Reconnaissance: Research, identification and selection of targets. Much of this can be done through public sources.
Weaponization: After identifying a potential vulnerability, the attacker builds (or acquires) well-chosen malware that can exploit the vulnerability.
Delivery: Sending the malware to the victim (for example, as an email afghanistan consumer email list attachment).
Exploitation: Execute the malicious code that was sent to the victim.
Installation: Installing malicious code on the victim's system so that the attacker can retain access.
Command and Control (C2): When the malicious code is installed, it has to inform the attacker that it was successful and wait for instructions.
Actions on objectives: This is the final objective that the attacker wanted to achieve, for example, stealing information.
Defense measures
So what defense mechanism can be taken to avoid these attackers?
In this model, the crucial point is that breaking any step breaks the entire kill chain, meaning that attackers have to go through the entire model again to succeed.
The chain consists of seven phases:
-
- Posts: 316
- Joined: Thu Jan 16, 2025 8:32 am