RadiumFox Logo
RADIUMFOXSecurity

The Kill Chain

A chronological reconstruction of the attack vectors used to compromise the target.

Impact Assessment

Financial LossN/A (Espionage)
Operational Impact500 Million Guest Records Exposed
Day 0

Initial Access

Attackers compromise the Starwood reservation system (prior to Marriott acquisition).

Day 365

Acquisition

Marriott acquires Starwood, inheriting the compromised network.

Day 1000

Persistence

Attackers remain undetected for years, accessing passport numbers and credit cards.

Day 1460

Discovery

A security tool finally flags an unusual database query.

Evidence Board

CONFIDENTIAL // EYES ONLY

RANSOM_NOTE.TXT

N/A

WALLET ADDRESS

N/A

SHA-256 HASH

RAT (Remote Access Trojan)

EXPLOITED VULNERABILITIES

M&A Due Diligence
Retrospective Analysis

How We Would Have Stopped It

Mapping the specific security failures to RadiumFox's preventative services.

The Failure

M&A Due Diligence

The Solution

Perform a rigorous Compromise Assessment before integrating acquired networks.

Explore M&A Security Assessment

The Failure

Database Monitoring

The Solution

Monitor database access logs for unusual query patterns and volume.

Explore Database Security

The Failure

Encryption at Rest

The Solution

Encrypt sensitive fields (Passport numbers) at the application level.

Explore Application Security

Join Us. Cut Costs.
Focus on What Matters.

Unlock high-impact penetration testing that drives real security gains. Led by experts, tailored for results, and designed to stay budget-friendly.

1

Submit Info

Share your environment, scope, or compliance needs via our quick form.

2

Senior Review

A lead RadiumFox engineer reviews and tailors your assessment—no junior handoffs.

3

Optional Scoping Call

We'll clarify priorities and technical details if needed.

4

Clear Quote

Expect a fixed-cost proposal—no hidden fees or fluff.

5

Fast Kickoff

Once approved, most projects launch within 5–7 business days with full support.