ATLAN TEAM
Two models now dominate modern intrusion. The first is the classic approach: deploy implants that beacon to command-and-control (C2) and maintain long-term access. The second is now more common at scale: compromise identity and move laterally through cloud and SaaS without persistent malware. Both models are valid. The difference is who uses them, why, and what defenders should look for.
Model 1: C2 + implants (persistent footholds)
These actors maintain a covert, persistent presence inside target environments by deploying malware implants that communicate with C2 infrastructure. The tradecraft is expensive and risky, but it enables outcomes that identity-only access cannot reliably deliver: long dwell time, custom tasking, and deep operations in segmented or classified networks.
Who uses this model
- State-sponsored and high-end military intelligence operators where strategic persistence is required.
- Advanced Persistent Threat (APT) groups and signals intelligence units.
- Long-term espionage operators tasked with intelligence collection, influence, or sabotage.
Representative entities
- APT29 (SVR)
- APT41
- Lazarus Group
- Equation Group
Why they still use C2
- Long-term access: Maintain presence for months or years without detection.
- Covert lateral movement: Pivot across segmented networks and legacy estates.
- Custom tasking: Exfiltration staging, sabotage, or influence operations.
- Hard targets: Air-gapped, restricted, or classified environments where identity access is limited.
Operational hallmarks
- Beaconing patterns, sleeping implants, and encrypted tasking.
- Malware loaders, staged payloads, and toolchain upgrades.
- Infrastructure rotation, domain fronting, and tradecraft to resist sinkholing.
Model 2: Identity-centric attacks (no persistent C2)
This is now the dominant model for most modern intrusions. The attacker avoids persistent malware and instead compromises identities, tokens, and sessions. The entire intrusion can take place in SaaS and cloud layers without touching traditional endpoint defenses.
Who uses this model
- Financially motivated cybercrime.
- Ransomware operators and initial access brokers.
- Cloud-focused threat actors who target SaaS, email, and identity providers.
Representative entities
- Scattered Spider
- LAPSUS$
- FIN7
- Conti
Identity attack techniques
- MFA fatigue / push bombing: Force a user to approve a repeated MFA prompt.
- OAuth token theft: Steal or abuse access tokens tied to SaaS apps.
- Session replay (pass-the-cookie): Reuse a valid session without re-authentication.
- Password spraying via cloud APIs: Low-and-slow access attempts across tenants.
- Abuse of SSO and delegated access: Consent-based persistence without a password.
Why this model scales
- Low friction: attackers use legitimate authentication paths.
- Lower detection: activity looks like normal user traffic.
- Rapid monetization: access can be sold or weaponized quickly.
- Cloud-first enterprise exposure: the data already sits in SaaS.
Hybrid operators (using both models)
Some mature actors start with identity compromise and deploy implants only if needed. This blends the speed of identity access with the depth of classic persistence.
Who does this
- Elite ransomware groups targeting hybrid estates.
- Nation-states operating in cloud environments.
Pattern
- Identity compromise leads to initial access.
- Cloud and email dominance enables reconnaissance and expansion.
- Optional implant deployment for OT environments, on-prem legacy systems, or destructive payloads.
Example behavior
- Lazarus Group increasingly mixes token theft with traditional malware.
- Cloud access first, payload second.
What this means for defenders
Defensive programs need to model both paths. EDR-heavy environments can still be bypassed if identity monitoring is weak, while identity-only controls fail against determined implant operators in high-value targets.
- For C2-heavy threats: invest in endpoint telemetry, memory inspection, threat hunting, and network-level detections for beaconing and staging.
- For identity-centric threats: prioritize ITDR, token lifecycle controls, conditional access, session binding, and OAuth app governance.
- For hybrid threats: focus on cross-domain correlation between identity events, cloud actions, and endpoint behaviors.
Red team guidance
Modern engagements should simulate both models and measure where the client can and cannot see activity:
- Run identity-first scenarios (token theft, OAuth abuse, session replay).
- Run limited C2 exercises to test endpoint telemetry and response.
- Test the handoff between identity access and implant deployment.
Key takeaways
- Two intrusion models dominate: C2 implants and identity-centric access.
- C2 is expensive but enables long-term, bespoke operations.
- Identity attacks are now the default for scale and monetization.
- Hybrid operators start with identity and deploy implants only when necessary.
- Defenders must build visibility across identity, cloud, and endpoint telemetry.