RadiumFox Logo
RADIUMFOXSecurity

The Kill Chain

A chronological reconstruction of the attack vectors used to compromise the target.

Impact Assessment

Financial LossN/A (Card Theft)
Operational Impact40 Million Credit Cards Stolen
Day 0

Vendor Compromise

Attackers compromise Fazio Mechanical Services (HVAC vendor) via phishing.

Day 5

Network Pivot

Attackers use vendor credentials to pivot from the vendor portal to Target's internal network.

Day 15

POS Infection

RAM scraping malware is installed on Point-of-Sale terminals.

Day 20

Data Exfiltration

Card data is sent to drop servers within Target's network, then exfiltrated.

Evidence Board

CONFIDENTIAL // EYES ONLY

RANSOM_NOTE.TXT

N/A

WALLET ADDRESS

N/A

SHA-256 HASH

BlackPOS (Kaptoxa)

EXPLOITED VULNERABILITIES

Third-Party RiskDefault Creds
Retrospective Analysis

How We Would Have Stopped It

Mapping the specific security failures to RadiumFox's preventative services.

The Failure

Third-Party Risk

The Solution

Enforce strict security standards and MFA for all vendors.

Explore Third-Party Risk Management

The Failure

Lack of Network Segmentation

The Solution

Vendor portals should be completely isolated from the payment card environment (CDE).

Explore PCI-DSS Compliance

The Failure

POS Security

The Solution

Implement application whitelisting on POS terminals.

Explore Endpoint Security

Join Us. Cut Costs.
Focus on What Matters.

Unlock high-impact penetration testing that drives real security gains. Led by experts, tailored for results, and designed to stay budget-friendly.

1

Submit Info

Share your environment, scope, or compliance needs via our quick form.

2

Senior Review

A lead RadiumFox engineer reviews and tailors your assessment—no junior handoffs.

3

Optional Scoping Call

We'll clarify priorities and technical details if needed.

4

Clear Quote

Expect a fixed-cost proposal—no hidden fees or fluff.

5

Fast Kickoff

Once approved, most projects launch within 5–7 business days with full support.