RadiumFox Logo
RADIUMFOXSecurity

The Kill Chain

A chronological reconstruction of the attack vectors used to compromise the target.

Impact Assessment

Financial Loss$4.4 Million (Paid)
Operational ImpactGas Shortages Across US East Coast
Day 0

Initial Access

Attackers gain access via a compromised VPN password for an inactive account. No MFA.

Day 1

Lateral Movement

DarkSide actors move laterally through the IT network, escalating privileges.

Day 2

Data Exfiltration

100GB of sensitive data is stolen for double extortion.

Day 7

Encryption

Ransomware deployed. Pipeline operations halted proactively.

Evidence Board

CONFIDENTIAL // EYES ONLY

RANSOM_NOTE.TXT

Welcome to DarkSide. We have encrypted your files...

WALLET ADDRESS

bc1qxy2kgdygjrsqtzq2n0yrf2493p83kkfjhx0wlh

SHA-256 HASH

a7f2c3d4e5f6a7b8c9d0e1f2a3b4c5d6e7f8a9b0

EXPLOITED VULNERABILITIES

Weak CredentialsVPN
Retrospective Analysis

How We Would Have Stopped It

Mapping the specific security failures to RadiumFox's preventative services.

The Failure

Single-Factor VPN

The Solution

Enforce MFA on all external access points.

Explore Identity & Access Management

The Failure

Lack of Segmentation

The Solution

Strictly segment IT and OT networks.

Explore Network Architecture Review

The Failure

Inactive Account

The Solution

Regularly audit and disable inactive accounts.

Explore Active Directory Assessment

Join Us. Cut Costs.
Focus on What Matters.

Unlock high-impact penetration testing that drives real security gains. Led by experts, tailored for results, and designed to stay budget-friendly.

1

Submit Info

Share your environment, scope, or compliance needs via our quick form.

2

Senior Review

A lead RadiumFox engineer reviews and tailors your assessment—no junior handoffs.

3

Optional Scoping Call

We'll clarify priorities and technical details if needed.

4

Clear Quote

Expect a fixed-cost proposal—no hidden fees or fluff.

5

Fast Kickoff

Once approved, most projects launch within 5–7 business days with full support.