User-Based Attacks Toolkit

Resources to help you investigate compromised users in your organization

Whitepaper: User-Based Attacks – The Kill Chain

You need to know how a user-based attack unfolds in order to detect and stop it. This whitepaper maps the entire series of attacker behaviours from compromising user credentials to exfiltrating data, called “the user-based attacks kill chain”. Thwarting an attack at any point along the chain will minimise damage and “kill” the attack.



Webcast: How to Protect Against User-Based Attacks 

Watch this on-demand webinar to hear Rapid7 product managers Christian Kirsch and Lital Asher-Dotan discuss:

  • The narrative of a data breach from the point of view of the attacker with a focus on how they target users
  • The “Kill Chain for User-Based Attacks,” which outlines the steps taken by an attacker
  • An approach for detecting user-based attacks by flagging steps in the kill chain
  • Solutions that speed up the investigation and containment of attacks


Product Download: Rapid7 InsightUBA (formerly UserInsight) Free Tool

Download this free, limited features edition of InsightUBA to try the most effective solution for detecting and investigating user-based attacks at every stage of the kill chain.


Whitepaper: Ten Tips for Detecting Malicious and Compromised Users

Get quick tips on how you can better detect malicious and compromised users across your network, cloud services, and mobile environments.


Research Report: Verizon 2014 Data Breach Investigations Report

The most comprehensive analysis of security breaches and incidents across 27 countries. Read the full report and find out why you should be looking at your users.


According to the Verizon Data Breach Investigations Report (DBIR) of 2014, compromised credentials are now the most commonly-used threat action. Stolen credentials were the most prevalent method for breaking into networks. At the same time, compromising user accounts via phishing and social engineering techniques was the third-most used attacker tool. As user-based attacks are now more common than ever, you must make detecting them a priority today. To help you build a robust user protection plan, we’ve assembled a toolkit for you.

Whiteboard Video: How to Detect Compromised Users: Breaking the User Kill Chain

In this whiteboard video, Lital Asher-Dotan, Senior Product Marketing Manager for UserInsight at Rapid7 will discuss the current chain of events an attacker must take to successfully exfiltrate data from your network.