R2 – Ransomware via Unpatched Software
Baseline ATT&CK-informed attack path supporting Booz Allen Scenario R2. Used for governance discussions, exposure visibility, and remediation prioritization.
A scenario lens on ransomware exposure
This page translates the R2 cyber risk scenario into a curated attacker progression path. It helps explain how unpatched or exposed systems may lead to ransomware deployment, data exfiltration, business disruption, and recovery impairment. The objective is to identify where controls can break the path and where residual exposure may remain.
Curated ATT&CK techniques mapped to the R2 progression, not the full matrix.
Operational weaknesses that allow the scenario to materialize.
Controls and capabilities that interrupt the attack progression.
How the scenario operationally materializes
Left-to-right progression aligned to ATT&CK tactics. Each stage shows the selected technique, its business-readable interpretation, and severity from the layer score.
- Stage 1Initial AccessT1133HighExternal Remote Services
Alternative entry vector through exposed VPN, RDP, Citrix, or remote access infrastructure.
T1190CriticalExploit Public-Facing ApplicationPrimary entry point where internet-facing systems have patching gaps, unsupported software, or delayed remediation.
T1078MediumValid AccountsAttackers leverage compromised or reused credentials to expand access after initial compromise.
- Stage 2ExecutionT1059MediumCommand and Scripting Interpreter
Common execution method for ransomware payload deployment and attacker tooling.
T1072MediumSoftware Deployment ToolsEnterprise deployment tooling may be abused to distribute ransomware payloads at scale.
- Stage 3PersistenceT1133HighExternal Remote Services
Alternative entry vector through exposed VPN, RDP, Citrix, or remote access infrastructure.
T1078MediumValid AccountsAttackers leverage compromised or reused credentials to expand access after initial compromise.
- Stage 4Privilege EscalationT1078MediumValid Accounts
Attackers leverage compromised or reused credentials to expand access after initial compromise.
- Stage 5Defense EvasionT1078MediumValid Accounts
Attackers leverage compromised or reused credentials to expand access after initial compromise.
- Stage 6DiscoveryT1087LowAccount Discovery
Used to identify privileged accounts and lateral movement opportunities.
T1046LowNetwork Service DiscoverySupports identification of high-value systems and reachable internal services.
- Stage 7Lateral MovementT1021HighRemote Services
Enables propagation across enterprise systems and business-critical infrastructure.
T1072MediumSoftware Deployment ToolsEnterprise deployment tooling may be abused to distribute ransomware payloads at scale.
- Stage 8ExfiltrationT1567MediumExfiltration Over Web Service
Sensitive data may be exfiltrated prior to encryption to increase extortion pressure.
- Stage 9ImpactT1486CriticalData Encrypted for Impact
Primary ransomware impact event causing operational disruption and potential MTPD breaches.
T1490CriticalInhibit System RecoveryAttackers disable recovery capabilities to prolong operational disruption and increase business impact.
Techniques grouped by tactic
Filter by severity or tactic. Each card includes the ATT&CK comment and a placeholder for the responsible mitigating control.
Persistence
Alternative entry vector through exposed VPN, RDP, Citrix, or remote access infrastructure.
Attackers leverage compromised or reused credentials to expand access after initial compromise.
Initial Access
Alternative entry vector through exposed VPN, RDP, Citrix, or remote access infrastructure.
Primary entry point where internet-facing systems have patching gaps, unsupported software, or delayed remediation.
Attackers leverage compromised or reused credentials to expand access after initial compromise.
Exfiltration
Sensitive data may be exfiltrated prior to encryption to increase extortion pressure.
Lateral Movement
Enables propagation across enterprise systems and business-critical infrastructure.
Enterprise deployment tooling may be abused to distribute ransomware payloads at scale.
Discovery
Used to identify privileged accounts and lateral movement opportunities.
Supports identification of high-value systems and reachable internal services.
Execution
Common execution method for ransomware payload deployment and attacker tooling.
Enterprise deployment tooling may be abused to distribute ransomware payloads at scale.
Defense Evasion
Attackers leverage compromised or reused credentials to expand access after initial compromise.
Privilege Escalation
Attackers leverage compromised or reused credentials to expand access after initial compromise.
Impact
Primary ransomware impact event causing operational disruption and potential MTPD breaches.
Attackers disable recovery capabilities to prolong operational disruption and increase business impact.
Path breakers, owners and exposure indicators
Operational mapping between ATT&CK techniques and the controls that interrupt the R2 progression.
| Attack Stage | ATT&CK Technique | Path Enabler / Control Weakness | Mitigating Control / Path Breaker | Control Owner | Exposure Indicator | Residual Exposure |
|---|---|---|---|---|---|---|
| Initial Access | T1190 Exploit Public-Facing Application | Internet-facing patch gaps, unsupported software, delayed remediation | Vulnerability management, patch SLA enforcement, external attack surface management | Infrastructure / Security Engineering | Number of internet-facing patch exceptions | Open / To be assessed |
| Initial Access | T1133 External Remote Services | Exposed VPN, RDP, Citrix, weak remote access hardening | MFA, conditional access, remote access hardening, privileged access controls | IAM / Infrastructure | Number of remote access exceptions or MFA gaps | Open / To be assessed |
| Execution | T1059 Command and Scripting Interpreter | Unrestricted script execution, weak endpoint controls | EDR, application control, PowerShell hardening, script logging | Cyber Defense / Endpoint Security | EDR coverage and script execution alerts | Open / To be assessed |
| Execution / Lateral Movement | T1072 Software Deployment Tools | Excessive administrative rights or misuse of enterprise deployment tooling | Admin tiering, restricted deployment rights, change control, monitoring of deployment tools | Infrastructure / Endpoint Management | Number of privileged deployment tool users | Open / To be assessed |
| Credential Abuse | T1078 Valid Accounts | Compromised, reused, or over-privileged accounts | MFA, PAM, access recertification, privileged account monitoring | IAM / PAM Team | Privileged account exceptions and MFA gaps | Open / To be assessed |
| Discovery | T1087 Account Discovery | Poor monitoring of account enumeration activity | Detection engineering, SIEM alerting, identity monitoring | Cyber Defense | Account discovery detections / alert coverage | Open / To be assessed |
| Discovery | T1046 Network Service Discovery | Weak internal visibility, broad network reachability | Network monitoring, segmentation validation, scanning detection | Network Security / Cyber Defense | Internal scan detections and segmentation exceptions | Open / To be assessed |
| Lateral Movement | T1021 Remote Services | Flat network, excessive remote service access | Network segmentation, privileged access restrictions, remote service hardening | Network Security / Infrastructure | Segmentation exceptions and remote access paths | Open / To be assessed |
| Exfiltration | T1567 Exfiltration Over Web Service | Weak egress monitoring, weak DLP, unsanctioned cloud channels | DLP, CASB, egress filtering, proxy monitoring | Data Security / Cyber Defense | DLP alerts and unsanctioned cloud upload events | Open / To be assessed |
| Impact | T1486 Data Encrypted for Impact | Weak ransomware containment and insufficient endpoint protection | EDR prevention, ransomware containment, incident response playbooks | Cyber Defense / Endpoint Security | Ransomware prevention coverage and IR readiness | Open / To be assessed |
| Impact | T1490 Inhibit System Recovery | Weak backup isolation, poor recovery testing, backup deletion exposure | Immutable backups, backup isolation, recovery testing, DR exercises | IT Operations / BCM / DR | Backup immutability gaps and failed recovery tests | Open / To be assessed |
What lets the scenario materialize
Controls that interrupt the path
From exceptions to scenario exposure
This model allows exceptions and control weaknesses to be understood as path enablers within a business risk scenario, rather than as isolated technical issues.
Artifacts produced from this scenario
Portable attack-path model — re-importable into MITRE ATT&CK Navigator.
Structured control and exposure mapping for risk and governance teams.
Management-readable governance artifact for steering committees and reviews.