Cybersecurity 101 Categories
What is a cyber kill chain attack?
A cyber kill chain attack refers to a framework that breaks down the stages of a cyberattack-from the initial planning to the execution and completion of malicious goals. It’s a model originally developed by Lockheed Martin to help organizations understand, detect, and defend against advanced persistent threats (APTs). The model helps security teams identify opportunities to detect and disrupt an attack at every stage. By recognizing the signs of a kill chain in progress, like suspicious network traffic or unauthorized access attempts, organizations can stop attackers before they reach their final objective.
What are the 7 stages of a cyber kill chain attack?
The 7 stages of a cyber kill chain attack are:
- Reconnaissance – Attacker researches the target (domains, employees, infrastructure, vulnerabilities).
- Weaponization – Attacker builds a tailored payload (malware, exploit) and pairs it with a delivery method.
- Delivery – The payload is sent to the target (phishing email, malicious link, USB, etc.).
- Exploitation – The delivered exploit runs, taking advantage of a vulnerability to execute code.
- Installation – Malware installs and establishes persistence on the victim system.
- Command & Control (C2) – Compromised hosts connect to attacker-controlled servers to receive instructions.
- Actions on Objectives – Attacker carries out their goal (data exfiltration, lateral movement, ransomware, disruption, etc.).
What is the difference between MITRE ATT&CK and Cyber Kill Chain?
The MITRE ATT&CK framework and the Cyber Kill Chain are both models used to understand and defend against cyberattacks – but they differ in scope, purpose, and level of detail.
Here’s a clear comparison:
- Purpose and Focus
- Cyber Kill Chain:
- Developed by Lockheed Martin, it focuses on the lifecycle of an external attack – showing how an adversary progresses from reconnaissance to achieving their goal.
- It’s mainly a defensive model for identifying and interrupting attacks at specific stages.
- MITRE ATT&CK:
- Created by MITRE Corporation, it catalogs real-world adversary behaviors after they’ve gained access.
- It’s a behavioral framework used to analyze, detect, and respond to specific tactics and techniques used by attackers.
- Cyber Kill Chain:
- Level of Detail
- Cyber Kill Chain:
- High-level and linear – 7 broad stages (Reconnaissance → Actions on Objectives).
- Useful for understanding the big picture of how attacks unfold.
- MITRE ATT&CK:
- Extremely granular – includes 14 tactics (like Initial Access, Privilege Escalation, Exfiltration) and hundreds of techniques/sub-techniques used by attackers.
- Helps analysts pinpoint exactly what attackers are doing and how to detect or mitigate each step.
- Cyber Kill Chain:
- Scope of Application
- Cyber Kill Chain:
- Primarily describes external, network-based intrusions.
- Strong in traditional perimeter defense and intrusion prevention.
- MITRE ATT&CK:
- Covers all phases of an attack, including post-compromise activities (like lateral movement or persistence).
- More suitable for modern endpoint detection and response (EDR) and threat hunting.
- Cyber Kill Chain:
Cyber Kill Chain = Strategic overview of attack progression (good for training & prevention).
MITRE ATT&CK = Tactical breakdown of attacker behaviors (good for detection & response).
Is the cyber kill chain still used?
Yes – the Cyber Kill Chain is still used today, but it’s often combined with or supplemented by newer, more detailed frameworks like MITRE ATT&CK and the Unified Kill Chain. Here’s how it fits into modern cybersecurity practice:
- Still Relevant as a Foundational Model
- The Cyber Kill Chain, developed by Lockheed Martin in 2011, remains valuable for understanding the overall structure of a cyberattack.
- It’s especially useful for:
- Training and awareness – teaching security teams and executives how attacks unfold.
- Threat modeling – mapping out where controls exist (or should exist) to break the chain.
- Incident response playbooks – guiding defenders to look for early warning signs.
- It’s especially useful for:
- Even though cyberattacks have evolved, the concept of stopping the attack at any stage of the chain continues to be a strong defense philosophy.
- The Cyber Kill Chain, developed by Lockheed Martin in 2011, remains valuable for understanding the overall structure of a cyberattack.
- Limitations in Modern Environments
- However, traditional Cyber Kill Chain has some gaps:
- It focuses mostly on external, perimeter-based attacks.
- It doesn’t address insider threats, cloud environments, or post-compromise behavior very well.
- It assumes a mostly linear progression, while modern attacks can loop or skip stages.
- This is why frameworks like MITRE ATT&CK (for detailed adversary behaviors) and the Unified Kill Chain (which merges Lockheed Martin’s model with MITRE ATT&CK and others) are often preferred for deeper operational use.
- However, traditional Cyber Kill Chain has some gaps:
- How It’s Used Today
In short:
Still used – as a conceptual and educational framework. But not sufficient on its own – modern defense relies on extended models like MITRE ATT&CK, NIST, and Unified Kill Chain for a full picture.