What is a Cyber Kill Chain?

The cyber kill chain helps understand and predict different stages of a cyberattack. Knowing how hackers work enables a company to select the right tools and strategies to limit breaches, respond to in-progress attacks, and minimize risks.

This article explains the role of cyber kill chains in cybersecurity. We examine every step of an attack and show why kill chains are vital to defense strategies.

What is a Cyber Kill Chain?

A cyber kill chain is a security model that outlines the phases of a cyberattack. A kill chain covers all the stages of a network breach, from early planning and spying to the hacker’s final goal.

Understanding the stages of an attack enables companies to plan the tactics for preventing and detecting malicious intruders. A cyber kill chain helps prepare for all common online threats, including:

Read about the different types of cyberattacks and incorporate them into your kill chain planning.

The term “kill chain” has a military background. The original concept defined the structure of an army operation and included:

Another term for the cyber kill chain is the cyber-attack chain.

7 Stages of a Cyber Kill Chain

The seven phases of the cyber kill chain are the different steps of a successful attack. A security team has a chance to stop attackers at every stage, but a company should ideally identify and stop threats in the first half of the cyber kill chain.

Stages of a cyber kill chain

Stage 1: Reconnaissance

The attacker gathers the necessary information during the reconnaissance step. Hackers select the victim, conduct in-depth research of the company, and look for weak points in the target network.

Learn what vulnerability assessment is and what are the right vulnerability assessment scanning tools to remove weaknesses from your systems.

There are two types of reconnaissance:

During this step, attackers assess the following aspects of a system:

A common tactic during reconnaissance is to gather employee email addresses and social media accounts. This information is useful if the attacker decides to use social engineering to access the network.

Defensive measures for the reconnaissance stage:

Stage 2: Weaponization

The attacker team found a weak point in the system and knows how to create an entry point. The criminal team now designs a virus or a worm to target the weakness. If attackers found a zero-day exploit, they typically work fast before the victim discovers and fixes the vulnerability.

Once malware is ready, hackers typically place malicious software in ordinary documents such as a PDF or an Office file.

Defensive measures for the weaponization stage:

Stage 3: Delivery

Criminals launch the attack into the target environment. The infection methods vary, but the most common techniques are:

The goal of this step is to breach the system and silently establish a foothold. A popular tactic is to launch a simultaneous DDoS attack to distract the defenders and infect the network without alarming security controls.

Defensive measures for the delivery stage:

These 17 penetration testing tools help find and close security gaps before intruders breach the network.

Stage 4: Installation

Malicious software is inside the system, and admins are unaware of the threat. The fourth step of the cyber kill chain is when the malware installs on the network.

Once the malware installs, intruders get access to the network (a.k.a. a backdoor). Now with open access, intruders are free to:

Keeping their presence secret is critical for attackers. Intruders typically wipe files and metadata, overwrite data with false timestamps, and modify documents to remain undetected.

Defensive measures for the installation stage:

Stage 5: Lateral Movement

Intruders move laterally to other systems and accounts on the network. The goal is to gain higher permissions and reach more data. Standard techniques during this stage are:

Defensive measures for the lateral movement stage:

Stage 6: Command and Control (C2)

Complex, APT-level malware requires manual interaction to operate, so attackers need keyboard access to the target environment. The last step before the execution phase is to establish a command-and-control channel (C2) with an external server.

Hackers typically achieve C2 via a beacon over an external network path. Beacons are usually HTTP or HTTPS-based and appear as ordinary traffic due to falsified HTTP headers.

If data exfiltration is the attack’s goal, intruders start placing target data into bundles during the C2 phase. A typical location for data bundles is a part of the network with little to no activity or traffic.

Defensive measures for the command-and-control stage:

Managed Detection and Response (MDR) provides the agility to identify and react to cyber threats in real-time.

Stage 7: Execution

Intruders take action to fulfill the attack’s purpose. Objectives vary, but the most common goals are:

Immediately before an attack starts, intruders cover their tracks by causing chaos across the network. The goal is to confuse and slow down the security and forensics team by:

Some criminals also launch another DDoS attack to distract the security controls while extracting data.

Defensive measures for the execution stage:

Cyber kill chain model

What is an Example of a Cyber Kill Chain?

The cyber kill chain example below shows the different stages at which a security team can detect and prevent a custom ransomware attack:

Read about different types of ransomware and learn why businesses of all sizes need the right ransomware solutions to protect them.

Drawbacks of the Cyber Kill Chain Model

A cyber kill chain is a framework around which a company can design its security tactics and processess. However, kill chains also have several faults worth pointing out.

A Focus on the Perimeter

The original cyber kill chain appeared in a time when most threats came from outside the organization. In today’s security landscape, treating the perimeter as the primary attack surface has two problems:

How to fix this issue: Make a well-rounded kill chain by accounting for dangers both within and outside the perimeter. Set up cloud monitoring to ensure your assets are safe both on-premises and in the cloud.

Our article about cloud monitoring tools presents and compares the top 30 options on the market.

Identifying Threats During the First and Second Phases

Reconnaissance and weaponization stages of a cyber kill chain happen outside of the company’s line of sight. Detecting attacks during these stages is difficult. Even if you do notice strange behavior, determining the extent of the threat is impossible.

How to fix this issue: Do not ignore early signs of a potential attack by treating them as a one-time occurrence. Analyze every activity that appears as active reconnaissance or weapon testing.

Lack of Adaptation

The first cyber kill chain appeared in 2011 when Lockheed-Martin created a security model to defend its network. Since then, both the nature and makeup of cyberattacks have changed significantly, leaving some feeling like kill chains cannot prepare a company for advanced threats.

How to fix this issue: Do not create a cyber kill chain and never update the model. A robust kill chain must evolve to remain effective against the latest threats, especially APTs. As your company grows, revise the chain to account for new attack surfaces and potential dangers.

A Backbone of any Security Strategy

While not a security tool or mechanism, a kill chain helps select the right strategies and technologies to stop attacks at different stages. Use a kill chain as a base for an effective security strategy and continue to grow your company without worrying about costly setbacks.

To further protect your business from cyber threats, read our article about cybersecurity best practices.