What is a Cyber Kill Chain Attack?


What is a cyber kill chain attack?

A cyber kill chain attack refers to a framework that breaks down the stages of a cyberattack-from the initial planning to the execution and completion of malicious goals. It’s a model originally developed by Lockheed Martin to help organizations understand, detect, and defend against advanced persistent threats (APTs). The model helps security teams identify opportunities to detect and disrupt an attack at every stage. By recognizing the signs of a kill chain in progress, like suspicious network traffic or unauthorized access attempts, organizations can stop attackers before they reach their final objective.

What are the 7 stages of a cyber kill chain attack?

The 7 stages of a cyber kill chain attack are:

  1. Reconnaissance – Attacker researches the target (domains, employees, infrastructure, vulnerabilities).
  2. Weaponization – Attacker builds a tailored payload (malware, exploit) and pairs it with a delivery method.
  3. Delivery – The payload is sent to the target (phishing email, malicious link, USB, etc.).
  4. Exploitation – The delivered exploit runs, taking advantage of a vulnerability to execute code.
  5. InstallationMalware installs and establishes persistence on the victim system.
  6. Command & Control (C2) – Compromised hosts connect to attacker-controlled servers to receive instructions.
  7. Actions on Objectives – Attacker carries out their goal (data exfiltration, lateral movement, ransomware, disruption, etc.).

What is the difference between MITRE ATT&CK and Cyber Kill Chain?

The MITRE ATT&CK framework and the Cyber Kill Chain are both models used to understand and defend against cyberattacks – but they differ in scope, purpose, and level of detail.

Here’s a clear comparison:

  • Purpose and Focus
    • Cyber Kill Chain:

      • Developed by Lockheed Martin, it focuses on the lifecycle of an external attack – showing how an adversary progresses from reconnaissance to achieving their goal.
      • It’s mainly a defensive model for identifying and interrupting attacks at specific stages.
    • MITRE ATT&CK:
      • 
Created by MITRE Corporation, it catalogs real-world adversary behaviors after they’ve gained access.
      • It’s a behavioral framework used to analyze, detect, and respond to specific tactics and techniques used by attackers.
  • Level of Detail
    • Cyber Kill Chain:

      • High-level and linear – 7 broad stages (Reconnaissance → Actions on Objectives).
      • Useful for understanding the big picture of how attacks unfold.
    • MITRE ATT&CK:

      • Extremely granular – includes 14 tactics (like Initial Access, Privilege Escalation, Exfiltration) and hundreds of techniques/sub-techniques used by attackers.
      • Helps analysts pinpoint exactly what attackers are doing and how to detect or mitigate each step.
  • Scope of Application
    • Cyber Kill Chain:

      • Primarily describes external, network-based intrusions.
      • Strong in traditional perimeter defense and intrusion prevention.
    • MITRE ATT&CK:
      • Covers all phases of an attack, including post-compromise activities (like lateral movement or persistence).
      • More suitable for modern endpoint detection and response (EDR) and threat hunting.

 

Cyber Kill Chain = Strategic overview of attack progression (good for training & prevention).

MITRE ATT&CK = Tactical breakdown of attacker behaviors (good for detection & response).

Is the cyber kill chain still used?

Yes – the Cyber Kill Chain is still used today, but it’s often combined with or supplemented by newer, more detailed frameworks like MITRE ATT&CK and the Unified Kill Chain. Here’s how it fits into modern cybersecurity practice:

  1. Still Relevant as a Foundational Model
    1. The Cyber Kill Chain, developed by Lockheed Martin in 2011, remains valuable for understanding the overall structure of a cyberattack.
      1. It’s especially useful for:
        1. Training and awareness – teaching security teams and executives how attacks unfold.
        2. Threat modeling – mapping out where controls exist (or should exist) to break the chain.
        3. Incident response playbooks – guiding defenders to look for early warning signs.
    2. Even though cyberattacks have evolved, the concept of stopping the attack at any stage of the chain continues to be a strong defense philosophy.
  2. Limitations in Modern Environments
    1. However, traditional Cyber Kill Chain has some gaps:
      1. It focuses mostly on external, perimeter-based attacks.
      2. It doesn’t address insider threats, cloud environments, or post-compromise behavior very well.
      3. It assumes a mostly linear progression, while modern attacks can loop or skip stages.
    2. This is why frameworks like MITRE ATT&CK (for detailed adversary behaviors) and the Unified Kill Chain (which merges Lockheed Martin’s model with MITRE ATT&CK and others) are often preferred for deeper operational use.
  3. How It’s Used Today
    1. Security Operations Centers (SOCs) may still use it to categorize alerts or incidents.
    2. CISOs and analysts use it as a strategic overview tool to brief executives or guide investment in defense-in-depth strategies.
    3. Training programs often start with it before moving into ATT&CK or NIST-based models.

In short:

Still used – as a conceptual and educational framework.
But not sufficient on its own – modern defense relies on extended models like MITRE ATT&CK, NIST, and Unified Kill Chain for a full picture.