“Updated techniques inspired by APT tradcraft and MITRE ATT&CK mapping” Every few years, the cybersecurity industry declares that the “kill chain” model is outdated. Yet, despite new frameworks, buzzwords and the rise of AI-driven defenses, the kill chain survives. A cyber kill chain is a framework for identifying and breaking down different stages of a cyberattack. It originates from a military concept and is developed by Lockheed Martin. Attackers still follow the same essential phases in a cyber-attack: reconnaissance, initial access, execution, persistence, privilege escalation, lateral movement, command and control and finally exfiltration or impact.
Some tools and techniques change, the target of the attack may change — but the underlying tactics remain remarkably constant. What changes are the techniques and procedures that make these tactics effective in today’s environments.…
