The Lockheed Martin Cyber Kill Chain is a framework that describes the stages of a cyber attack, from initial reconnaissance to achieving the attacker’s objective. It is often referenced in HPE Aruba Networking security documentation to help organizations understand and mitigate threats.
Option A, "In the delivery stage, the hacker delivers malware to targeted users, often with spear phishing methods," is correct. The delivery stage in the Lockheed Martin kill chain involves the attacker transmitting the weaponized payload (e.g., malware) to the target. Spear phishing, where the attacker sends a targeted email with a malicious attachment or link, is a common delivery method. This stage follows reconnaissance (gathering information) and weaponization (creating the malware).
Option B, "In the installation phase, hackers seek to install vulnerabilities in operating systems across the network," is incorrect. The installation phase involves the attacker installing the malware on the target system to establish persistence (e.g., by creating a backdoor). It does not involve "installing vulnerabilities"; vulnerabilities are pre-existing weaknesses that the attacker exploits in the exploitation phase.
Option C, "In the weaponization stage, malware installed in the targeted network seeks to attack intrusion prevention systems (IPS)," is incorrect. The weaponization stage occurs before delivery and involves the attacker creating a deliverable payload (e.g., combining malware with an exploit). The malware is not yet installed in the target network during this stage, and attacking an IPS is not the purpose of weaponization.
Option D, "In the exploitation phase, hackers conduct social engineering attacks to exploit weak algorithms and crack user accounts," is incorrect. The exploitation phase involves the attacker exploiting a vulnerability (e.g., a software flaw) to execute the malware on the target system. Social engineering (e.g., phishing) is typically part of the delivery stage, not exploitation, and "exploiting weak algorithms" is not a standard description of this phase.
The HPE Aruba Networking Security Guide states:
"The Lockheed Martin Cyber Kill Chain describes the stages of a cyber attack. In the delivery stage, the attacker delivers the weaponized payload to the target, often using methods like spear phishing emails with malicious attachments or links. This stage follows reconnaissance (gathering information about the target) and weaponization (creating the malware payload)." (Page 18, Cyber Kill Chain Overview Section)
Additionally, the HPE Aruba Networking AOS-8 8.11 User Guide notes:
"Understanding the Lockheed Martin kill chain helps in threat mitigation. The delivery stage involves the attacker sending malware to the target, commonly through spear phishing, where a targeted email tricks the user into downloading the malware or clicking a malicious link." (Page 420, Threat Mitigation Section)
[References:, HPE Aruba Networking Security Guide, Cyber Kill Chain Overview Section, Page 18., HPE Aruba Networking AOS-8 8.11 User Guide, Threat Mitigation Section, Page 420.===========]