Products & Services
RSS

What is Cyber Kill Chain? Why Does It Matters?

6.13.2022TeamT5 Media Center
Share:
Cyber kill chain describes on how cyber attackers break into companies’ systems.
It contains 7 steps -
  1. Reconnaissance: Attackers collect information about the staff from the target company e.g. email address, public info in social network platforms, etc. By using tools, attackers can scan websites or systems to find out which type and version is being used by the company.
  2. Weaponization: Attackers look for tools or design their own tools to execute the cyber attacks, e.g. backdoor, trojan, etc.
  3. Delivery: Attackers deliver weaponized packages to the victim via email, web, flash drive, etc.
  4. Exploitation: Attackers exploits a vulnerability to execute code on the victim's system.
  5. Installation: After the exploitation stage, malware will be installed on the victim’s system. This ensures attackers have long-term access and control of the victim’s system.
  6. Command & Control: This part is also called C2. It is a common channel for remote manipulation of the victim.
  7. Actions: Take action to accomplish their original goals.
For various cyber attacks,the cyber kill chain can help the enterprise cybersecurity team studying system breaches or knowing and dealing with them. By doing so, the team can successfully achieve their cybersecurity defense goals.


*Reference: Cyber Kill Chain® | Lockheed Martin
*Image courtsey of Pixabay
6.13.2022TeamT5 Media Center
Share:

Related Post

Products & Services
5.23.2022

What is Cyber Threat Intelligence (CTI)? Why Does It Matter?

cyber threat intelligence, threat hunting, 威脅情資, 資安情資