Phase 1 - Gaining an Initial Foothold
PreviousUsing The Unified Kill Chain Model to Analyse Individual Cyber AttacksNextGaining Access to the Network
Last updated
Last updated
The first phase of our unified kill chain of sophisticated cyber attacks explains the adversaries’ actions at the beginning of the breach. All activities included in phase 1 are performed on the initially compromised asset, as shown in the following figure:
Jump In to view the stages in more detail: