What is the Cyber Kill Chain?

The Cyber Kill Chain is a model that describes the phases of a targeted cyber attack — from preparation through to actual impact. It was developed by Lockheed Martin and helps organisations understand, detect and disrupt attacks.

In an OT context, the Kill Chain is useful for analysing and interrupting attacks on production environments, such as APTs, in a structured way.


🔁 The 7 phases of the Cyber Kill Chain

# Phase Description in OT context
1 Reconnaissance Gathering information about PLCs, SCADA, suppliers, network layout
2 Weaponization Building a payload (e.g. modified firmware, backdoor for an HMI)
3 Delivery Distribution via phishing, USB, vulnerable remote access or supply chain
4 Exploitation Executing the exploit (e.g. abuse of unprotected engineering software)
5 Installation Installing malware, RAT or rogue tools on an HMI or engineering station
6 Command & Control Setting up a communication channel to the attacker (e.g. via a Historian bridge)
7 Actions on Objective Data breach, PLC sabotage, manipulation of sensor values, etc.

🧠 Kill Chain & OT-specific examples

Phase Example
Reconnaissance The attacker scans the network and discovers an open TCP/102 (S7 Comm) to a PLC
Weaponization The attacker builds custom Ladder Logic for sabotage
Delivery A trojan is delivered via a vendor’s update package (see supply chain risk)
Exploitation The PLC accepts unsigned code without Code Signing
Installation Backdoor on the Engineering Station or SCADA web server
Command & Control Outbound connection via Historian to the attacker’s server
Actions on Objective Temperature sensor manipulated, safety function disabled

🔐 Breaking the Kill Chain

Phase Defensive measure
Reconnaissance Network segmentation, Firewall, SIEM logging
Weaponization Threat Intelligence and IOC detection
Delivery Email Filtering, USB Control, Software Whitelisting
Exploitation Patch management, Access Control, Vulnerability Scanning
Installation EDR, Application Control, Least Privilege
Command & Control Proxy, DNS Monitoring, anomaly detection
Actions on Objective Zero Trust Architecture, Incident Response Plan

The earlier you intervene in the chain, the greater the chance of stopping the attack without damage.


✅ Why is this model valuable in OT?

  • It structures thinking about cyber attacks in an industrial context
  • You can map measures per phase to existing systems and processes
  • It supports training of operators, engineers and security teams
  • Integrates with MITRE ATT&CK for ICS for additional depth

📌 In summary

The Cyber Kill Chain shows how cyber attacks unfold and where it is best to detect and interrupt them. In OT environments, early detection in phases 1–3 is essential to avoid physical impact in phase 7.