The Pyramid of Pain is a cybersecurity model created by David Bianco. It explains a simple idea; some defenses barely slow attackers down, while others force them to change how they work.Â
The model organizes indicators of compromise into a hierarchy. At the bottom are technical artifacts that are easy to modify. At the top are behavioral patterns that are much harder to replace.Â
Understanding this pyramid helps organizations move beyond surface-level detection toward meaningful adversary disruption.Â
Table of Contents
The Core Idea Behind the PyramidÂ
Every attacker leaves traces. These traces can be grouped into different categories, such as file hashes, IP addresses, domain names, tools, or techniques.Â
However, not all traces are equal.Â
- If a detection forces an attacker to simply swap an IP address, the operational impact is minimal.Â
- If a detection forces an attacker to redesign their lateral movement strategy, the impact is significant.Â
The Pyramid of Pain visualizes this difference.Â
The higher the indicator sits on the pyramid, the more effort and cost it imposes on the adversary.Â
Breaking Down the PyramidÂ
Let’s examine the layers from bottom to top.Â
Hash Values
Hash values are digital fingerprints of files, such as SHA256 or MD5 signatures.Â
They are widely used in antivirus and endpoint detection systems to block known malware.Â
The limitation is straightforward. Changing a single line of code generates a new hash. Attackers can automate this process.Â
Hash-based detection is useful for known threats and quick containment. However, it creates very little long-term disruption.Â
IP Addresses
IP addresses are often used in threat intelligence feeds and firewall policies.Â
Blocking malicious IPs can stop active connections and prevent immediate communication with attacker infrastructure.Â
But IP addresses are disposable. Cloud hosting providers, compromised servers, and proxy networks allow attackers to rotate infrastructure rapidly.Â
The friction created is real but temporary.Â
Domain Names
Domains require registration and configuration. Monitoring suspicious domains can expose phishing campaigns or command-and-control activity.Â
Replacing a domain is more involved than changing an IP address, but it is still manageable for most threat actors.Â
Detection at this level introduces moderate operational inconvenience, especially if domains are part of coordinated campaigns.Â
Network and Host Artifacts
This is where detection begins to create meaningful pressure.Â
Artifacts include:Â
- Suspicious registry modificationsÂ
- Abnormal process execution chainsÂ
- Scheduled task creationÂ
- Unique HTTP request patternsÂ
- TLS fingerprint anomaliesÂ
These signals reflect how malware or intrusion tools behave within systems.Â
To evade detection at this level, attackers must modify their tooling. That requires development effort and testing. Mistakes become more likely.Â
The cost increases.Â
Tools
Attackers rely on tools to achieve objectives. These may include credential dumping utilities, remote access implants, exploit frameworks, or custom malware families.Â
If defenders consistently detect the use of specific tools, adversaries must:Â
- Replace trusted frameworksÂ
- Develop new variantsÂ
- Retrain operatorsÂ
- Accept higher operational riskÂ
Changing tools is far more complex than changing infrastructure.Â
At this level, disruption becomes strategic rather than tactical.Â
Tactics, Techniques, and Procedures
At the top of the pyramid are behaviours.Â
These align with structured frameworks such as MITRE ATT&CK, which categorizes how adversaries achieve objectives.Â
Examples include:Â
- Credential dumpingÂ
- Privilege escalationÂ
- Lateral movementÂ
- Persistence mechanismsÂ
- Data exfiltration workflowsÂ
Techniques represent intent and method, not specific tools or infrastructure.Â
If detection consistently identifies these behaviors, attackers cannot simply swap components. They must rethink how they accomplish their goals.Â
This is the highest level of pain.Â
Why the Pyramid Still MattersÂ
Modern threat actors operate with automation and agility. Infrastructure can be replaced in minutes. Malware can be repacked instantly.Â
If defensive strategy relies only on blocking static indicators, it will always trail behind attacker adaptation.Â
The Pyramid of Pain encourages a shift in mindset:Â
- From reacting to known artifactsÂ
- To identifying patterns of behaviorÂ
This shift creates resilience. Behavioral detection remains effective even when malware variants change.Â
Applying the Pyramid in PracticeÂ
Organizations can use the Pyramid of Pain to evaluate detection maturity.Â
Key questions include:Â
- How many detections rely solely on threat feeds?Â
- Can malicious behavior be detected even if the file has never been seen before?Â
- Is lateral movement visible without knowing the exact malware family?Â
Moving upward requires deeper visibility across endpoints, networks, identities, and cloud environments.Â
It also requires correlation. Single events rarely tell the whole story. Patterns across multiple systems provide stronger signals.Â
Why Network Visibility Matters at the Top of the PyramidÂ
As you move higher on the Pyramid of Pain, detection shifts from simple indicators to attacker behavior. At this level, visibility becomes critical.Â
Files can change. IP addresses can rotate. Domains can be replaced. But attackers still need to communicate, move across systems, and move data. Those actions leave patterns in network traffic.Â
This is where network visibility becomes powerful.Â
Network Detection and Response, or NDR, focuses on monitoring and analysing network traffic in real time. Instead of looking only for known bad files or addresses, it looks for suspicious activity patterns.Â
For example:Â
- Repeated outbound beaconingÂ
- Rapid internal access by one userÂ
- After-hours data spikesÂ
- Suspicious encrypted connectionsÂ
Even if the malware is new and has never been seen before, these behaviours can still stand out.Â
At the top of the pyramid, detection is not about recognizing a specific file or IP. It is about recognizing activity that does not fit normal patterns.Â
Network visibility helps uncover:Â
- Lateral movement inside the environmentÂ
- Command and control communicationÂ
- Data staging before exfiltrationÂ
- Unusual authentication flowsÂ
These are technique-level signals. They reflect what an attacker is trying to achieve, not just what tool they are using. When organizations rely only on static indicators, they often miss these deeper patterns. But when network behavior is continuously monitored and analysed, it becomes much harder for attackers to operate quietly.Â
The clearer the view across your network, the easier it becomes to detect activity at the top of the Pyramid of Pain. And that is where real defensive advantage begins.Â
The Strategic ImpactÂ
When detection focuses on higher levels of the pyramid, several benefits emerge:Â
- Reduced repeat intrusion patternsÂ
- Faster identification of new attack variantsÂ
- Shorter attacker dwell timeÂ
- Stronger resilience against infrastructure rotationÂ
Blocking one hash may stop one version of malware.Â
Detecting credential access techniques can stop an entire intrusion campaign.Â
The difference lies in whether detection targets artifacts or behavior.Â
ConclusionÂ
The Pyramid of Pain is really about perspective. It pushes us to ask a simple question: are we just blocking what attackers leave behind, or are we making their job harder?Â
IPs and hashes are easy to replace but not tradecraft.Â
When detection focuses on behavior, attackers lose comfort and predictability. And that is when defense starts to gain the upper hand.Â