Scenario R2ATT&CK v19Enterprise ATT&CKScenario-Based Cyber Risk

R2 – Ransomware via Unpatched Software

Baseline ATT&CK-informed attack path supporting Booz Allen Scenario R2. Used for governance discussions, exposure visibility, and remediation prioritization.

Unique Techniques
11
Selected from ATT&CK
Tactics Covered
9
Across attack chain
Critical Path Techniques
3
Score = 5
Domain
enterprise-attack
MITRE ATT&CK
Platforms in Scope
11
Windows, IaaS, Linux…
Executive Summary

A scenario lens on ransomware exposure

This page translates the R2 cyber risk scenario into a curated attacker progression path. It helps explain how unpatched or exposed systems may lead to ransomware deployment, data exfiltration, business disruption, and recovery impairment. The objective is to identify where controls can break the path and where residual exposure may remain.

Attack Path

Curated ATT&CK techniques mapped to the R2 progression, not the full matrix.

Path Enablers

Operational weaknesses that allow the scenario to materialize.

Path Breakers

Controls and capabilities that interrupt the attack progression.

Attack Path

How the scenario operationally materializes

Left-to-right progression aligned to ATT&CK tactics. Each stage shows the selected technique, its business-readable interpretation, and severity from the layer score.

  1. Stage 1
    Initial Access
    T1133High
    External Remote Services

    Alternative entry vector through exposed VPN, RDP, Citrix, or remote access infrastructure.

    T1190Critical
    Exploit Public-Facing Application

    Primary entry point where internet-facing systems have patching gaps, unsupported software, or delayed remediation.

    T1078Medium
    Valid Accounts

    Attackers leverage compromised or reused credentials to expand access after initial compromise.

  2. Stage 2
    Execution
    T1059Medium
    Command and Scripting Interpreter

    Common execution method for ransomware payload deployment and attacker tooling.

    T1072Medium
    Software Deployment Tools

    Enterprise deployment tooling may be abused to distribute ransomware payloads at scale.

  3. Stage 3
    Persistence
    T1133High
    External Remote Services

    Alternative entry vector through exposed VPN, RDP, Citrix, or remote access infrastructure.

    T1078Medium
    Valid Accounts

    Attackers leverage compromised or reused credentials to expand access after initial compromise.

  4. Stage 4
    Privilege Escalation
    T1078Medium
    Valid Accounts

    Attackers leverage compromised or reused credentials to expand access after initial compromise.

  5. Stage 5
    Defense Evasion
    T1078Medium
    Valid Accounts

    Attackers leverage compromised or reused credentials to expand access after initial compromise.

  6. Stage 6
    Discovery
    T1087Low
    Account Discovery

    Used to identify privileged accounts and lateral movement opportunities.

    T1046Low
    Network Service Discovery

    Supports identification of high-value systems and reachable internal services.

  7. Stage 7
    Lateral Movement
    T1021High
    Remote Services

    Enables propagation across enterprise systems and business-critical infrastructure.

    T1072Medium
    Software Deployment Tools

    Enterprise deployment tooling may be abused to distribute ransomware payloads at scale.

  8. Stage 8
    Exfiltration
    T1567Medium
    Exfiltration Over Web Service

    Sensitive data may be exfiltrated prior to encryption to increase extortion pressure.

  9. Stage 9
    Impact
    T1486Critical
    Data Encrypted for Impact

    Primary ransomware impact event causing operational disruption and potential MTPD breaches.

    T1490Critical
    Inhibit System Recovery

    Attackers disable recovery capabilities to prolong operational disruption and increase business impact.

Attack Path Matrix

Techniques grouped by tactic

Filter by severity or tactic. Each card includes the ATT&CK comment and a placeholder for the responsible mitigating control.

Severity
Tactic

Persistence

2 techniques
T1133
External Remote Services
High
PersistenceInitial Access

Alternative entry vector through exposed VPN, RDP, Citrix, or remote access infrastructure.

Mitigating control / path breaker — see Controls section
T1078
Valid Accounts
Medium
Defense EvasionPersistencePrivilege EscalationInitial Access

Attackers leverage compromised or reused credentials to expand access after initial compromise.

Mitigating control / path breaker — see Controls section

Initial Access

3 techniques
T1133
External Remote Services
High
PersistenceInitial Access

Alternative entry vector through exposed VPN, RDP, Citrix, or remote access infrastructure.

Mitigating control / path breaker — see Controls section
T1190
Exploit Public-Facing Application
Critical

Primary entry point where internet-facing systems have patching gaps, unsupported software, or delayed remediation.

Mitigating control / path breaker — see Controls section
T1078
Valid Accounts
Medium
Defense EvasionPersistencePrivilege EscalationInitial Access

Attackers leverage compromised or reused credentials to expand access after initial compromise.

Mitigating control / path breaker — see Controls section

Exfiltration

1 technique
T1567
Exfiltration Over Web Service
Medium

Sensitive data may be exfiltrated prior to encryption to increase extortion pressure.

Mitigating control / path breaker — see Controls section

Lateral Movement

2 techniques
T1021
Remote Services
High

Enables propagation across enterprise systems and business-critical infrastructure.

Mitigating control / path breaker — see Controls section
T1072
Software Deployment Tools
Medium
ExecutionLateral Movement

Enterprise deployment tooling may be abused to distribute ransomware payloads at scale.

Mitigating control / path breaker — see Controls section

Discovery

2 techniques
T1087
Account Discovery
Low

Used to identify privileged accounts and lateral movement opportunities.

Mitigating control / path breaker — see Controls section
T1046
Network Service Discovery
Low

Supports identification of high-value systems and reachable internal services.

Mitigating control / path breaker — see Controls section

Execution

2 techniques
T1059
Command and Scripting Interpreter
Medium

Common execution method for ransomware payload deployment and attacker tooling.

Mitigating control / path breaker — see Controls section
T1072
Software Deployment Tools
Medium
ExecutionLateral Movement

Enterprise deployment tooling may be abused to distribute ransomware payloads at scale.

Mitigating control / path breaker — see Controls section

Defense Evasion

1 technique
T1078
Valid Accounts
Medium
Defense EvasionPersistencePrivilege EscalationInitial Access

Attackers leverage compromised or reused credentials to expand access after initial compromise.

Mitigating control / path breaker — see Controls section

Privilege Escalation

1 technique
T1078
Valid Accounts
Medium
Defense EvasionPersistencePrivilege EscalationInitial Access

Attackers leverage compromised or reused credentials to expand access after initial compromise.

Mitigating control / path breaker — see Controls section

Impact

2 techniques
T1486
Data Encrypted for Impact
Critical

Primary ransomware impact event causing operational disruption and potential MTPD breaches.

Mitigating control / path breaker — see Controls section
T1490
Inhibit System Recovery
Critical

Attackers disable recovery capabilities to prolong operational disruption and increase business impact.

Mitigating control / path breaker — see Controls section
Mitigating Controls

Path breakers, owners and exposure indicators

Operational mapping between ATT&CK techniques and the controls that interrupt the R2 progression.

Attack StageATT&CK TechniquePath Enabler / Control WeaknessMitigating Control / Path BreakerControl OwnerExposure IndicatorResidual Exposure
Initial AccessT1190 Exploit Public-Facing ApplicationInternet-facing patch gaps, unsupported software, delayed remediationVulnerability management, patch SLA enforcement, external attack surface managementInfrastructure / Security EngineeringNumber of internet-facing patch exceptionsOpen / To be assessed
Initial AccessT1133 External Remote ServicesExposed VPN, RDP, Citrix, weak remote access hardeningMFA, conditional access, remote access hardening, privileged access controlsIAM / InfrastructureNumber of remote access exceptions or MFA gapsOpen / To be assessed
ExecutionT1059 Command and Scripting InterpreterUnrestricted script execution, weak endpoint controlsEDR, application control, PowerShell hardening, script loggingCyber Defense / Endpoint SecurityEDR coverage and script execution alertsOpen / To be assessed
Execution / Lateral MovementT1072 Software Deployment ToolsExcessive administrative rights or misuse of enterprise deployment toolingAdmin tiering, restricted deployment rights, change control, monitoring of deployment toolsInfrastructure / Endpoint ManagementNumber of privileged deployment tool usersOpen / To be assessed
Credential AbuseT1078 Valid AccountsCompromised, reused, or over-privileged accountsMFA, PAM, access recertification, privileged account monitoringIAM / PAM TeamPrivileged account exceptions and MFA gapsOpen / To be assessed
DiscoveryT1087 Account DiscoveryPoor monitoring of account enumeration activityDetection engineering, SIEM alerting, identity monitoringCyber DefenseAccount discovery detections / alert coverageOpen / To be assessed
DiscoveryT1046 Network Service DiscoveryWeak internal visibility, broad network reachabilityNetwork monitoring, segmentation validation, scanning detectionNetwork Security / Cyber DefenseInternal scan detections and segmentation exceptionsOpen / To be assessed
Lateral MovementT1021 Remote ServicesFlat network, excessive remote service accessNetwork segmentation, privileged access restrictions, remote service hardeningNetwork Security / InfrastructureSegmentation exceptions and remote access pathsOpen / To be assessed
ExfiltrationT1567 Exfiltration Over Web ServiceWeak egress monitoring, weak DLP, unsanctioned cloud channelsDLP, CASB, egress filtering, proxy monitoringData Security / Cyber DefenseDLP alerts and unsanctioned cloud upload eventsOpen / To be assessed
ImpactT1486 Data Encrypted for ImpactWeak ransomware containment and insufficient endpoint protectionEDR prevention, ransomware containment, incident response playbooksCyber Defense / Endpoint SecurityRansomware prevention coverage and IR readinessOpen / To be assessed
ImpactT1490 Inhibit System RecoveryWeak backup isolation, poor recovery testing, backup deletion exposureImmutable backups, backup isolation, recovery testing, DR exercisesIT Operations / BCM / DRBackup immutability gaps and failed recovery testsOpen / To be assessed
Path Enablers

What lets the scenario materialize

Patching exceptions
Unsupported software
Exposed remote services
Weak MFA coverage
Excessive privileged access
Weak network segmentation
Incomplete EDR coverage
Weak egress monitoring
Weak backup immutability
Incomplete recovery testing
Path Breakers

Controls that interrupt the path

Patch SLA enforcement
External attack surface management
MFA and conditional access
PAM and least privilege
EDR coverage and response
Application control
Network segmentation
DLP / CASB / egress monitoring
Immutable backups
Recovery testing and DR validation
Governance Integration

From exceptions to scenario exposure

This model allows exceptions and control weaknesses to be understood as path enablers within a business risk scenario, rather than as isolated technical issues.

Step 1
Archer Exceptions
Step 2
Security Standards
Step 3
Booz Allen Risk Scenario
Step 4
ATT&CK-Informed Attack Path
Step 5
Exposure Indicators
Step 6
Mitigation Actions
Step 7
Residual Risk
Step 8
Scenario Exposure Dashboard
Operational Use

Artifacts produced from this scenario

Navigator JSON

Portable attack-path model — re-importable into MITRE ATT&CK Navigator.

Excel / CSV

Structured control and exposure mapping for risk and governance teams.

PDF / Web Page

Management-readable governance artifact for steering committees and reviews.

Scope

Platforms in the layer

WindowsIaaSLinuxmacOSSaaSESXiNetwork DevicesPREContainersOffice SuiteIdentity Provider