Cyber Kill Chain
“Kill chain” was originally used as a military concept related to the structure of an attack.
Many moons ago Lockheed-Martin popularize the concept of the Cyber Kill Chain® framework as threat assessment model and prevention tool:
Stage | Cyber Kill Chain® | mnemonic | Notes | Mitigation |
---|---|---|---|---|
1 | Reconnaissance | Really | Gather information before the actual attack | Prevent attacker to gather information |
2 | Weaponization | Why | Preparing the attack tailored for the victim | Have security posture put in place in optimum level |
3 | Delivery | Does | Transmisiton of the weapon | Put in place various layer of protection |
4 | Exploitation | Everyone | Trigger the exploit | Always has the latest security update & extra layer of security, i.e. AV, NG-AV, HIDS, etc. |
5 | Installation | Involve | Install backdoor | Tripwire or some sort |
6 | Commmand & Control (C2) | Corruption | Communicate with attacker | Proper network analysist to block C2, network analitics, ex: ExtraHop |
7 | Actions objectives (AoO) | Always | Objective achieved & extrafiltration or data destruction | Pray, Legal & Insurance :-B |
On each stage, the blue team should put actions to:
- Detect
- Deny: prevent information disclosure,
- Disrupt
- Degrade
- Deceive
- Contain
the attacks.
MITRE maintains a kill chain framework expanding the Lockheed-Martin’s concept of Cyber Kill Chain®: MITRE ATT&CK® is an awesome website with free information for all.