top of page

Cyber Kill Chain vs. MITRE ATT&CK® Framework

Updated: Nov 23, 2023

I will try to explain in easiest way.

Cyber Kill Chain and the MITRE ATT&CK® Framework, stand as fundamental models in this arena, each offering unique perspectives and insights into the world of cyber threats.


Cyber Kill Chain:

Origin and Purpose:

Developed by Lockheed Martin, the Cyber Kill Chain offers a breakdown of a cyber attack, mapping out the stages from an attacker's viewpoint.


Focus and Application: It aids security teams in understanding the flow of an attack, potentially allowing for proactive defense strategies at various stages.


MITRE ATT&CK® Framework:

Origin and Purpose:

Created by MITRE Corporation, the tactics, techniques, and procedures (TTPs) used by adversaries during different stages of an attack.


Tactics and Techniques: This framework delineates various behaviors and procedures followed by attackers across multiple stages of an attack. It assists defenders in understanding adversary behavior more comprehensively.


Comparison:

  • Cyber Kill Chain: Focuses on attack stages, aiding in understanding the attack lifecycle.

  • MITRE ATT&CK® Framework: Provides an extensive library of real-world adversary behaviors and tactics employed within those stages


Cyber Kill Chain:

Understanding the Attacker's Game Plan

Imagine you're playing a game where the bad guys are trying to break into your house. The Cyber Kill Chain is like a playbook that shows how these intruders plan their moves. It breaks down their strategy into steps:


Step 1: (Reconnaissance): Attackers gather info about your house (or network) using Google Maps (or online tools) to find weak points.

Step 2: (Weaponization): They gather tools like crowbars (or malware) to break in.

Step 3: (Delivery): They send a package (or email) with something sneaky hidden inside.

Step 4: (Exploitation): Using their tools, they break open your back door (or exploit system vulnerabilities).

Step 5: (Installation): Once inside, they settle down and make sure they can come back later.

Step 6: (Command and Control): They call their buddies (or set up secret communication channels) to coordinate their next moves.

Step 7: (Actions on Objectives): Finally, they grab what they came for, like your TV (or your valuable data)


MITRE ATT&CK® Framework:

Understanding the Sneaky Tactics

Now, think of the MITRE ATT&CK® Framework like a secret spy manual that explains all the sneaky tricks attackers might use while they're in your house:


Trick 1: (Persistence): Attackers might hide spare keys outside ( ways to stick around in your network).

Trick 2: (Evasion): They might use tricks to hide from your security cameras (avoid getting caught by antivirus).

Trick 3: (Privilege Escalation): They could mess with your locks to gain more access inside your house (or get more control over your computer system).


Akash Patel

22 views0 comments

Recent Posts

See All

Comments


bottom of page