RadiumFox Logo
RADIUMFOXSecurity

The Kill Chain

A chronological reconstruction of the attack vectors used to compromise the target.

Impact Assessment

Financial LossN/A (Data Theft)
Operational Impact147 Million People's Data Exposed
Day 0

Vulnerability Disclosed

Apache Struts vulnerability (CVE-2017-5638) is announced. Patch is available.

Day 60

Exploitation

Attackers exploit the unpatched web portal to gain shell access.

Day 65

Database Access

Attackers find unencrypted credentials and access 51 databases.

Day 130

Exfiltration

Data is exfiltrated slowly over months to avoid detection.

Evidence Board

CONFIDENTIAL // EYES ONLY

RANSOM_NOTE.TXT

N/A

WALLET ADDRESS

N/A

SHA-256 HASH

Web Shell (JSP)

EXPLOITED VULNERABILITIES

CVE-2017-5638
Retrospective Analysis

How We Would Have Stopped It

Mapping the specific security failures to RadiumFox's preventative services.

The Failure

Unpatched Web Framework

The Solution

Maintain an accurate asset inventory and patch critical web vulnerabilities within 48 hours.

Explore Vulnerability Management

The Failure

Flat Network

The Solution

Web servers should not have direct, unmonitored access to backend databases containing PII.

Explore Network Pentesting

The Failure

Lack of Egress Filtering

The Solution

Inspect encrypted traffic leaving the network to detect large data transfers.

Explore SOC Advisory

Join Us. Cut Costs.
Focus on What Matters.

Unlock high-impact penetration testing that drives real security gains. Led by experts, tailored for results, and designed to stay budget-friendly.

1

Submit Info

Share your environment, scope, or compliance needs via our quick form.

2

Senior Review

A lead RadiumFox engineer reviews and tailors your assessment—no junior handoffs.

3

Optional Scoping Call

We'll clarify priorities and technical details if needed.

4

Clear Quote

Expect a fixed-cost proposal—no hidden fees or fluff.

5

Fast Kickoff

Once approved, most projects launch within 5–7 business days with full support.