Understanding the Stages of the Cyber Kill Chain
Written by:
University of Tulsa
• May 4, 2026
Cyber attacks continue to grow more sophisticated. In a single year, attacks exploiting public-facing applications increased by 44% from 2025 to 2026, according to IBM’s X-Force Threat Intelligence Index 2026, while the number of active ransomware groups increased by 49%.
Artificial intelligence (AI) is also giving cyber attackers new ways to scale and adapt their attacks.
To defend against these threats, cybersecurity experts use frameworks such as the cyber kill chain to identify vulnerabilities and disrupt attacks before they succeed.
What Is the Cyber Kill Chain?
The cyber kill chain is a cybersecurity framework that breaks down an attack into stages, from reconnaissance to actions on objectives. Security teams use it to understand how attackers operate and where defenders can intervene.
By mapping an attack across these stages, teams take a more proactive approach to detection and response.
Lockheed Martin developed the cyber kill chain model in 2011. Borrowing from the military concept of a kill chain, the framework helps security teams understand attacker strategies and improve threat detection and response times.
Learn More About the Cyber Kill Chain
The cyber kill chain provides a structured way to understand how cyber attacks unfold. The following resources introduce the framework, explain its core concepts, and outline how it’s used in modern cybersecurity:
-
Microsoft, What Is the Cyber Kill Chain?: Explores the evolution of the cyber attack kill chain, its impact on cybersecurity, and methods to apply the framework in practice.
-
Okta, Cyber Kill Chain Defined: A Review of Cyber Kill Chain Steps: Evaluates the steps of a kill chain in cybersecurity, with insights into the value of implementing a cyber attack kill chain.
-
Fidelis Security, “What Is a Cyber Kill Chain? How Can It Help in Understanding Attacks?”: Examines the framework’s core purpose, benefits for cybersecurity professionals, and limitations.
Pros and Cons of the Cyber Kill Chain Framework
The cyber kill chain framework breaks down cyber attacks into seven stages, each representing a point at which security teams can detect and disrupt threats and take proactive measures.
The benefits of implementing a cyber kill chain framework include:
-
Proactive defense: Instead of responding reactively after a cyber attack, the framework enables proactive approaches to strengthen security
-
Interrupting attacks in progress: By identifying attackers in the early stages of the chain, cybersecurity professionals can disrupt the attack before it reaches critical objectives.
-
Layered strategies: The framework highlights multiple points of intervention, allowing security professionals to design overlapping defenses.
Organizations that use the cyber kill chain framework can implement stronger authorization and privilege policies, detect and stop lateral movement after a breach, and stop attacks in the early stages.
However, the cyber kill chain framework does have limitations, including:
-
Focus on malware attacks: The framework breaks down malware into stages, making it less effective against other attack types.
-
Limited visibility into insider threats: Insider threats are among the most common cyber attacks, and the framework doesn’t easily detect threats from insiders who already have access to secure systems.
-
Linear structure: The framework assumes that cyber attackers will follow the stages in order, creating a blind spot for threats that aren’t linear.
-
Emphasis on perimeter defense: The number of endpoint vulnerabilities has skyrocketed with the growth of remote workforces, cloud infrastructure, and mobile devices. The framework focuses on perimeter security, while many organizations no longer have a single network perimeter.
Cyber threats continue to evolve, and no single framework captures every attack scenario. Other models for understanding cyber attacks include the MITRE ATT&CK matrix and the NIST Cybersecurity Framework.
7 Stages of the Cyber Kill Chain
The seven stages of the cyber kill chain framework start with reconnaissance. By understanding how attackers operate at each stage, cybersecurity teams can identify vulnerabilities, detect threats earlier, and disrupt attacks.
1. Reconnaissance
Cyber attacks start with a reconnaissance stage, during which attackers research organizations, employees, and networks to identify vulnerabilities.
Common reconnaissance techniques include port and service scanning, public record analysis, staff profile research, and cloud vulnerability scanning.
Detecting reconnaissance is challenging but not impossible. Top defense strategies include:
-
Intrusion prevention systems that flag suspicious activity
-
Firewalls that monitor traffic flows and limit access
-
Offensive simulations to proactively identify weaknesses
2. Weaponization
After reconnaissance, cyber attackers enter the weaponization stage. During this stage, they design strategies or adapt tools to gain access to secure systems.
Weaponization tools can include custom malware, remote access Trojans, or worms designed to infiltrate networks. With the help of AI tools, modern malware can also change its code to avoid detection.
Defense strategies in the weaponization stage include:
-
Monitoring attack surfaces and vulnerabilities
-
Using threat intelligence to track attack behaviors
-
Proactive tracking of infiltration approaches
3. Delivery
In the delivery stage, hackers transmit the malicious payload developed in the previous step. Attackers must remain undetected as they access networks and systems.
Delivery strategies include phishing emails that trick authorized users into giving access, supply chain or vendor attacks that insert malware, and malicious links embedded in websites or collaboration tools.
Cyber defense prevents delivery in several ways:
-
Training staff to prevent phishing and social engineering attacks
-
Endpoint detection to quickly react to threats
-
Penetration testing to identify vulnerabilities
4. Exploitation
After delivering a malicious payload, attackers advance to the exploitation stage. Exploitation is the stage of the attack in which bad actors exploit a vulnerability to execute code or gain unauthorized access.
Delivery and exploitation often occur simultaneously. For example, an employee who opens a malicious file may trigger copying and installation. Some advanced attacks can also detect and avoid test environments and delay execution to evade detection.
Cyber defense strategies can prevent exploitation in multiple ways:
-
Implementing advanced threat detection to neutralize malware
-
Proactively patching vulnerabilities
-
Segmenting networks to prevent lateral movement
5. Installation
Cyber attackers attempt to expand their access during the installation stage. They may install backdoors to bypass security controls and expand their privileges.
Installation can occur nearly simultaneously with delivery and exploitation or in rapid succession.
Defense approaches during installation include:
-
Multi-factor authentication (MFA) to prevent privilege escalation
-
Policies that provide least privilege access
-
Detection and response services to address active attacks
6. Command and Control
In the command and control (C2) stage, attackers use malware to gain remote control of systems. During this stage, they attempt to cover their tracks to continue exploiting targets.
C2 techniques include hiding malicious communications within legitimate services, redirecting traffic to attacker-controlled servers, and concealing attackers behind proxy bots.
Defense controls for the C2 stage can include:
-
Scanning traffic to identify malicious communications
-
Detecting intruder beacons to disrupt attacks
-
Analyzing behavior to detect anomalies
7. Actions on Objectives
In the final stage, actions on objectives, attackers carry out their intended objectives. These can include encrypting files, extracting sensitive data, or disrupting networks. Common attack outcomes include ransomware deployment, data manipulation or theft, and service outages that impact business continuity.
Although the attacker has gained access to secure systems, cyber defense still plays a role in containment and mitigation.
Techniques during this final stage include:
-
Data loss prevention and backups to preserve data
-
Disaster recovery plans to restore systems
-
Encryption policies to protect sensitive data
Applying the Cyber Kill Chain Across the Attack Lifecycle
Each stage of the kill chain presents different risks, attacker behaviors, and defense strategies. The following resources explore how the framework is applied in practice, from stage-by-stage analysis to broader threat detection strategies and emerging attack patterns:
-
Fortra, “Evolving Cyber Resilience”: Analyzes the evolving threats in cybersecurity while identifying patterns in the cybersecurity environment
-
PDI Technologies, Analyzing the 7 Cyber Kill Chain Steps: Breaks down each stage and suggests strategies to improve defenses for different phases
-
Splunk, “Cyber Kill Chains: Strategies & Tactics”: Discusses risk mitigation with the kill chain framework, with an assessment of the Cyber COBRA (Contextual OBjective RAting) tool
Proactive Cyber Defense Strategies
Rather than reacting after an attack occurs, the cyber kill chain framework encourages cybersecurity teams to implement proactive cybersecurity strategies. The tools and approaches below can help organizations anticipate attacker behavior and identify vulnerabilities early.
Ethical Hacking
The kill chain framework encourages cybersecurity professionals to think like cyber attackers. Ethical hacking applies this approach through techniques such as penetration testing, simulated attacks, and red teaming to identify weaknesses before they can be exploited.
Security professionals may also use threat hunting to proactively search for hidden or emerging threats, strengthening organizational defenses.
Threat Intelligence
Key to the reconnaissance stage, threat intelligence analyzes existing and emerging threats. Organizations collect and analyze data to understand targets, attack methods, and motives. Security teams use threat intelligence to proactively prepare for attacks.
Cybersecurity also leverages user and entity behavior analytics (UEBA) to detect threats. This approach tracks user and entity behavior, flagging anomalies that could pose a threat.
Identity and Access Management
Managing access to systems, data, and resources can prevent unauthorized access. Identity and access management (IAM) allows secure access to authorized users while limiting access for cyber attackers.
Strong IAM practices can also reduce the risk of insider threats by limiting privileges and monitoring user activity. By detecting unusual patterns and enforcing strict access controls, cybersecurity teams can disrupt attacks in the early stages of the kill chain.
Threat Detection and Response
Cybersecurity teams can detect and respond to malicious activity, helping disrupt the delivery stage of the cyber attack chain. Popular threat detection and response tools include:
-
Endpoint detection and response (EDR): Monitors endpoints such as computers, servers, mobile devices, and the Internet of Things (IoT) devices and responds to impending threats
-
Network detection and response (NDR): Analyzes traffic with AI and machine learning to identify suspicious activity on an organization’s network
-
Extended detection and response (XDR): Integrates detection and response across users, endpoints, networks, cloud applications, and other security layers
Security Awareness Training
Human error is a leading cause of security breaches, making employee awareness a critical line of defense. Training employees in cybersecurity best practices helps them recognize phishing attempts, social engineering tactics, and other common threats.
By fostering a security-conscious culture, organizations can prevent attacks during the delivery stage of the kill chain. It can also lower the risk of non-malware cyber attacks.
Research and Advanced Insights on the Cyber Kill Chain
As cyber threats evolve, researchers continue to refine how the cyber kill chain is understood and applied. The following resources explore emerging strategies, theoretical models, and the impact of new technologies such as AI on cyber defense:
-
Heliyon, “Impact of AI on the Cyber Kill Chain: A Systematic Review”: Researches the impact of advances in AI on cyber attacks and the changing cyber threat landscape; concludes that AI-based tools have the greatest impact in the initial stages of an attack and recommends defense tools to counterattacks
-
International Journal of System Assurance Engineering and Management, “Modelling Cybersecurity Strategies With Game Theory and Cyber Kill Chain”: Applies a strategic game model to cybersecurity; uses a case study approach to understand cyber defense challenges and develop more effective strategies
-
Journal of Cybersecurity and Privacy, “From Context to Action: Establishing a Pre-Chain Phase Within the Cyber Kill Chain”: Suggests a pre-chain phase that focuses on contextual anticipation, or identifying actionable signals that take place before reconnaissance; demonstrates how contextual anticipation provides lead-time benefits for cybersecurity professionals
-
Future Generation Computer Systems, “MTD in Depth: Multi-Phased Moving Target Defense Techniques Against Cyber-Attacks Based on Cyber Kill Chain”: Evaluates a multiphase Moving Target Defense (MTD) technique framework as a proactive approach to changing attack surfaces
-
European Journal of International Security, “Cybersecurity in Practice: The Vigilant Logic of Kill Chains and Threat Construction”: Analyzes the history of the kill chain framework and evaluates the threat construction practices of cybersecurity experts
Implementing a Cyber Kill Chain Framework
Implementing a cyber kill chain framework requires organizations to anticipate attacker behavior and align security strategies across each stage of an attack. By understanding how threats progress from reconnaissance to execution, cybersecurity teams can identify vulnerabilities earlier and respond more effectively.
In practice, this means applying layered defenses throughout the attack lifecycle. For example, cybersecurity tools can detect unusual activity during reconnaissance, while simulations and penetration testing can uncover weaknesses before hackers exploit them in later stages.
When implemented effectively, the cyber kill chain framework helps organizations move from reactive defense to proactive threat detection.