{"id":7841,"date":"2026-02-22T19:26:59","date_gmt":"2026-02-22T17:26:59","guid":{"rendered":"https:\/\/scalemedia.co.za\/cybermedia\/?post_type=docs&#038;p=7841"},"modified":"2026-02-22T19:28:08","modified_gmt":"2026-02-22T17:28:08","password":"","slug":"cyber-kill-chain","status":"publish","type":"docs","link":"https:\/\/scalemedia.co.za\/cybermedia\/docs\/cyber-kill-chain\/","title":{"rendered":"Cyber Kill Chain"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What Is The Cyber Kill Chain?<\/h2>\n\n\n\n<p>Before we start talking about handling incidents, we need to understand the attack lifecycle (a.k.a. the cyber kill chain). This lifecycle describes how attacks manifest themselves. Understanding this lifecycle will provide us with valuable insights into how far in the network an attacker is and what they may have access to during the investigation phase of an incident.<\/p>\n\n\n\n<p>The cyber kill chain consists of seven different stages, as depicted in the image below:&nbsp;<img decoding=\"async\" src=\"https:\/\/cdn.services-k8s.prod.aws.htb.systems\/content\/modules\/148\/Cyber_kill_chain.png\" alt=\"Flowchart of cyber kill chain steps: Recon, Weaponize, Deliver, Exploit, Install, C&amp;C, Action.\"><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stages of the Cyber Kill Chain<\/h2>\n\n\n\n<p>The&nbsp;<code>Recon<\/code>&nbsp;(Reconnaissance) stage is the initial stage, and it involves the part where an attacker chooses their target. Additionally, the attacker performs information gathering to become more familiar with the target and gathers as much useful data as possible, which can be used not only in this stage but also in other stages of this chain. Some attackers prefer to perform passive information gathering from web sources such as LinkedIn and Instagram, but also from documentation on the target organization&#8217;s web pages. Job ads and company partners often reveal information about the technology utilized in the target organization. They can provide extremely specific information about antivirus tools, operating systems, and networking technologies. Other attackers go a step further; they start &#8216;poking&#8217; and actively scan external web applications and IP addresses that belong to the target organization.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.services-k8s.prod.aws.htb.systems\/content\/modules\/148\/ir_recon.png\" alt=\"Reconnaissance Stage diagram split into Active and Passive Recon. Active Recon: Identify target and scope; Locate open ports; Identify services on open ports; Map entire network. Passive Recon: Information gathering from web sources (job ads, company partners); Social media (LinkedIn, Instagram, Facebook); Avoid detection at all times. Icons accompany each item on a dark background.\"\/><\/figure>\n\n\n\n<p>In the&nbsp;<code>Weaponize<\/code>&nbsp;stage, the malware to be used for initial access is developed and embedded into some type of exploit or deliverable payload. This malware is crafted to be extremely lightweight and undetectable by antivirus and detection tools. It is likely that the attacker has gathered information to identify the present antivirus or EDR technology present in the target organization. On a large scale, the sole purpose of this initial stage is to provide remote access to a compromised machine in the target environment, which also has the capability to persist through machine reboots and the ability to deploy additional tools and functionality on demand.<\/p>\n\n\n\n<p>In the&nbsp;<code>Delivery<\/code>&nbsp;stage, the exploit or payload is delivered to the victim(s). Traditional approaches include phishing emails that either contain a malicious attachment or a link to a web page. The web page can serve two purposes: either containing an exploit or hosting the malicious payload to avoid sending it through email scanning tools. In some cases, the web page can also mimic a legitimate website used by the target organization in an attempt to trick the victim into entering their credentials and collecting them. Some attackers call the victim on the phone with a social engineering pretext in an attempt to convince the victim to run the payload. The payload in these trust-gaining cases is hosted on an attacker-controlled website that mimics a well-known website to the victim (e.g., a copy of the target organization&#8217;s website). It is extremely rare to deliver a payload that requires the victim to do more than double-click an executable file or a script (in Windows environments, this can be .bat, .cmd, .vbs, .js, .hta, and other formats). Finally, there are cases where physical interaction is utilized to deliver the payload via USB tokens and similar storage tools that are purposely left around.<\/p>\n\n\n\n<p>The&nbsp;<code>Exploitation<\/code>&nbsp;stage is the moment when an exploit or a delivered payload is triggered. During the exploitation stage of the Cyber Kill Chain, the attacker typically attempts to execute code on the target system in order to gain access or control.<\/p>\n\n\n\n<p>In the&nbsp;<code>Installation<\/code>&nbsp;stage, the initial stager is executed and is running on the compromised machine. As already discussed, the installation stage can be carried out in various ways, depending on the attacker&#8217;s goals and the nature of the compromise. Some common techniques used in the installation stage include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Droppers<\/strong>: Attackers may use droppers to deliver malware onto the target system. A dropper is a small piece of code designed to install malware on the system and execute it. The dropper may be delivered through various means, such as email attachments, malicious websites, or social engineering tactics.<\/li>\n\n\n\n<li><strong>Backdoors<\/strong>: A backdoor is a type of malware designed to provide the attacker with ongoing access to the compromised system. The backdoor may be installed by the attacker during the exploitation stage or delivered through a dropper. Once installed, the backdoor can be used to execute further attacks or steal data from the compromised system.<\/li>\n\n\n\n<li><strong>Rootkits<\/strong>: A rootkit is a type of malware designed to hide its presence on a compromised system. Rootkits are often used in the installation stage to evade detection by antivirus software and other security tools. The rootkit may be installed by the attacker during the exploitation stage or delivered through a dropper.<\/li>\n<\/ul>\n\n\n\n<p>In the&nbsp;<code>Command and Control<\/code>&nbsp;stage, the attacker establishes a remote access capability to the compromised machine. As discussed, it is not uncommon to use a modular initial stager that loads additional scripts &#8216;on-the-fly&#8217;. However, advanced groups will utilize separate tools to ensure that multiple variants of their malware live in a compromised network, and if one of them gets discovered and contained, they still have the means to return to the environment.<\/p>\n\n\n\n<p>The final stage of the chain is the&nbsp;<code>Action<\/code>&nbsp;or objective of the attack. The objective of each attack can vary. Some adversaries may aim to exfiltrate confidential data, while others may want to obtain the highest level of access possible within a network to deploy ransomware. Ransomware is a type of malware that renders all data stored on endpoint devices and servers unusable or inaccessible unless a ransom is paid within a limited timeframe (not recommended).<\/p>\n\n\n\n<p>It is important to understand that adversaries don&#8217;t operate linearly (as the Cyber Kill Chain suggests). Some previous Cyber Kill Chain stages will be repeated multiple times. For example, after the&nbsp;<code>Installation<\/code>&nbsp;stage of a successful compromise, the logical next step for an adversary is to initiate the&nbsp;<code>Recon<\/code>&nbsp;(Reconnaissance) stage again to identify additional targets and find vulnerabilities to exploit, allowing them to move deeper into the network and eventually achieve the attack&#8217;s objective(s).<\/p>\n\n\n\n<p>Our objective is to&nbsp;<code>stop an attacker from progressing further up the kill chain<\/code>, ideally in one of the earliest stages.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">MITRE ATT&amp;CK Framework<\/h2>\n\n\n\n<p>Another framework for understanding adversary behavior is the&nbsp;<a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE ATT&amp;CK<\/a>&nbsp;framework. It is a more granular, matrix-based knowledge base of adversary tactics and techniques used to achieve specific goals. Cybersecurity professionals use both frameworks to understand and defend against cyberattacks.<\/p>\n\n\n\n<p>The MITRE ATT&amp;CK Enterprise Matrix is a knowledge base that documents adversary behavior observed in the wild against enterprise IT environments (Windows, Linux, macOS, cloud, network, mobile, etc.). It is presented as a&nbsp;<code>matrix<\/code>&nbsp;where columns represent adversary goals (<code>tactics<\/code>), and cells are&nbsp;<code>techniques<\/code>&nbsp;attackers use to achieve those goals. The framework helps defenders understand, model, detect, and respond to attacker behavior in a structured way.<\/p>\n\n\n\n<p>The screenshot below shows an example of the MITRE ATT&amp;CK Enterprise Matrix:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.services-k8s.prod.aws.htb.systems\/content\/modules\/148\/mitreintro.png\" alt=\"The tactics and techniques representing the MITRE ATT&amp;CK\u00ae Matrix for Enterprise.\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Tactic<\/h4>\n\n\n\n<p>A tactic is a high-level adversary objective during an intrusion (the goal they want to accomplish at that stage). For Example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>Initial Access<\/code>.<\/li>\n\n\n\n<li><code>Persistence<\/code>.<\/li>\n\n\n\n<li><code>Privilege Escalation<\/code>.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Technique<\/h4>\n\n\n\n<p>A technique is a specific method adversaries use to achieve a tactic. Techniques describe concrete attacker behavior (tools, commands, APIs, protocols, etc.).<\/p>\n\n\n\n<p>Techniques have IDs like&nbsp;<a href=\"https:\/\/attack.mitre.org\/techniques\/T1105\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1105 (Ingress Tool Transfer)<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/attack.mitre.org\/techniques\/T1021\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1021 (Remote Services)<\/a>. For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>T1105 Ingress Tool Transfer<\/code>: Refers to the tools used by attackers to download a tool, such as\u00a0<code>wget<\/code>,\u00a0<code>curl<\/code>, etc., commonly OS built-in commands\/tools.<\/li>\n\n\n\n<li><code>T1021 Remote Services<\/code>: Refers to adversaries using protocols such as SSH, RDP, and SMB for lateral movement.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Sub-technique<\/h4>\n\n\n\n<p>Sub-techniques are children of techniques that capture a particular implementation or target. Sub-technique IDs extend the parent technique:&nbsp;<a href=\"https:\/\/attack.mitre.org\/techniques\/T1003\/001\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1003.001 (Credential Dumping -&gt; LSASS Memory)<\/a>,&nbsp;<a href=\"https:\/\/attack.mitre.org\/techniques\/T1021\/002\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1021.002 (Remote Services -&gt; SMB\/Windows Admin Shares)<\/a>. For example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>T1003.001 - OS Credentials: LSASS Memory<\/code>: Refers to adversaries dumping credentials directly from the LSASS process memory when achieving the necessary privileges.<\/li>\n\n\n\n<li><code>T1021.002 - Remote Services: SMB\/Windows Admin Shares<\/code>: Refers to adversaries interacting with shares using valid credentials.<\/li>\n<\/ul>\n\n\n\n<p>This enables precise detection, attribution, and reporting (we can say &#8220;We detected&nbsp;<code>T1003.001<\/code>&nbsp;\u2014 LSASS memory dumping&#8221; instead of just&nbsp;<code>T1003<\/code>).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pyramid of Pain<\/h3>\n\n\n\n<p>In the diagram below, the Pyramid of Pain illustrates how much&nbsp;<code>effort it takes for an adversary to change their tactics<\/code>&nbsp;when defenders detect and block different types of indicators. At the base of the pyramid are simple indicators like hash values, IP addresses, and domain names \u2014 these are easily changed by attackers (low pain).<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.services-k8s.prod.aws.htb.systems\/content\/modules\/148\/ir_mitre.png\" alt=\"Pyramid of pain graphic mapping indicator types to defender difficulty. From bottom to top: Hash Values (Trivial), IP Addresses (Easy), Domain Names (Simple), Network\/Host Artifacts (Annoying), Tools (Challenging), TTPs\u2014ATT&amp;CK (Tough). Header shows MITRE ATT&amp;CK tactics across the top (Reconnaissance through Impact).\"\/><\/figure>\n\n\n\n<p>For example,&nbsp;<code>blocking a malicious IP<\/code>&nbsp;in a MITRE ATT&amp;CK &#8220;Command and Control&#8221; (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1071\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1071<\/a>) scenario will only&nbsp;<code>slightly slow down<\/code>&nbsp;the adversary since they can quickly switch to a new C2 server. Moving upward, network and host artifacts (like registry keys, mutex names, or filenames) correspond to specific techniques in ATT&amp;CK (e.g.,&nbsp;<a href=\"https:\/\/attack.mitre.org\/techniques\/T1547\/001\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1547.001<\/a>&nbsp;\u2013 Registry Run Keys\/Startup Folder). These take&nbsp;<code>more effort<\/code>&nbsp;to change and are more resilient indicators for defenders.<\/p>\n\n\n\n<p>At the top of the pyramid are Tools, Tactics, Techniques, and Procedures (TTPs) \u2014 these align directly with the core of MITRE ATT&amp;CK. Detecting and disrupting these (e.g., identifying PowerShell abuse under&nbsp;<a href=\"https:\/\/attack.mitre.org\/techniques\/T1059\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1059<\/a>&nbsp;or process injection under&nbsp;<a href=\"https:\/\/attack.mitre.org\/techniques\/T1055\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1055<\/a>) forces the adversary to fundamentally change how they operate \u2014 causing maximum pain.<\/p>\n\n\n\n<p>In summary:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hash\/IP detections =\u00a0<code>easy<\/code>\u00a0to evade.<\/li>\n\n\n\n<li>Behavioral TTP detections (MITRE-based) =\u00a0<code>hard to evade<\/code>, higher attacker cost, and stronger defense maturity.<\/li>\n<\/ul>\n\n\n\n<p>Analysts map observed events and indicators to ATT&amp;CK techniques and tactics to quickly understand adversary intent and likely next steps. Usually, it is also used to prioritize alerts based on techniques that target high-value assets. Additionally, it can be used to refer to the mitigation and containment\/eradication actions that disrupt the attacker&#8217;s kill chain.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">MITRE ATT&amp;CK integration in TheHive<\/h2>\n\n\n\n<p><code>TheHive<\/code>&nbsp;is a case management platform designed for cybersecurity teams to efficiently handle incidents by processing alerts. Users can create cases and link multiple relevant alerts within them. This platform serves as a centralized hub to collect and manage all security alerts from various devices on a single, comprehensive page. Additionally, TheHive offers the capability to import all MITRE ATT&amp;CK Framework Tactics, Techniques, and Procedures (TTPs) into its alert management system. This integration enriches incident analysis by associating discovered attack patterns with the alerts.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.services-k8s.prod.aws.htb.systems\/content\/modules\/148\/ir_hive.png\" alt=\"TheHive web app login page in Firefox at http:\/\/10.129.234.131:9000\/login (marked Not Secure). Right pane shows greeting \u201cHello,\u201d with fields prefilled: username \u201chtb-analyst\u201d and a masked password, plus a \u201cLet me in\u201d button and \u201cI forgot my password\u201d link. Left pane displays TheHive logo and wordmark on a dark background.\"\/><\/figure>\n\n\n\n<p>Upon logging in, the dashboard will be displayed. We can view the alerts page as shown in the screenshot below, allowing us to view and manage alerts effectively.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.services-k8s.prod.aws.htb.systems\/content\/modules\/148\/ir_hive1.png\" alt=\"TheHive \u201cAlerts\u201d page in Firefox at http:\/\/10.129.234.131:9000\/alerts showing 43 alerts. Two visible alerts read \u201cPossible suspicious access to Windows admin shares,\u201d status New, type wazuh_alert from source wazuh. Details show rule=92105, agent_name=SCDC01, agent_id=005, agent_ip=172.16.200.50, references a130aa and fa3660, Observables count 1, TTPs 0, created\/updated 09\/10\/2025 04:41 (one updated 10:04). Left sidebar highlights the Alerts icon; top bar includes search and \u201cCreate Case+.\u201d\"\/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Example of MITRE ATT&amp;CK Mapping<\/h2>\n\n\n\n<p>The table below shows some of the techniques (MITRE ATT&amp;CK) that were observed during the incident.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tactic<\/th><th>Technique<\/th><th>ID<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td><code>Initial Access<\/code><\/td><td>Exploit Public-Facing Application<\/td><td>T1190<\/td><td>Confluence CVE exploited<\/td><\/tr><tr><td><code>Execution<\/code><\/td><td>Command and Scripting Interpreter: PowerShell<\/td><td>T1059.001<\/td><td>PowerShell used for payload download<\/td><\/tr><tr><td><code>Persistence<\/code><\/td><td>Windows Service<\/td><td>T1543.003<\/td><td>Windows Service for persistence<\/td><\/tr><tr><td><code>Credential Access<\/code><\/td><td>LSASS Memory Dumping<\/td><td>T1003.001<\/td><td>Extracted credentials<\/td><\/tr><tr><td><code>Lateral Movement<\/code><\/td><td>Remote Desktop Protocol<\/td><td>T1021.001<\/td><td>RDP lateral movement<\/td><\/tr><tr><td><code>Impact<\/code><\/td><td>Data Encrypted for Impact<\/td><td>T1486<\/td><td>LockBit ransomware<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>What Is The Cyber Kill Chain? Before we start talking about handling incidents, we need to understand the attack lifecycle (a.k.a. the cyber kill chain). This lifecycle describes how attacks manifest themselves. Understanding this lifecycle will provide us with valuable insights into how far in the network an attacker is and what they may have&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"doc_category":[44],"doc_tag":[],"class_list":["post-7841","docs","type-docs","status-publish","hentry","doc_category-incident-handling-process"],"year_month":"2026-04","word_count":1852,"total_views":0,"reactions":{"happy":0,"normal":0,"sad":0},"author_info":{"name":"admin","author_nicename":"admin","author_url":"https:\/\/scalemedia.co.za\/cybermedia\/author\/admin\/"},"doc_category_info":[{"term_name":"Incident Handling Process","term_url":"https:\/\/scalemedia.co.za\/cybermedia\/docs-category\/incident-handling-process\/"}],"doc_tag_info":[],"_links":{"self":[{"href":"https:\/\/scalemedia.co.za\/cybermedia\/wp-json\/wp\/v2\/docs\/7841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scalemedia.co.za\/cybermedia\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/scalemedia.co.za\/cybermedia\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/scalemedia.co.za\/cybermedia\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/scalemedia.co.za\/cybermedia\/wp-json\/wp\/v2\/comments?post=7841"}],"version-history":[{"count":1,"href":"https:\/\/scalemedia.co.za\/cybermedia\/wp-json\/wp\/v2\/docs\/7841\/revisions"}],"predecessor-version":[{"id":7842,"href":"https:\/\/scalemedia.co.za\/cybermedia\/wp-json\/wp\/v2\/docs\/7841\/revisions\/7842"}],"wp:attachment":[{"href":"https:\/\/scalemedia.co.za\/cybermedia\/wp-json\/wp\/v2\/media?parent=7841"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/scalemedia.co.za\/cybermedia\/wp-json\/wp\/v2\/doc_category?post=7841"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/scalemedia.co.za\/cybermedia\/wp-json\/wp\/v2\/doc_tag?post=7841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}