Cyber Kill Chain
attack lifecycle//stop an attacker from progressing further up the kill chain
Last updated
attack lifecycle//stop an attacker from progressing further up the kill chain
Last updated
The recon
stage is the initial stage
choose target
performs information gathering
passive information gathering
documentation on the target organization's web pages
Job ads
company partners
specific information about antivirus tools, operating systems, and networking technologies
actively scan external web applications and IP addresses
In the weaponize
stage, the malware to be used for initial access is developed and embedded into some type of exploit or deliverable payload.
crafted to be extremely lightweight
undetectable by the antivirus and detection tools.
the sole purpose of this initial stager is to provide remote access to a compromised machine in the target environment
has the capability to persist through machine reboots
ability to deploy additional tools and functionality on demand
In the delivery
stage
exploit or payload is delivered to the victim
phishing emails contain a malicious attachment or a link to a web page.
The web page either containing an exploit or hosting the malicious payload
web page can also mimic a legit website used by the target organization
trick the victim into entering their credentials and collect them
call the victim on the phone with a social engineering pretext in an attempt to convince the victim to run the payload
physical interaction is utilized to deliver the payload via USB tokens
The exploitation
stage
the moment when an exploit or a delivered payload is triggered
attempts to execute code on the target system in order to gain access or control
installation
stage
common techniques used :
Droppers: Attackers may use droppers to deliver malware onto the target system.
A dropper is a small piece of code that is designed to install malware on the system and execute it.
The dropper may be delivered through various means, such as
email attachments
malicious websites
social engineering tactic
Backdoors: A backdoor is a type of malware that is designed to provide the attacker with ongoing access to the compromised system.
The backdoor may be installed by the attacker during the exploitation stage or delivered through a dropper. Once installed, the backdoor can be used to execute further attacks or steal data from the compromised system.
Rootkits: A rootkit is a type of malware that is designed to hide its presence on a compromised system.
Rootkits are often used in the installation stage to evade detection by antivirus software and other security tools. The rootkit may be installed by the attacker during the exploitation stage or delivered through a dropper.
In the command and control
stage
the attacker establishes a remote access capability to the compromised machine.
use a modular initial stager that loads additional scripts 'on-the-fly'.
advanced groups will utilize separate tools in order to ensure that multiple variants of their malware live in a compromised network
if one of them gets discovered and contained, they still have the means to return to the environment
The final stage of the chain is the action
or objective of the attack.
exfiltrating confidential data
obtain the highest level of access possible within a network to deploy ransomware
Ransomware is a type of malware that will render all data stored on endpoint devices and servers unusable or inaccessible unless a ransom is paid within a limited timeframe