Evidence from Multistage Incidents" Sensors 25, no. 23: 7124. https://doi.org/10.3390/s25237124
APA StyleFerrer-Oliva, M., Medina-Merodio, J.-A., Martínez-Herraiz, J.-J., & Cilleruelo-Rodríguez, C. (2025). Relational Framework of Cyberattacks: Empirical Evidence from Multistage Incidents. Sensors, 25(23), 7124. https://doi.org/10.3390/s25237124

