Introduction
Many enterprises have significantly improved their cybersecurity posture the past decades, effectively preventing known attacks through the integration of security tools, employee education initiatives, and adherence to regulatory standards. However, with the rise of sophisticated cyber threats and the evolving AI threat landscape, many organisations are still susceptible to successful security incidents and data breaches.
A popular framework, named Cyber-Kill-Chain, developed in 2011 helps organisations to identify and prevent cyber intrusion activities by understanding attacker’s behaviour and mapping defence strategies to their lifecycle. This article will explore the phases of the Cyber Kill Chain, focusing on the Reconnaissance phase in detail as. It covers commonly used tools and tactics during all phases, but also emphasises the advantages of proactively accessing Threat Intelligence feeds.
How the Cyber Kill Chain Works
Cyber-Kill-Chain, developed from a military model built by Lockheed Martin, in order to analyse attackers' tactics and prevent cyber attacks. The model illustrates the steps malicious actors must take to achieve their goal, which includes attacking the organisation's network, exfiltrating sensitive data, and maintaining persistence within the company's systems. To achieve their main goal, they must successfully complete each phase; however, from the defender's perspective, success is simply dependent on preventing the attacker's progress at all stages.
The seven stages of the Cyber Kill Chain include:
- Reconnaissance
Attackers: In this step, the attacker selects a target and begins gathering....