top of page

Cyber Kill Chain vs. MITRE ATT&CK® Framework

Updated: Nov 23, 2023

I will try to explain in easiest way.

Cyber Kill Chain and the MITRE ATT&CK® Framework, stand as fundamental models in this arena, each offering unique perspectives and insights into the world of cyber threats.


Cyber Kill Chain:

Origin and Purpose:

Developed by Lockheed Martin, the Cyber Kill Chain offers a breakdown of a cyber attack, mapping out the stages from an attacker's viewpoint.


Focus and Application: It aids security teams in understanding the flow of an attack, potentially allowing for proactive defense strategies at various stages.


MITRE ATT&CK® Framework:

Origin and Purpose:

Created by MITRE Corporation, the tactics, techniques, and procedures (TTPs) used by adversaries during different stages of an attack.


Tactics and Techniques: This framework delineates various behaviors and procedures followed by attackers across multiple stages of an attack. It assists defenders in understanding adversary behavior more comprehensively.


Comparison:

  • Cyber Kill Chain: Focuses on attack stages, aiding in understanding the attack lifecycle.

  • MITRE ATT&CK® Framework: Provides an extensive library of real-world adversary behaviors and tactics employed within those stages


Cyber Kill Chain:

Understanding the Attacker's Game Plan

Imagine you're playing a game where the bad guys are trying to break into your house. The Cyber Kill Chain is like a playbook that shows how these intruders plan their moves. It breaks down their strategy into steps:


Step 1: (Reconnaissance): Attackers gather info about your house (or network) using Google Maps (or online tools) to find weak points.

Step 2: (Weaponization): They gather tools like crowbars (or malware) to break in.

Step 3: (Delivery): They send a package (or email) with something sneaky hidden inside.

Step 4: (Exploitation): Using their tools, they break open your back door (or exploit system vulnerabilities).

Step 5: (Installation): Once inside, they settle down and make sure they can come back later.

Step 6: (Command and Control): They call their buddies (or set up secret communication channels) to coordinate their next moves.

Step 7: (Actions on Objectives): Finally, they grab what they came for, like your TV (or your valuable data)


MITRE ATT&CK® Framework:

Understanding the Sneaky Tactics

Now, think of the MITRE ATT&CK® Framework like a secret spy manual that explains all the sneaky tricks attackers might use while they're in your house:


Trick 1: (Persistence): Attackers might hide spare keys outside ( ways to stick around in your network).

Trick 2: (Evasion): They might use tricks to hide from your security cameras (avoid getting caught by antivirus).

Trick 3: (Privilege Escalation): They could mess with your locks to gain more access inside your house (or get more control over your computer system).


Akash Patel

12 views0 comments

Comentarios


bottom of page