MITRE Attack
Introduction
- The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is a comprehensive and detailed matrix of tactics and techniques used by cyber adversaries throughout the lifecycle of an attack.
- Developed by MITRE Corporation, the framework is widely adopted by cybersecurity professionals to understand, detect, and mitigate cyber threats. Here’s an overview of the MITRE ATT&CK framework:
Key Components of the MITRE ATT&CK Framework:
- Tactics
Description
: Tactics represent the “why” of an attack technique. They are the adversary’s tactical goals during an attack, such as gaining initial access to a network or exfiltrating data.Examples
: Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, Impact.
- Techniques
Description
: Techniques describe the “how” of an attack. They are the methods adversaries use to achieve their tactical goals.Examples
: Phishing, Spear Phishing, Exploiting Vulnerabilities, Using Valid Accounts, Process Injection, Obfuscation, Credential Dumping, Network Service Scanning, Data Staging, Data Exfiltration Over C2 Channel.
- Sub-Techniques
Description
: Sub-techniques provide more granular details on how a specific technique is executed.Examples
: For the Phishing technique, sub-techniques might include Spear Phishing via Service, Spear Phishing Attachment, and Spear Phishing Link.
- Procedures
Description
: Procedures are specific implementations of techniques or sub-techniques used by adversaries in real-world attacks.Examples
: Detailed descriptions of how specific threat actors or malware families carry out techniques like credential dumping or data exfiltration.
Use Cases of MITRE ATT&CK:
- Threat Detection and Response
Description
: Security teams use the MITRE ATT&CK framework to identify which techniques adversaries are using in their environment and to develop detection and mitigation strategies.Example
: Using ATT&CK mappings to correlate observed activities in security logs with known adversary techniques.
- Threat Intelligence
Description
: Analysts use the framework to categorize and describe observed adversary behaviors, helping to enrich threat intelligence reports.Example
: Mapping threat actor behaviors to specific ATT&CK techniques in intelligence reports to provide actionable insights.
- Security Gap Analysis
Description
: Organizations use the framework to assess their security controls and identify gaps in their defenses.Example
: Conducting a security assessment to determine which ATT&CK techniques are not adequately covered by existing security measures.
- Red Teaming and Purple Teaming
Description
: Red teams (attackers) and blue teams (defenders) use the framework to plan, execute, and defend against simulated attacks.Example
: Red teams designing attack scenarios based on ATT&CK techniques and blue teams developing corresponding detection and response playbooks.
- Training and Awareness
Description
: The framework is used for educating security professionals about adversary tactics, techniques, and procedures.Example
: Incorporating ATT&CK techniques into cybersecurity training programs to improve detection and response skills.
Benefits of MITRE ATT&CK:
Standardization
: Provides a common language and structure for describing cyber adversary behaviors.Comprehensiveness
: Covers a wide range of tactics and techniques, offering detailed insights into adversary methods.Community-Driven
: Continuously updated with contributions from the cybersecurity community, ensuring it stays current and relevant.Actionable Intelligence
: Helps organizations to prioritize defenses and develop effective detection and response strategies.
This post is licensed under CC BY 4.0 by the author.