An adversary may rely upon a user clicking a malicious link in order to gain execution. Users may be subjected to social engineering to get them to click on a link that will lead to code execution. This user action will typically be observed as follow-on behavior from Spearphishing Link. Clicking on a link may also lead to other execution techniques such as exploitation of a browser or application vulnerability via Exploitation for Client Execution. Links may also lead users to download files that require execution via Malicious File.
User Execution – Malicious Link (click → suspicious egress → download/write → follow-on activity)
Network Intrusion Prevention: Use intrusion detection signatures to block traffic at network boundaries.
User Training: User Training involves educating employees and contractors on recognizing, reporting, and preventing cyber threats that rely on human interaction, such as phishing, social engineering, and other manipulative techniques. Comprehensive training programs create a human firewall by empowering users to be an active component of the organization's cybersecurity defenses. This mitigation can be implemented through the following measures:
Create Comprehensive Training Programs:
Use Simulated Exercises:
Leverage Gamification and Engagement:
Incorporate Security Policies into Onboarding:
Regular Refresher Courses:
Emphasize Real-World Scenarios:
Restrict Web-Based Content: Restricting web-based content involves enforcing policies and technologies that limit access to potentially malicious websites, unsafe downloads, and unauthorized browser behaviors. This can include URL filtering, download restrictions, script blocking, and extension control to protect against exploitation, phishing, and malware delivery. This mitigation can be implemented through the following measures:
Deploy Web Proxy Filtering:
Enable DNS-Based Filtering:
Enforce Content Security Policies (CSP):
Control Browser Features:
Monitor and Alert on Web-Based Threats: