Attack Stage
In cybersecurity and attack path intelligence, an Attack Stage is a single, discrete phase within the linear progression of a cyberattack. It serves as a descriptive identifier for a standardized sequence of events—often referred to as a Kill Chain Phase—that an adversary must complete to achieve a specific malicious objective.
Breaking down an attack into these stages is essential for identifying "choke points" where a defender can disrupt the entire adversarial narrative.
What is an Attack Stage?
An attack stage defines the functional unit of an adversarial movement. It moves beyond identifying a single vulnerability to explaining its place within the overall lifecycle of a breach. For example, a "Step Action" such as payload crafting is categorized under the Weaponization attack stage.
By categorizing findings into stages, security teams can shift from managing thousands of isolated alerts to understanding a handful of cohesive threat models.
The Core Stages of an Attack Path
While different frameworks use varied terminology, most attack paths follow a recurring logical pattern:
1. Discovery and Reconnaissance
This is the preliminary stage where the attacker gathers intelligence on the target's digital footprint.
Activities: Domain enumeration, identifying metadata endpoints, and researching executives on social media.
Goal: To map the "what" and "where" of the target to find the path of least resistance.
2. Preparation and Weaponization
In this "staging" phase, the adversary builds the tools and infrastructure needed for the specific target.
Activities: Registering lookalike domains, setting up command-and-control (C2) channels, and crafting exploit payloads.
Goal: To build the "how"—the technical means to execute the attack.
3. Engagement and Initial Access
The attacker executes the plan to gain a foothold in the target environment.
Activities: Phishing campaign execution, exploiting public-facing applications, or using stolen VPN credentials.
Goal: To gain the first point of entry into the organization.
4. Expansion and Lateral Movement
Once inside, the attacker moves through the network to escalate their control and find high-value data.
Activities: Internal reconnaissance, harvesting passwords from memory, and accessing administrative interfaces.
Goal: To grow their "reach" and locate the organization's "crown jewel" assets.
5. Extraction and Impact
In the final stage, the adversary achieves their primary mission, which typically results in material loss for the organization.
Activities: Data exfiltration, document extraction, and ransomware execution.
Goal: To take the "value"—whether through financial theft or operational disruption.
Why Understanding Attack Stages is Critical
Analyzing security through the lens of stages provides a strategic roadmap for defense:
Breaking the Chain: A cyberattack is a linear sequence. If a defender stops an attacker at any single stage, the entire attack path fails.
Contextual Prioritization: A vulnerability that allows an attacker to move from "Initial Access" to "Privilege Escalation" is far more dangerous than a standalone flaw that does not lead to a deeper stage.
Identifying Choke Points: Many different attack paths often converge at the same stage or asset. Securing these "choke points" offers the highest return on security investment.
Common Questions About Attack Stages
How does an attack stage differ from an attack vector?
An attack vector is the specific route or method of entry (e.g., a phishing email). An attack stage is one of several phases in the entire journey that encompasses those vectors.
What is the "Dark Zone" in the attack stage?
The "Dark Zone" refers to activities that occur outside your network, such as reconnaissance on public sites or resource development in third-party repositories. These are the hardest to defend because they generate no internal logs.
Can non-technical events be an attack stage?
Yes. In advanced intelligence, "Conversational Risk"—such as public chatter on forums or news of organizational layoffs—is considered an early stage because it provides the reconnaissance data needed for a successful breach.
In cybersecurity and attack path intelligence, an Attack Stage is a single, discrete phase in the linear progression of a threat. It serves as a descriptive identifier for a standardized sequence of events—often called a Kill Chain Phase—that an adversary must complete to advance toward their objective.
ThreatNG empowers organizations to disrupt these stages by providing an "outside-in" view of the attack surface, using its DarChain (Digital Attack Risk Contextual Hyper-Analysis Insights Narrative) capability to transform technical data into a predictive story of adversarial movement.
External Discovery of Attack Stage Nodes
The first step in securing an attack path is identifying the nodes where an attacker might start. ThreatNG performs purely external, unauthenticated discovery to map an organization's entire digital footprint without requiring internal agents.
Shadow IT Identification: ThreatNG uncovers unmanaged cloud instances or forgotten subdomains. These assets are often the first nodes in the Reconnaissance stage because they lack formal security monitoring.
Asset Attribution: The platform identifies domains, IPs, and cloud buckets associated with the organization, establishing the technical ground truth that attackers seek during the discovery stage.
Supply Chain Enumeration: ThreatNG maps dependencies on external vendors and SaaS applications, identifying attack stages that could originate in a third-party environment and move toward the primary organization.
External Assessment and DarChain Narrative Mapping
ThreatNG’s DarChain engine performs "Digital Risk Hyper-Analysis" to chain disparate technical, social, and regulatory findings into a structured threat model. This illustrates the Chained Relationships, in which another vulnerability amplifies the risk of a vulnerability across different stages.
Detailed Examples of Assessment via DarChain
The Phishing-to-Credential Theft Narrative: DarChain might identify a registered lookalike domain with an active mail record. It chains this with leaked executive profiles found on LinkedIn and a subdomain missing a Content Security Policy (CSP). The resulting path description explains how an attacker uses a believable persona to trick employees into providing credentials, which are then harvested through the vulnerable subdomain.
The Subdomain Takeover Narrative: ThreatNG identifies a "dangling DNS" record pointing to an inactive service. DarChain explains how an attacker can claim that resource to host a malicious script. Because the script is on a legitimate subdomain, it bypasses security controls to steal user session cookies during the Initial Access stage.
The Governance Gap Disclosure: ThreatNG mines SEC 8-K filings and correlates disclosed risks with technical vulnerabilities. If a company discloses a specific risk but has an unpatched "Critical" vulnerability in that area, DarChain highlights how attackers use public statements to validate the value of their target for ransomware demands.
Investigation Modules for Deep-Dive Analysis
ThreatNG includes specialized investigation modules that allow analysts to pivot from a high-level attack stage to a granular investigation of specific Step Actions and the Step Tools an adversary is likely to use.
Detailed Examples of Investigation Modules
Sensitive Code Exposure: This module scans public repositories such as GitHub for leaked API keys, cloud credentials, and Jenkins passwords. Finding a hardcoded secret provides a validated step for an Unauthorized Access stage, allowing an attacker to bypass traditional perimeters.
Dark Web Presence (DarCache Rupture): This module monitors hacker forums for mentions of the brand and compromised credentials. An investigation might reveal attackers discussing a specific unpatched vulnerability, marking the Post-Exploitation stage as a high priority.
Social Media Discovery: These modules turn "conversational risk" from Reddit or LinkedIn into intelligence. If an employee asks for technical help online, an attacker can use that information to build a technical blueprint for a targeted Social Engineering attack stage.
Intelligence Repositories and Continuous Monitoring
The DarCache suite of intelligence repositories provides the real-world context needed to prioritize attack stages. It integrates data from the KEV (Known Exploited Vulnerabilities) catalog to confirm active exploitation and EPSS to predict future likelihood. ThreatNG also performs Continuous Monitoring, constantly rescanning the external attack surface to ensure that, as soon as a new asset or vulnerability appears, the attack stage map is updated in real time.
Reporting and Actionable Insights
ThreatNG provides multi-level reporting that translates technical findings into business-risk narratives.
Technical Workbooks: These reports identify Attack Path Choke Points—critical vulnerabilities where multiple potential attack chains intersect.
Executive Dashboards: These provide a high-level view of the organization's risk score, helping leadership understand which attack stages are most vulnerable to exploitation.
Cooperation with Complementary Solutions
ThreatNG provides the external intelligence that triggers and enriches the workflows of internal security tools to break the attack stage chain.
Identity and Access Management (IAM): When ThreatNG uncovers leaked API keys or credentials in public code, it feeds this data to IAM platforms to trigger immediate key rotation or password resets, ending an identity-based attack stage.
Security Orchestration, Automation, and Response (SOAR): High-priority alerts from a "Subdomain Takeover" path can trigger SOAR playbooks to automatically delete a dangling DNS record or block malicious IP addresses at the perimeter firewall.
Vulnerability Management and EDR: ThreatNG identifies the specific "Tech Stack" an attacker is targeting. This allows internal vulnerability scanners to prioritize those assets and enables Endpoint Detection and Response (EDR) tools to increase monitoring sensitivity on the specific servers identified in a potential attack path.
Common Questions About Attack Stages
How does an attack stage differ from an attack vector?
An attack vector is a specific technical method used to exploit a vulnerability, such as a phishing email. An attack stage is a broader phase in the entire journey—such as Initial Access—that encompasses those vectors.
What is an "Attack Path Choke Point"?
A choke point is a critical vulnerability or asset that appears in multiple different attack narratives. Securing a choke point is the most efficient use of resources because it disrupts the most significant number of potential adversarial movements at once.
Can non-technical events initiate an attack stage?
Yes. ThreatNG treats organizational instability, such as layoff chatter or lawsuits, as a core part of its intelligence, recognizing that these events provide the psychological "hook" used for the Reconnaissance and Social Engineering stages.

