What is the Cyber Kill Chain?


What is the Cyber Kill Chain in cyber security?

Investing in cybersecurity analysis and strategy has never been more important in an era of rampant ransomware and other malicious cyberattacks.

The Cyber Kill Chain Explained

The cyber kill chain model is an adaptive, step-by-step process that helps organizations track, understand, anticipate, and stop cyber threats of all types. The term “cyber kill chain” comes from the military term “kill chain,” which refers to a series of stages or steps to prepare, attack, and destroy targets.

Two models, the Cyber Kill Chain (CKC) and the MITRE ATT&CK framework, can help security professionals harden network resources and protect against modern-day threats and attacks.

The CKC, developed by Lockheed Martin over a decade ago, provides a high-level view of a cyberattack’s sequence from initial reconnaissance through weaponization and action. While it is widely used by security teams, it has limitations. For example, host attack behaviors are not included in the model, and attackers may bypass or combine multiple steps.

The newer MITRE ATT&CK framework maps closely to the CKC but focuses more on cyber resilience to withstand emergent threats. This open-source project also provides substantial support for tracing host attack behaviors. The differences between the 2 models can have an outsized impact on the efficacy and resilience of the resulting security analysis and strategies.

The differences between the 2 models can have an outsized impact on the efficacy and resilience of the resulting security analysis and strategies. 


The Cyber Kill Chain typically consists of the following stages:

  1. Reconnaissance: Gathering information about the target. Vulnerabilities, email addresses, and other details are identified.

2. Weaponization: Creating or obtaining a malicious payload. A payload, such as a phishing email or other exploit, is constructed.

3. Delivery: Transmitting the payload to the target. The payload is delivered to targets identified during reconnaissance.

4. Exploitation: Taking advantage of vulnerabilities to execute the payload. Vulnerable devices or users inadvertently execute the payload.

5. Installation: An attack vector is installed on the victim’s system, and malicious software is installed to continue the attack’s execution.

6. Command & Control (C2): Establishing communication with the compromised system. The malware sends covert communications to the C&C servers, allowing the attacker to control compromised assets.

7. Actions on Objectives: The malicious software achieves the attacker’s ultimate goal by carrying out further actions via the C&C servers per the attacker’s instruction.

Photo by Aida L on Unsplash

These 7 phases abstract and simplify attack behaviors, allowing security teams to categorize them by stages rather than analyzing and defending against individual behaviors.

A typical process for analyzing and mitigating attacks under the CKC model includes the following:

Mapping attack behaviors into kill chain stages and understanding the behaviors based on descriptions of the stages

Initiating detection and mitigation strategy for the attack behaviors as suggested by the corresponding kill chain stages

Prioritizing execution via detection and mitigation tasks. Prioritizing is crucial because security team resources are often limited.

The Value of Prevention

When performing security tasks, it is important to remember that prevention is better than detection. A prevention strategy aims to completely nullify an attack so that no residual damage is done to the systems and no cleanup is required. However, prevention is only possible under certain early-stage scenarios, such as during reconnaissance, delivery, and exploitation. At the installation and C&C stages, malware has already caused permanent modifications to systems, so prevention is no longer possible.


Thank you for visiting my blog.

Follow me on Medium and check out my website for more content about CTFs, Ethical Hacking, Cybersecurity, and more.

Related Article-

Mitigating Malware

Similar Posts

  • EU Dora & How to be Compliant

    This is how to comply with the new EU regulation. Digital Operational Resilience Act  The Digital Operational Resilience Act (DORA) is an EU regulation that entered into force on 16 January 2023 and will apply as of 17 January 2025. Who Does DORA Apply To? DORA applies to Europe’s 22,000 financial entities and the ICT…

  • Digital Signature Using SHA-256 with RSA Encryption.

    Digital signatures are crucial in cryptography to ensure secure communication and data integrity. But how exactly do they work? A digital signature, implemented using SHA-256 with RSA encryption, is a secure method for verifying the authenticity and integrity of data. Here’s a detailed breakdown of how it works: Step1. Process Overview: Hashing with SHA-256: The…

  • Objectives of Cyber Threat Intelligence

    A quick Google search for an answer will return many variations. Some will make sense to you, and some will not.

    Cyber threat intelligence (CTI) is gathering information from various sources about current or potential threats to an organization. That’s a simple and short definition for now, you would think.

    I will explore this question in more detail in this article and hope to help you better understand and define it.

    What is Cyber Threat Intelligence (CTI)?
    Most of the people you meet will not know what CTI is, and that’s because, unfortunately, there is no single answer. In other words, CTI means many different things to many different people. Some would define it as a “Data Feed of Indicators of Compromise (IOC).” Some would say that CTI is a systematic analysis structure of the threat.

  • Caido – A lightweight web security auditing toolkit

    Caido – A lightweight web security auditing toolkit Caido is a new lightweight web security auditing toolkit designed to make professional-grade security testing more accessible. Since it provides a free version, it is perfect for new beginners or security students. However, it has some limitations, up to two scopes. The passionate team’s goal behind this…