MITRE ATT&CK (Adversarial Ways, Strategies, and Frequent Information) is a complete framework that outlines varied phases of menace actors’ assault lifecycles and their goal platforms. This framework categorises malicious cyberattacks and offers particular methods for defending in opposition to them. This information will assist you to perceive MITRE ATT&CK.
Construction of MITRE ATT&CK
The ATT&CK framework consists of ways and methods and their documented utilization. Ways check with an assault’s short-term, premeditated targets, whereas methods describe the strategies used to attain these targets.
Origins of MITRE ATT&CK
MITRE ATT&CK originated in 2013 from MITRE’s Fort Meade Experiment (FMX). Researchers simulated attacker and defender behaviours throughout this experiment to boost post-compromise menace detection by means of telemetry sensing and behavioural evaluation.
Iterations of MITRE ATT&CK
Through the years, the framework has developed by means of a number of iterations, every bettering and increasing on the earlier variations:
Iteration | 12 months | Description |
---|---|---|
ATT&CK v1 | 2015 | Launched with 12 ways and 76 methods. |
ATT&CK v2 | 2016 | Expanded to fifteen ways and 150 methods. |
ATT&CK v3 | 2017 | Carried out a extra structured method, grouping methods by objective, corresponding to preliminary entry, execution, or exfiltration. |
ATT&CK v4 | 2018 | It included new ways and methods associated to cloud environments and cell units and launched a sub-matrix to know menace actor methods higher. |
ATT&CK v5 | 2019 | Included new ways and methods associated to cloud environments and cell units, and launched a sub-matrix for higher understanding of menace actor methods. |
ATT&CK v6 | 2020 | Added ways and methods related to containerized environments and different rising applied sciences. |
ATT&CK v7 | 2021 | Launched methods associated to ransomware, provide chain assaults, and different rising threats. |
Variations of MITRE ATT&CK
MITRE ATT&CK framework variations cater to totally different focus areas. ATT&CK for:
Enterprise: Focuses on conventional enterprise networks, protecting ways and methods used to realize entry, transfer laterally, and exfiltrate information from these networks.
Cell: Targets cell units, together with smartphones and tablets, and covers ways and methods for compromising these units and stealing delicate information.
ICS: Concentrates on Industrial Management Techniques (ICS) utilized in managing vital infrastructure corresponding to energy grids, water remedy amenities, and transportation methods. It covers ways and methods for compromising ICS methods and disrupting vital infrastructure.
Instance State of affairs: E-commerce Web site Assault
Take into account an e-commerce web site the place an attacker goals to steal buyer information and bank card data. Initially, the assault begins with the attacker gaining preliminary entry by sending a phishing e-mail to an worker. The e-mail methods workers into clicking a malicious hyperlink and putting in malware on their computer systems. As soon as the malware is in place, it makes use of PowerShell to execute scripts, thereby gaining management of the worker’s machine.
The attacker creates a brand new person account with administrative privileges to keep up entry. Moreover, in search of higher-level privileges, the attacker exploits a system vulnerability. To keep away from detection by antivirus software program, the attacker obfuscates their malware. With management over the system, the attacker subsequent makes use of instruments to extract login credentials, thus getting access to the community. They then proceed to scan the community to determine different weak methods.
Utilizing the stolen credentials, the attacker accesses different methods inside the community and collects delicate information, together with buyer data and bank card particulars, from databases. The collected information is exfiltrated by means of an encrypted command and management (C2) channel. Lastly, the attacker destroys logs and different forensic proof to cowl their tracks, leaving the e-commerce web site compromised and its information stolen.
Wrapping Up
MITRE ATT&CK is a useful useful resource for understanding and defending in opposition to cyber threats. Organizations can higher defend their methods and information from adversaries by staying knowledgeable concerning the evolving ways and methods outlined on this framework. Leveraging the insights and methods offered by MITRE ATT&CK is important for sustaining strong cybersecurity defences.
References
MITRE ATT&CK web site: https://assault.mitre.org/