Page 323 - Cyber Defense eMagazine September 2025
P. 323

What is the Threat Profiling Pyramid? Until now, the Pyramid of Compromise, also called the Pyramid
            of  Pain,  has been  a common  framework  in  cybersecurity.  But  is  it  still  useful  in  today’s  world?  The
            Pyramid of Pain has served the cybersecurity community well, but it seems to be outdated.



            Traditionally, the pyramid focuses on several key indicators:

            1. Hash

            2. IP Address

            3. Domain Names

            4. Network/Host Artifacts

            5. Tools

            6. TTPs (Tactics, Techniques, and Procedures)



            Researchers have relied on this pyramid to gather information about malware. But let’s consider some
            logical questions:



            - What if the attacker adds a null byte to the hash?

            - What if the attacker uses Fast Flux or Domain Generation Algorithms (DGA)?


            - What if the attacker copies another group’s TTPs or creates a new technique?



            The Pyramid of Threat Actor Profiling is a modern cybersecurity framework designed to offer a behavioral
            approach to understanding and addressing cyber threats. Unlike traditional models like the Pyramid of
            Pain, which focuses on Indicators of Compromise (IOCs) and TTPs that attackers can easily change,
            the Pyramid of Threat Actor Profiling goes deeper by examining who the attacker is, why they act, and
            how they carry out their attacks.



            The Pyramid of Threat Profiling Framework:

            - Who: Identifies the threat actor or group behind an attack.

            - Why: Understands the threat actor’s goal.








            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          323
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   318   319   320   321   322   323   324   325   326   327   328