Blog / Framework & Concepts / New in V2.0

The Topology of Cyber Attacks: Why Some Threat Clusters Are Fundamentally Different

Bridge Clusters, Domain Boundaries, and the Architecture of Modern Cyber Defense.

BK
Bernhard Kreinz
16 min read
Executive Summary

This article introduces a critical distinction in the TLCTC framework that will be formally integrated in Version 2.0. We invite community feedback before final publication.

In analyzing attack patterns through the TLCTC framework, a striking structural pattern emerges: certain threat clusters (#8 Physical Attack, #9 Social Engineering, #10 Supply Chain Attack) function fundamentally differently than others. They don't just exploit different vulnerabilities—they cross domain boundaries, moving attacks from one responsibility sphere to another where different control regimes apply.

Critical Clarification

The bridge/internal distinction does not change the 10 clusters or introduce new threat types. It is an orthogonal classification that describes how and where a cluster operates in relation to domain boundaries and responsibility spheres. The clusters themselves remain unchanged; what changes is our understanding of how they enable attacks to bypass entire categories of controls.

Understanding which clusters cross boundaries versus which operate within domains transforms how we architect defense, allocate resources, and calculate risk. Without this distinction, risk registers systematically underestimate threats that render domain-specific defenses irrelevant in a single step.

Key Insight: Bridge clusters don't defeat your controls—they move the attack to a domain where those controls don't apply.

Core Framework Definitions (V2.0)

Before proceeding, we must establish precise terminology:

  • Domain: A set of assets governed by a coherent control regime (e.g., "IT/cyber domain", "physical security domain", "vendor development environment", "human decision domain").
  • Responsibility Sphere: The organizational owner of a domain, typically denoted as @Entity (e.g., @Org, @Vendor, @Facilities, @HR). Different spheres have different policies, teams, and legal boundaries.
  • Domain Boundary: A point where responsibility spheres or control regimes change. Crossing this boundary means the attack moves from one set of applicable controls to a different set (e.g., from @Vendor to @Org, or from physical security controls to IT security controls).
  • Bridge Cluster: A threat cluster that enables attacks to cross domain boundaries, transitioning from one responsibility sphere or control regime to another.
  • Internal Cluster: A threat cluster that operates within a single domain's trust model and control regime, exploiting vulnerabilities in that domain's implementation without crossing to a different governance structure.

Throughout this article, when we say a cluster is a "bridge," we mean: this step crosses a domain boundary (in the above sense).

The Problem: When Technical Excellence Fails

Consider three real-world scenarios:

Scenario 1: The Unbreachable Network

Your organization has achieved security excellence: Zero-trust architecture ✓, EDR on all endpoints ✓, SIEM with 24/7 SOC ✓, Patch compliance 99.8% ✓, Penetration tests: zero critical findings ✓

Result: An attacker calls your CFO impersonating the CEO, requesting an urgent wire transfer. $2.3M lost.
Attack Path: #9 →[Δt=15m] [Business Impact]

Scenario 2: The Perfect Supply Chain Audit

Your vendor passed: SOC 2 Type II ✓, ISO 27001 certified ✓, Annual penetration tests ✓, Source code review: zero high-severity findings ✓

Result: The vendor's build server was compromised 18 months ago. Their signed update contained a backdoor. You deployed it automatically.
Attack Path (complete): #2 →[Δt=2d] #7 →[Δt=3w] #4 →[Δt=1d] #1 →[Δt=4d] #10 ||[dev][@Vendor→@Org]|| →[Δt=0s] #7

Scenario 3: The Physical Reality

Your infrastructure is hardened: Network segmentation ✓, MFA everywhere ✓, Application whitelisting ✓, No internet on critical systems ✓

Result: A contractor with a badge plugged a USB device into an industrial controller during a maintenance window.
Attack Path: #8 →[Δt=instant] #7

What These Incidents Have in Common

In each case, the attacker didn't defeat your cybersecurity controls—they circumvented them entirely by attacking from a different domain.

  • Your firewall is irrelevant if the attacker crosses via the human domain (#9).
  • Your code review is pointless if the attack crosses via a compromised vendor domain (#10).
  • Your network security doesn't apply if the attacker crosses via physical access (#8).

This isn't control failure—it's domain mismatch.

The Core Concept: Bridge vs. Internal Clusters

The TLCTC framework categorizes threats by the generic vulnerability they exploit (Axiom I). The bridge/internal distinction adds a second dimension: does this cluster enable crossing domain boundaries, or does it operate within a single domain?

Cluster Boundary Crossed Trust Dimension Violated Domain Transition
#9 Social Engineering Human psychological trust → System logical trust Human domain → IT domain [human] → [cyber]
#10 Supply Chain Attack External vendor domain → Internal organization domain Third-party sphere → First-party sphere [@Vendor] → [@Org]
#8 Physical Attack Physical access → Logical access Physical security domain → Cybersecurity domain [physical] → [cyber]

The Seven Internal Clusters

  • #1 Abuse of Functions: Software Functional Scope
  • #2 Server Exploits: Server-side Code Implementation
  • #3 Client Exploits: Client-side Code Implementation
  • #4 Identity Theft: Access Control / Credentials
  • #5 Man in the Middle: Communication Channel
  • #6 Flooding Attack: System Resources / Capacity
  • #7 Malware: Execution Environment

Why #5 Is Not a Bridge Cluster

A careful reader might ask: "If #5 sits in the middle of communication between two entities, why isn't that a bridge?"

Answer: #5 MitM stays inside the same communications/protocol domain (e.g., one TCP session, one VPN tunnel, one internal network segment). It operates within an existing communication channel's trust model, exploiting the lack of end-to-end protection within that domain.

In contrast, #8 / #9 / #10 cross into different control regimes with:

  • Different organizational teams
  • Different policy sets
  • Different governance structures
  • Sometimes different legal entities

#5 might intercept traffic between @Org-Finance and @Org-IT, but both remain within @Org's domain and control regime. #10, by contrast, moves from @Vendor's domain (where your controls don't apply) to @Org's domain (where they do). That's why #5 remains an internal cluster.

The Special Case?: #4 Identity Theft

#4 Identity Theft occupies a unique position in the credential lifecycle. Credential acquisition is always a consequence of another cluster (Loss of Confidentiality on credentials), whereas the subsequent use of any credential to impersonate an identity always maps to #4 Identity Theft and typically realizes the Loss of Control event. Within the identity domain, #4 is the pivot between “proving you possess a credential” and “using that credential to exercise privileges”, but it remains an internal cluster, not a bridge across responsibility spheres.

Deep Dive: The Three Bridge Clusters

#9 Social Engineering: The Human-to-System Bridge

Generic Vulnerability (Axiom I): Human psychological factors: gullibility, trust, ignorance, fear, urgency, authority bias, curiosity.

The Boundary Violation: #9 transforms a human decision (made in the psychological trust domain) into a system-level action (executed in the technical domain). The attack uses the authorized human as an unwitting proxy.

HUMAN DOMAIN (Psychological Trust) Control Regime: Training, policies, culture #9 BRIDGE TRANSITION CYBER DOMAIN (Technical Controls) Control Regime: Firewall, EDR, ACLs (Bypassed)
Figure 1: #9 allows attackers to bypass technical controls by exploiting the authorized human proxy.
Attack Path Examples
#9 →[Δt=2h] #4       // Phishing form → credential use
#9 →[Δt=5m] #7       // Malicious attachment → malware execution  
#9 →[Δt=instant] #1  // Tricked admin → config change

Control Paradigm Shift Required: Human-layer defenses (training, simulations, behavioral detection, multi-person authorization) versus technical-layer defenses (firewall, EDR, ACLs).

#10 Supply Chain Attack: The Third-Party-to-First-Party Bridge

Generic Vulnerability (Axiom I): The necessary reliance on, and implicit trust placed in, external suppliers, vendors, components, and their development/distribution processes.

The Boundary Violation: #10 exploits the trust handoff between responsibility spheres. When you integrate third-party code, you import their entire security posture into your trust boundary.

Critical Notation Semantics for V2.0: All exploitation of supply-chain trust occurs within the attacker's current domain (typically the vendor's). The crossing into your domain is expressed via the boundary operator ||, NOT by repositioning #10.

Canonical Pattern
#2 →[Δt=2d] #7 →[Δt=3w] #4 →[Δt=1d] #1 →[Δt=4d] #10 ||[dev][@Vendor→@Org]|| →[Δt=0s] #7

This keeps:

  • #10 = "abuse of trust in 3rd party component/process" (happens at vendor)
  • Boundary operator = "where the trust channel actually crosses spheres"
  • #7 at victim = "your environment's code-execution capability being abused"

Attack Velocity (Δt) Characteristics: #10 attacks have a distinctive bimodal velocity profile: Latent Phase at vendor (Days to months) vs Execution Phase at victim (Instant to seconds).

#8 Physical Attack: The Physical-to-Logical Bridge

Generic Vulnerability (Axiom I): The physical accessibility of hardware, facilities, and communication media (including wireless spectrum), and exploitability of Layer 1 (Physical Layer).

The Boundary Violation: #8 transforms physical access (governed by physical security) into logical access (governed by cybersecurity). Once an attacker has physical access, most cybersecurity controls become advisory rather than mandatory.

PHYSICAL DOMAIN (Physical Security) Control Regime: Badges, guards, locks, cameras #8 BRIDGE TRANSITION CYBER DOMAIN (Cybersecurity Controls) FDE (Boot Access) ❌ | USB Restrictions (BIOS) ❌
Figure 2: Physical access often acts as a bypass for logical controls.

Operational Implications: How Bridge Clusters Change Defense

1. Attack Path Prediction: Statistical Patterns

Observational Note: The following statistics are illustrative based on qualitative analysis of public breach reports. Organizations should conduct sector-specific analysis for precise numbers.

Position in Path Bridge Cluster Frequency Internal Cluster Frequency
Initial Access ~70% ~30%
Mid-Sequence ~10% ~90%
Final Stage ~5% ~95%

2. Defense-in-Depth Architecture

Bridge-Aware Architecture requires defensive capabilities in each domain, not just technical controls in the cyber domain. Bridge clusters exploit the weakest domain.

Human Domain Controls (#9) #9 Bridge Physical Domain Controls (#8) #8 Third-Party Domain Controls (#10) #10 CYBER DOMAIN Technical Controls Internal Clusters #1-#7
Figure 3: Topology-Aware Defense Architecture

Strategic Implications: Risk Assessment Example

Traditional Risk Assessment (Flawed)

ThreatLikelihoodInherent RiskControlsResidual
RansomwareMediumHighEDR, Backups, Seg.Medium

Problem: This assumes ransomware starts via exploits (#2/#3). Real ransomware chains often bypass most technical controls via the #9 bridge.

Bridge-Aware Risk Assessment

Attack Path Initial Vector Controls Effective? True Residual Risk
#9→#7→#4→(#1+#7) #9 Bridge EDR ⚠️ (bypassable), Backups ✓, Network Seg. ✗ High
#10→#7→#4→#1 #10 Bridge EDR ✗ (signed), Backups ✓, Network Seg. ✗ Medium
#2→#7→#4→#1 Internal EDR ✓, Backups ✓, Network Seg. ✓ Low

The Reality: Bridge-enabled paths have higher true residual risk because fewer controls apply to the initial access vector.

Practical Implementation Guide

  1. Audit Current Control Distribution: Map controls to the bridge/internal framework.
    Control: Multi-Factor Authentication
    Primary Cluster: #4 Identity Theft
    Type: Internal
    Effective Against Bridges?:
      - #9: Partially (can be socially engineered)
      - #10: No (trusted supply chain bypasses)
      - #8: No (physical access extracts secrets)
    True Effectiveness: Medium
  2. Implement Cross-Domain Detection: Build correlation rules spanning domains (e.g., Physical Security + SOC).
  3. Measure Bridge-Specific Metrics: Track KPIs for bridge defenses separately from technical defenses (e.g., Phishing click rate vs Mean time to detect #2).

Conclusion: Toward a Topology-Aware Defense

The bridge/internal distinction is not merely academic—it's operational reality reflected in breach statistics. Attacks flow along paths of least resistance across domain boundaries.

When V2.0 formally integrates this concept with Attack Velocity (Δt) and Domain Boundaries (||), the TLCTC framework will provide complete attack topology, temporal analysis, and predictive capability.