In this module

OD1.9 Team Structures and Attacker Roles

6-8 hours · Module 1 · Free
What you already know

You've read incident reports attributing attacks to named groups — "LockBit," "Scattered Spider," "Volt Typhoon." This sub reveals that the "group" label often obscures a supply chain of independent actors with different skills, different tools, and different operational profiles. Understanding the team structure changes how you investigate, how you assess the threat, and how you scope the damage.

Operational Objective

During an investigation, you notice a skill discontinuity: sophisticated initial access followed by crude post-exploitation. You're not looking at one inconsistent attacker. You're looking at a handoff between a skilled access broker and a less-skilled affiliate who purchased their work. The broker may have sold access to fifty other organisations using the same method. Your incident isn't isolated — it's one sale in a marketplace.

Understanding attacker team structures tells you how many actors are involved, where the handoff happened, and what that means for your threat assessment and investigation scope.

Learning Objectives

By the end of this sub you will be able to:

  • Identify the handoff signature — the skill discontinuity between attack phases that indicates multiple independent actors — in investigation telemetry. The LockBit ecosystem's separation between IABs (initial access brokers) and affiliates produces exactly this signature: high-skill access establishment followed by variable-skill post-exploitation. This matters because identifying a handoff expands your investigation scope — the broker's access method may be active against other accounts in your environment, and the broker may have sold access to other organisations.
  • Classify the attacker team structure (supply-chain criminal, unified state team, lone insider, recruited insider) from tradecraft consistency across campaign phases. This matters because the structure predicts the threat profile: a unified team has consistent capability throughout; a supply-chain operation has variable capability and the broker's initial access method is the shared vulnerability across all their customers.
  • Use AI to detect handoff signatures by comparing tooling, skill level, temporal gaps, and operational security across investigation phases. This matters because handoff detection requires comparing tradecraft across dozens of events — AI accelerates the comparison from hours to minutes during time-critical investigations.
CYBERCRIME SUPPLY CHAIN — ROLE MAP
IAB (ACCESS BROKER)
High skill, low noise
Establishes access, sells on marketplace, moves on
Indicator: dormant persistence
AFFILIATE (EXECUTOR)
Variable skill, high noise
Buys access, deploys ransomware/exfiltrates
Indicator: crude post-exploitation
RaaS OPERATOR (PLATFORM)
High skill, never touches the target
Builds ransomware, manages leak site, provides support
STATE TEAM (UNIFIED)
High skill, consistent tradecraft
Coordinated under unified command, not marketplace
Criminal = supply chain (skill discontinuity). State = unified team (tradecraft consistency).

Figure OD1.9 — The cybercrime supply chain. Multiple independent actors, each specialised in one phase. The handoff between them produces a detectable skill discontinuity in your investigation telemetry.


Cybercrime is a supply chain, not a single actor

The attacker who compromised your VPN credentials is probably not the same person who deployed the ransomware. They've never met.

Modern cybercrime involves multiple independent actors connected by criminal marketplaces. The access broker compromises your VPN, verifies the access works, lists it for sale with your industry, revenue, endpoint count, and security stack. The affiliate purchases the listing and executes their objective. The RaaS operator built the platform and manages the leak site. None of them work for the same organization.

Understanding this changes your investigation. If you see a skill discontinuity — sophisticated initial access followed by crude post-exploitation — that's not one inconsistent attacker. It's a handoff. The broker may have sold access to fifty other organizations. Your incident is one sale in a marketplace.

The access broker economy

IABs are the upstream providers. Their business model is volume: compromise as many organizations as possible, establish persistent access, sell it.

IABs specialize in initial access — phishing, vulnerability exploitation, credential stuffing, VPN/RDP compromise. Their capability is generally high. Once access is established, they create a marketplace listing. A typical listing on a criminal forum looks like this:

Typical IAB marketplace listing:

[SELL] US | Engineering company | $35B revenue | 865 endpoints
Access type: Domain user VPN credentials (Cisco AnyConnect)
Domain: northgateeng.com
Security: CrowdStrike Falcon on endpoints, Microsoft Sentinel SIEM
Notes: VPN does not require MFA on legacy client. Tested 04/15.
       Access verified clean — no IR activity observed.
Price: $5,000

The listing includes your industry, revenue, endpoint count, access type, and security stack — everything a buyer needs to assess the opportunity and plan their post-exploitation. The "security" field is the most operationally dangerous: the buyer knows your EDR and SIEM before they've touched your environment, so they can pre-test their tools against your exact stack.

The IAB then moves on. They don't deploy ransomware, steal data, or conduct post-exploitation beyond what's needed for the listing. Their profile is distinctive: sophisticated initial access, minimal post-compromise activity, then silence. The access sits dormant until a buyer activates it — which may be days, weeks, or months later.

You can detect dormant broker access by querying for accounts or persistence mechanisms that were established and then went silent:

// Detect dormant VPN accounts — authenticated once, then silent
SigninLogs
| where TimeGenerated > ago(90d)
| where AppDisplayName has "VPN" or AppDisplayName has "AnyConnect"
    or AppDisplayName has "GlobalProtect"
| summarize
    FirstSeen = min(TimeGenerated),
    LastSeen = max(TimeGenerated),
    AuthCount = count(),
    DistinctIPs = dcount(IPAddress)
    by UserPrincipalName
| where AuthCount <= 3 and datetime_diff('day', now(), LastSeen) > 14
| order by LastSeen asc
// Accounts that authenticated 1-3 times via VPN more than 14 days ago
// and haven't returned — potential broker access waiting for a buyer.

Defensive translation: dormant persistence — a web shell with no recent callbacks, a VPN account with minimal activity then silence, a scheduled task that was created but never executed — may be broker-established access waiting for a buyer. The dormancy is the indicator. Run the query above weekly.

The affiliate — variable skill, high noise

The execution layer. Skill varies from sophisticated operators to beginners following step-by-step RaaS documentation.

Low-skill affiliates copy commands from documentation (sometimes with the documentation's example hostnames still in the command), use default tool configurations, and don't adapt when blocked. They're actually more dangerous in one sense: they're less predictable. A skilled attacker follows logical operational flow. A low-skill attacker runs commands out of order because they're following a generic playbook rather than adapting to what they find.

The handoff signature

The skill discontinuity between phases that tells you multiple actors are involved.

Phase 1 (broker): Three weeks before the ransomware, someone compromised a VPN account using breached credentials. One authentication, one persistence mechanism, zero noise. Clean and professional.

Phase 2 (affiliate): Three weeks later, a different actor logs in via the VPN. Within two hours: BloodHound with default settings (SharpHound visible in Sysmon), LSASS dump using comsvcs.dll (exact command from a public blog post), PsExec lateral movement to six systems simultaneously (three failed). Noisy, scripted, crude.

The skill discontinuity is stark. Phase 1 was professional. Phase 2 was copy-paste. If you assess the threat based only on Phase 2, you conclude "low-skill attacker." If you identify the handoff, you realize the initial access was conducted by a high-capability broker who may have sold access to other organizations — and whose credential-stuffing method might be active against other accounts in your environment.

State-sponsored team structures

Coordinated under unified command. Same coding style, same operational tempo, same infrastructure patterns from initial access through objective execution.

State programs have separate teams for access development (researching and weaponizing vulnerabilities), initial operations (establishing access in target networks), sustained operations (conducting intelligence collection over months), infrastructure management (maintaining C2, proxy chains, and exfiltration channels), and intelligence analysis (processing collected data into finished intelligence products).

The coordination means campaigns show consistency across phases — unlike the criminal supply chain's skill discontinuities. Here's the telltale comparison during an investigation:

Criminal supply chain (handoff visible):

Phase 1 evidence (broker):
  - Custom exploit against Citrix CVE (not publicly known at time)
  - Single authentication, single web shell, zero noise
  - 5-week silence

Phase 2 evidence (affiliate):
  - AsyncRAT deployed via web shell (free, publicly available)
  - SharpHound with default collection method
  - Mimikatz with default arguments (sekurlsa::logonpasswords)
  - PsExec to 6 systems simultaneously, 3 failed
  → SKILL DISCONTINUITY: sophisticated access, crude post-exploitation.
    Two different actors.

State-sponsored team (unified):

Phase 1 evidence:
  - Custom implant with novel communication protocol
  - Careful staging: 12-day dormancy before first C2 callback
  - Certificate pinning in the implant binary

Phase 2 evidence:
  - Same communication protocol for lateral movement tool
  - Same coding patterns (custom string obfuscation, same compiler)
  - Same operational tempo (one action per day, business hours only)
  - Same infrastructure pattern (CDN-fronted, same domain registrar)
  → CONSISTENT TRADECRAFT: same team, same tools, same doctrine
    throughout. Unified command structure.

Defensive translation: consistency in tradecraft across phases = unified team (state-sponsored or well-resourced corporate espionage). Discontinuity = supply-chain model (criminal). This affects your threat assessment: a unified team has consistent capability throughout — if the initial access was sophisticated, expect the post-exploitation to be equally sophisticated. You won't catch them with commodity-tool detection rules. A supply-chain operation has variable capability — the affiliate may be catchable even if the broker wasn't.

Insider threat structures

Lone insider. Uses legitimate access for unauthorized purposes. No external tools, no C2. Detection is anomalous data handling — unusual volume, destinations, timing — not technique signatures.

Recruited insider. External handler provides instructions and possibly tools. Mix of handler's tradecraft (external communication channels) + insider's legitimate access. The combination is the detection surface.

Compromised insider. Stolen credentials without the employee's knowledge. Same profile as an external attacker with stolen credentials. Unfamiliar device + legitimate credentials + unusual behavior = compromised account.

STEP 1 — Select a report with a detailed timeline
   The report must describe multiple phases of attacker activity
   (initial access through objective execution) with enough detail
   to assess tooling, timing, and operational security at each phase.

STEP 2 — Assess tradecraft consistency across phases
   For each phase of the attack, note:
   a. Tools used (commodity/custom, which specific tools)
   b. Skill indicators (command accuracy, adaptation when blocked,
      OPSEC discipline)
   c. Timing (pace between events, time of day)
   d. Operational security (evidence cleanup, stealth effort)

STEP 3 — Look for discontinuities
   Compare your Phase 1 assessment to Phase 2, Phase 2 to Phase 3,
   etc. Look for:
   - Tool changes (different C2 framework, different discovery tools)
   - Skill drops (sophisticated access → crude post-exploitation)
   - Temporal gaps (days/weeks of silence between phases)
   - OPSEC changes (careful → careless, or vice versa)

STEP 4 — Classify
   Single actor: consistent tradecraft throughout.
   Multiple actors (handoff): skill discontinuity at a specific point.
   If multiple: identify the handoff point and classify each actor
   (IAB, affiliate, state team, insider).

STEP 5 — AI validation
   Paste the event timeline into Claude:

   "Analyse this timeline for evidence of actor handoff:
    [paste chronological events with tools, techniques, timing]

    1. Is tooling consistent across phases or does it change?
    2. Does skill level remain consistent or shift?
    3. Are there temporal gaps indicating access sale/transfer?
    4. Does operational tempo change between phases?
    5. Single actor or multiple? Where is the handoff?"

Hands-on Exercise — Handoff Identification

Objective: Identify whether an incident involved a single actor or multiple actors by analyzing tradecraft consistency across phases.

Prerequisites: A detailed published incident report with a full timeline. Mandiant M-Trends case studies, CrowdStrike reports, or CISA advisories with technical detail work well.

Success criteria: You've assessed tradecraft consistency across at least 3 phases, identified whether a handoff occurred, and classified the actor(s) involved.

Challenge: If you identified a handoff, assess what the broker's initial access method reveals about broader organizational risk. If the broker used credential stuffing from breach data, are other accounts in the organization vulnerable to the same method? If they exploited a specific CVE, is that vulnerability present elsewhere? The broker's method is the shared risk across all their customers.


Next
OD1.10 — Documented Campaigns: Ransomware Operations. A phase-by-phase analysis of composite ransomware campaigns — with detection opportunities mapped at each stage and the operational decisions that make ransomware the fastest-moving and most predictable campaign type.
Checkpoint — before moving on

You should be able to do the following without referring back to this sub. If you can't, the sections to re-read are noted.

1. Identify the handoff signature in investigation telemetry and explain what skill discontinuity between phases reveals about the number and type of actors involved. (§ The handoff signature)
2. Classify the attacker team structure (criminal supply chain vs unified state team) from tradecraft consistency and explain how the classification changes your threat assessment. (§ State-sponsored team structures)
3. Explain why identifying a handoff expands the investigation scope beyond your own organization — specifically, what the broker's initial access method means for other potential victims. (§ The access broker economy)

You're reading the free modules of offensive-security-for-defenders

The full course continues with advanced topics, production detection rules, worked investigation scenarios, and deployable artifacts.

View Pricing See Full Syllabus