{"id":519641,"date":"2024-06-05T16:11:15","date_gmt":"2024-06-05T20:11:15","guid":{"rendered":"https:\/\/www.commvault.com\/?post_type=cmv_glossary&#038;p=519641"},"modified":"2024-06-05T16:11:16","modified_gmt":"2024-06-05T20:11:16","slug":"cyber-kill-chain","status":"publish","type":"cmv_glossary","link":"https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain","title":{"rendered":"Cyber Kill Chain"},"content":{"rendered":"\n<div class=\"alignfull wp-block-commvault-v2-glossary-content\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12 col-md-4\">\n\t\t\t<div class=\"table__content\">\n\t\t\t\t<div class=\"js-toc_glossary\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t<div class=\"col-12 table__content__mobile hidden-md\">\n\t\t<\/div>\n\t\t<div class=\"col-12 col-md-8\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"js-toc-content\">\n\t\t\t\t\t\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"what-is-cyber-kill-chain\">What is a Cyber Kill Chain?<\/h2>\n\n\n\n<p id=\"Cyber-Kill-Chain-Model:-Seven-Stages-of-a-Cyber-Attack\" class=\"\">The Cyber Kill Chain is a seven-stage model that describes the sequence of events in a typical cyber-attack. It provides a comprehensive framework for understanding the different stages of an attack and developing strategies to detect and prevent them. The seven stages of the Cyber Kill Chain are Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command &amp; Control, and Actions on Objectives.<\/p>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"h-cyber-kill-chain-model-seven-stages-of-a-cyber-attack\">Cyber Kill Chain Model: Seven Stages of a Cyber Attack<\/h2>\n\n\n\n<ol style=\"font-size:17px\" class=\"wp-block-list\">\n<li class=\"\"><strong>Reconnaissance<\/strong>: The first stage of the cyber kill chain is reconnaissance, where the attacker gathers information about the target. This stage is critical for the attacker as it helps them understand the target&#8217;s environment and identify potential weaknesses to exploit. Reconnaissance can involve various methods such as passive reconnaissance (gathering information through publicly available sources) or active reconnaissance (using tools to actively scan and probe the target&#8217;s systems).<\/li>\n\n\n\n<li class=\"\"><strong>Weaponization<\/strong>: In the weaponization stage, the attacker creates a weaponized payload or exploit that will be used to gain access to the target. A payload is a piece of code that is delivered to the target and can include malware or other malicious software. The attacker may use this stage to test the payload to ensure it is functional before proceeding to the delivery stage.<\/li>\n\n\n\n<li class=\"\"><strong>Delivery<\/strong>: In the delivery stage, the attacker delivers the weaponized payload to the target. Delivery can occur through various vectors such as email, social engineering tactics, or through vulnerabilities in the target&#8217;s software or hardware. The goal of this stage is to trick the target into executing the payload, giving the attacker access to the target&#8217;s systems.<\/li>\n\n\n\n<li class=\"\"><strong>Exploitation<\/strong>:&nbsp;In the exploitation stage, the attacker executes the weaponized payload to gain access to the target. This stage involves using the payload to exploit vulnerabilities in the target&#8217;s software or hardware, giving the attacker the ability to take control of the target&#8217;s systems. Exploitation can be achieved through techniques such as buffer overflows, code injection, and other methods that allow the attacker to execute arbitrary code on the target&#8217;s systems.<\/li>\n\n\n\n<li class=\"\"><strong>Installation<\/strong>: In the installation stage, the attacker installs malware or backdoors on the target&#8217;s systems. The malware or backdoors are used to maintain access to the target and to monitor its activities. The attacker may also use this stage to install additional tools or software to help them carry out their attack.<\/li>\n\n\n\n<li class=\"\"><strong>Command &amp; Control<\/strong>: In the command &amp; control stage, the attacker establishes communication with the malware or backdoors installed on the target&#8217;s systems. This communication allows the attacker to remotely control the target&#8217;s systems, giving them the ability to execute commands, steal data, or carry out other malicious activities. The attacker may use various methods such as setting up a command and control server or using encrypted channels to communicate with the malware.<\/li>\n\n\n\n<li class=\"\"><strong>Actions on Objectives<\/strong>: In the final stage, the attacker achieves their goals, such as exfiltrating sensitive data, destroying systems, or stealing valuable information. The attacker may also use the target&#8217;s systems as a launch pad for further attacks, using the target&#8217;s compromised systems to attack other targets.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"examples-of-the-cyber-kill-chain\">Examples of the cyber kill chain<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"\"><strong>WannaCry ransomware attack:<\/strong> In this attack, the attacker used the &#8220;EternalBlue&#8221; exploit to deliver the WannaCry ransomware to vulnerable systems. The attacker then exploited the vulnerability and installed the ransomware, which encrypted the victims&#8217; files and demanded a ransom payment to restore access.<\/li>\n\n\n\n<li class=\"\"><strong>Target data breach:<\/strong> In the 2013 Target data breach, the attackers first conducted reconnaissance to gather information about Target&#8217;s network and payment systems. They then weaponized malware to exploit a vulnerability in Target&#8217;s point-of-sale (POS) system. The attacker delivered the malware to the target and installed it, which allowed them to exfiltrate sensitive customer data.<\/li>\n\n\n\n<li class=\"\"><strong>Operation Aurora:<\/strong> In this 2009 cyber espionage campaign, the attacker used spear-phishing emails to deliver a zero-day exploit to target systems. The attacker exploited the vulnerability to install a backdoor, which allowed them to conduct command and control and exfiltrate sensitive data from the target.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading heading__glossary__content is-style-heading-4\" id=\"protect-against-cyber-attacks\">Protect Against Cyber Attacks<\/h2>\n\n\n\n<p class=\"\">There are several steps that organizations can take to protect against cyber attacks:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"\"><strong>Employee training and awareness:<\/strong> Educating employees on how to identify phishing scams, avoid risky online behavior, and report any suspicious activity can help prevent a data breach.<\/li>\n\n\n\n<li class=\"\"><strong>Firewall and network security:<\/strong> A firewall can help prevent unauthorized access to a network, and a strong network security system can help detect and prevent cyber-attacks.<\/li>\n\n\n\n<li class=\"\"><strong>Anti-malware software:<\/strong> Installing anti-malware software, such as antivirus and anti-spyware programs, can help protect against malicious software that can cause harm to a network or steal sensitive information.<\/li>\n\n\n\n<li class=\"\"><strong>Software and system updates:<\/strong> Keeping software and systems up-to-date with the latest security patches and updates can help prevent vulnerabilities from being exploited by cybercriminals.<\/li>\n\n\n\n<li class=\"\"><strong>Backup and disaster recovery:<\/strong> Regularly backing up important data and having a disaster recovery plan in place can help an organization quickly recover from a cyber attack.<\/li>\n\n\n\n<li class=\"\"><strong>Access control:<\/strong> Implementing strong access control measures, such as using strong passwords and two-factor authentication, can help prevent unauthorized access to sensitive information.<\/li>\n\n\n\n<li class=\"\"><strong>Penetration testing:<\/strong> Regularly conducting penetration testing and vulnerability assessments can help organizations identify and address potential security weaknesses before they can be exploited by attackers.<\/li>\n<\/ol>\n\n\n\n<p class=\"\">Defending against the Cyber Kill Chain requires a multi-layered approach, including implementing security controls and monitoring systems to detect potential attacks, implementing security best practices, and having an incident response plan in place. To prevent attacks from occurring, organizations should focus on improving their overall security posture by implementing security controls such as firewalls, AAA security framework, , foundational hardening and data encryption. They should also regularly train employees on security best practices to help them identify potential attacks.<\/p>\n\n\n\n<p class=\"\">It is important for organizations to regularly assess their security posture and update their defense strategies based on the latest threats and vulnerabilities. This can involve implementing new technologies and tools, as well as conducting regular security audits and assessments. Organizations should also consider engaging with security experts.<\/p>\n\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n<div class=\"alignfull wp-block-commvault-v2-free-trial-glossary\" id=\"free-trial-glossary\">\n\t<div class=\"grid-container\">\n\t\t<div class=\"col-12\">\n\t\t\t\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tFree SAAS Trial\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\tGet Started now with Cyber Resilience. FREE for 30-days!\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/resources\/video\/tata-consultancy\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-commvault-v2-section-header\">\n\t\n\t<div class=\"section-header-inner-wrapper \">\n\t\t<div class=\"section-header__content\">\n\t\t\t\t\t\t\t\t\t\t<h2 class=\"section__title text-heading-m text-md-heading-xl text-lg-heading-xxxl mt-0 mb-6\">\n\t\t\t\t\t\tGartner Leader for the 12<sup>th<\/sup>\u00a0time\t\t\t\t<\/h2>\n\t\t\t\n\t\t\t\t\t\t\t<p class=\"section__description text-body-s mb-0 text-md-body-m text-lg-body-l\">\n\t\t\t\t\t2023 Gartner\u00ae Magic Quadrant\u2122 for Enterprise Backup and Recovery Software Solutions.\t\t\t\t<\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"scalable-cta-button\">\n\t\t\t\t\n\n<div class=\"is-style-primary-alt wp-block-commvault-v2-custom-button\"\t\t>\n\n\t\n\t\t<a\n\t\t\tclass=\"cmvlt-2-custom-button btn-md text-body-l font-medium \"\n\t\t\thref=\"\/gc\/itleaders\"\n\t\t\taria-label=\"Learn more\"\n\t\t\ttarget=\"_self\"\n\t\t>\n\n\t\t\t\t\t\t\t<svg width=\"48\" height=\"48\" viewBox=\"0 0 48 48\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<path d=\"M48 24C48 37.2548 37.2548 48 24 48C10.7452 48 0 37.2548 0 24C0 10.7452 10.7452 0 24 0C37.2548 0 48 10.7452 48 24Z\" fill=\"black\"\/>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.5858 23.0001L23.2929 17.7072L24.7071 16.293L32.4142 24.0001L24.7071 31.7072L23.2929 30.293L28.5858 25.0001H17V23.0001H28.5858Z\" fill=\"currentcolor\"\/>\n\t\t\t\t<\/svg>\n\n\t\t\t\t<span class=\"font-medium\">\n\t\t\t\t\tLearn more\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t<\/div>\n\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading heading__quick-links\" id=\"h-quick-links\">Quick Links<\/h4>\n\n\n\n<ul class=\"list__free-trial wp-block-list\">\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/resources\">All Resources<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/customers?cmv_lang=en_US\">Case Studies<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/supported-technologies\">Supported Tech<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/webinars-and-events?cmv_lang=en_US\">Webinars &amp; Events<\/a><\/li>\n\n\n\n<li class=\"\"><a href=\"https:\/\/www.commvault.com\/services\">Training &amp; Education<\/a><\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber Kill Chain is a seven-stage model that describes the sequence of events in a typical cyber-attack. It provides a comprehensive framework for understanding the different stages of an attack and developing strategies to detect and prevent them.<\/p>\n","protected":false},"author":166,"featured_media":0,"parent":0,"menu_order":0,"template":"","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""}},"class_list":{"0":"post-519641","1":"cmv_glossary","2":"type-cmv_glossary","3":"status-publish","5":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Kill Chain | Knowledge Center | Commvault<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Kill Chain\" \/>\n<meta property=\"og:description\" content=\"The Cyber Kill Chain is a seven-stage model that describes the sequence of events in a typical cyber-attack. It provides a comprehensive framework for understanding the different stages of an attack and developing strategies to detect and prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-05T20:11:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Kill Chain | Knowledge Center | Commvault","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain","og_locale":"en_US","og_type":"article","og_title":"Cyber Kill Chain","og_description":"The Cyber Kill Chain is a seven-stage model that describes the sequence of events in a typical cyber-attack. It provides a comprehensive framework for understanding the different stages of an attack and developing strategies to detect and prevent them.","og_url":"https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_modified_time":"2024-06-05T20:11:16+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@commvault","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain","url":"https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain","name":"Cyber Kill Chain | Knowledge Center | Commvault","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"datePublished":"2024-06-05T20:11:15+00:00","dateModified":"2024-06-05T20:11:16+00:00","breadcrumb":{"@id":"https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/glossary-library\/cyber-kill-chain#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Kill Chain"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_glossary\/519641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_glossary"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/cmv_glossary"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/166"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=519641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}