General

The Cyber Kill Chain: Understanding the 7 Steps

21 views 2 min read Updated Feb 12, 2026

Developed by Lockheed Martin, the Cyber Kill Chain was one of the first frameworks to define the stages of a cyber intrusion. It is based on military concepts and remains a vital model for understanding perimeter security.

Developed by Lockheed Martin, the Cyber Kill Chain was one of the first frameworks to define the stages of a cyber intrusion. It is based on military concepts and remains a vital model for understanding perimeter security.

The 7 Steps of an Attack

For an attack to be successful, the adversary must complete all seven stages. Defenders only need to block one stage to break the chain.

  1. Reconnaissance: Researching the target (harvesting emails, OSINT).
  2. Weaponization: Pairing an exploit with a deliverable payload (e.g., creating a malicious PDF).
  3. Delivery: Sending the weapon to the target (e.g., Phishing email).
  4. Exploitation: Triggering the weapon's code on the victim's system.
  5. Installation: Installing malware or a backdoor.
  6. Command and Control (C2): Establishing a channel to communicate with the compromised host.
  7. Actions on Objectives: Fulfilling the mission (Data exfiltration, encryption, destruction).

Kill Chain vs. MITRE ATT&CK

While the Kill Chain is excellent for high-level strategy, it is often criticized for being too linear for modern threats.

  • Modern attackers often skip steps or move laterally, which is why MITRE ATT&CK is often preferred for detailed operational analysis.
  • However, the Kill Chain remains the industry standard for explaining attacks to non-technical management in Strategic Intelligence reports.

Share This Entry