An intelligence driven defense process, originally developed by Lockheed Martin, which allows information security professionals to proactively remediate and mitigate advanced threats in the future.

Reconnaissance – harvesting email addresses, conference information, etc.

Weaponization – Coupling exploit with backdoor into deliverable payload.

Delivery – Delivering weaponized bundle to the victim via email, web, USB, etc.

Exploitation – Exploiting a vulnerability to execute code on victim’s system.

Installation – installing malware on the asset.

Command and Control – Command channel for remote manipulation of victim.

Action and Objectives – With “hands on Keyboard” access intruders accomplish their original goal.

Kill Chain