Issue: Companies often overfocus on how cybercrime incidents happen and miss why they were targeted, leaving the door open for adversaries.
When most companies and security teams think about cybercrime, especially after experiencing a data breach or business interruption, they tend to focus on how a breach or compromise occurred. It’s natural to want to understand the sequence of techniques and procedures that allowed the incident to occur.
“How?” is the wrong first question
However, asking how rarely leads to better security posture or improved risk management. Cybercrime is, by and large, opportunistic. Cybercriminals use utilitarian TTPs to take advantage of the weaknesses around a target at a given moment. As defenders, we can’t directly control or predict how (the means of attack) because attackers opportunistically adapt their techniques and procedures- vulnerability exploitation, social engineering, phishing, SIM swapping, malware, living off the land, and so on.
Overfocusing on how is like playing a never-ending game of whack-a-mole. It overlooks why your company was targeted in the first place and weakens your security posture. Even if you stop a specific attack from progressing to a breach or compromise, the opportunity that enabled it remains unaddressed, leaving your company at risk.
Ask “Why was I targeted?”
It’s critical to remember why cybercriminals perpetrate attacks. Cybercrime groups target high-value commodities- identity and data- for financial gain. They typically try to remain undetected as long as possible to meet their objectives, selling access to breached identities, data, and systems instead of directly going after target assets. Nation-state groups similarly target high-value identities, data, and access to meet objectives related to geopolitical value and espionage.
For example, cybercriminals often target professional services companies to take advantage of their level of access and trust. These companies often have access to their customers’ data rooms, financial accounts, and even networks and systems. An email from a trusted service provider, accountant, lawyer, or investor, or network traffic between your company and theirs, is expected and easy to overlook.
However, defenders can’t control why (the motive) any more than how (the means) because business-critical data and resources have inherent value that will attract criminal activity, though that value varies over time by its importance.
Means (How) + Motive (Why) + Opportunity (When) = Why your company gets breached or compromised
The most important question to consider is why the attack, breach, or compromise against your company succeeded.
Cybercriminals take advantage of weak security like a lack of patching, poor coordination between systems, and insufficient identity security measures. In other words, attackers are only able to succeed because there are gaps in security posture. Posture management is therefore about reducing the opportunity for crime. This is only thing defenders can directly control.