+44 (0)203 88 020 88

Menu

Search

Cyber Security News & Articles

 

Cyber Security
News & Articles

Trusted Cyber Security Experts
25+ Years Industry Experience
Ethical, Professional & Pragmatic

What is Mitre ATT&CK?

Mitre ATT&CK helps security managers defend their networks by providing a framework for categorising the techniques and tactics used in real world cyberattacks.

Founded in 2013 in order to document the common threats, tactics and procedures used to attack Windows networks, Mitre ATT&CK has gathered data and telemetry on real world attacks which can be used to defend today’s networks.

Today the scope of ATT&CK has been expanded beyond Windows networks to include MacOS, Linux, AWS, Azure, Office365 and mobile devices. ATT&CK stands for Adversarial Tactics, Techniques, and Common Knowledge.

The ATT&CK framework is written and organised from the perspective of the attacker. It asks the questions: what is the attacker trying to achieve? and how are they trying to do it?  If you can answer those questions then it is much easier to design defences and detection systems optimised to spot those activities on your network.

What is the ATT&CK Matrix for Enterprise?

The ATT&CK framework is published as a matrix on the ATT&CK homepage.  The framework is organised around a series of tactics used by attackers – such as gaining Initial Access, or Lateral Movement around the network.  Under each tactic is listed numerous techniques that have been observed as a means to achieve the tactic.

Many security managers offices have a large printout of the matrix on the wall with each technique colour coded to indicate the defences in place in their network to mitigate or defend against that technique.  It’s an easy way to get an overview of the defences in place and spot any gaps.

What are the ATT&CK tactics?

The tactics described by the ATT&CK framework represent the objectives of attackers when they target your network.   Are they trying to achieve a persistent presence, is lateral movement needed in order to reach their ultimate target?  Each tactic is enabled by a number of techniques which are used by attackers in order to achieve their objectives.

There are 12 tactics described in the framework:

Initial Access

Initial access describes the various techniques used by the attackers in order to first establish a beach-head in your network.  This may involve exploiting a vulnerability in a public-facing web server or some form of spearphishing attack in order to capture credentials from a user.

Execution

The attacker tries to run malicious code using Execution techniques.  Typically co-ordinated with other techniques such as Discovery in order to achieve the wider goals of the attack.  The attacker may run a utility in order to map the network and identify the database servers which contain the data they want to steal.

Persistence

The persistence techniques establish a permanent foothold in the network using different techniques than those used during the Initial Access.  For example, a spearphished set of credentials could be used to obtain Initial Access however that access will be lost as soon as the account password is changed.  Persistence techniques such a creating new accounts, adding start-up code or installing remote access tools allow the attacker to continue to infiltrate the network after the Initial Access vulnerability is resolved.

Privilege Escalation

If the attackers gain access to privilege accounts such as Administrator or Root level access it will be easier to establish persistence and access the network resources they need to meet their objectives.

Defence Evasion

Defence Evasion techniques help the attackers avoid detection.  They include disabling security software, obfuscating their own tools and scripts to avoid being fingerprinted by anti-malware software.

Credential Access

By stealing account names and passwords with keyloggers or dumping the credentials using privileged accounts, the attackers are able to impersonate legitimate users and gain access to secure data and resources on the network.

Discovery

Attackers use Discovery techniques in order to work out how your network is configured and what devices and possible targets can be found on it.   This could include techniques such as listing applications running on a compromised server, using stolen credentials to access dashboards, listing local or domain user accounts and reviewing browser bookmarks for any compromised accounts.

Lateral Movement

Lateral Movement techniques enable the attackers to move away from the point of Initial Access and explore the rest of the network.  They may need to compromise and pivot through several systems and user accounts in order to reach their ultimate target.  Techniques include capturing application authentication tokens or Kerberos tickets in order to access systems and activating remote desktop services to facilitate easy access to servers.

Collection

Collection techniques are used to gather data of use to the attackers. This is not just the target data they wish to steal (such as cardholder data) but also information useful during the attack.  This could include capturing screenshots, audio recordings or emails.

Command and Control

Command and Control techniques enable the attackers to communicate with compromised systems within your network and remotely issue commands and execute code. They may try to hide their message traffic by using well known ports and disguising their traffic as normal web browsing or email traffic for example.

Exfiltration

If data theft is the objective of the attack, then Exfiltration techniques will be used to gather, compress, disguise and transmit the data out of the network.

Impact

The attacker’s main motive may be to disrupt your business by destroying data or simply to cover their tracks after exfiltrating customer records.  Either way, Impact techniques such as data deletion, account and permissions removal, disk wipes or formats, and data encryption for ransom will all have an impact on your business.

Mitigation and Detection of ATT&CK Techniques

The ATT&CK framework includes an extensive set of Mitigations that are related to the Techniques described in the ATT&CK matrix.  Security managers can review each recommended mitigation and apply it as appropriate to their own network.

The MITRE Cyber Analytics Repository  includes details of real-world examples of the various techniques described in ATT&CK along with example triggers and pseudocode that can be used to detect the attack.  This will help network engineers to configure Intrusion Detection Systems and other security systems to detect attacks as they occur.

 

 

 

Subscribe to our monthly newsletter today

If you’d like to stay up-to-date with the latest cyber security news and articles from our technical team, you can sign up to our monthly newsletter. 

We hate spam as much as you do, so we promise not to bombard you with emails. We’ll send you a single, curated email each month that contains all of our cyber security news and articles for that month.

Why Choose SecureTeam?

CREST
CCS
ISO9001
ISO27001
CE-PLUS

Customer Testimonials

“We were very impressed with the service, I will say, the vulnerability found was one our previous organisation had not picked up, which does make you wonder if anything else was missed.”

Aim Ltd Chief Technology Officer (CTO)

"Within a very tight timescale, SecureTeam managed to deliver a highly professional service efficiently. The team helped the process with regular updates and escalation where necessary. Would highly recommend"

IoT Solutions Group Limited Chief Technology Officer (CTO) & Founder

“First class service as ever. We learn something new each year! Thank you to all your team.”

Royal Haskoning DHV Service Delivery Manager

“We’ve worked with SecureTeam for a few years to conduct our testing. The team make it easy to deal with them; they are attentive and explain detailed reports in a jargon-free way that allows the less technical people to understand. I wouldn’t work with anyone else for our cyber security.”

Capital Asset Management Head of Operations

“SecureTeam provided Derbyshire's Education Data Hub with an approachable and professional service to ensure our schools were able to successfully certify for Cyber Essentials. The team provided a smooth end-to-end service and were always on hand to offer advice when necessary.”

Derbyshire County Council Team Manager Education Data Hub

“A very efficient, professional, and friendly delivery of our testing and the results. You delivered exactly what we asked for in the timeframe we needed it, while maintaining quality and integrity. A great job, done well.”

AMX Solutions IT Project Officer

“We were very pleased with the work and report provided. It was easy to translate the provided details into some actionable tasks on our end so that was great. We always appreciate the ongoing support.”

Innovez Ltd Support Officer

Get in touch today

If you’d like to see how SecureTeam can take your cybersecurity posture to the next level, we’d love to hear from you, learn about your requirements and then send you a free quotation for our services.

Our customers love our fast-turnaround, “no-nonsense” quotations – not to mention that we hate high-pressure sales tactics as much as you do.

We know that every organisation is unique, so our detailed scoping process ensures that we provide you with an accurate quotation for our services, which we trust you’ll find highly competitive.

Get in touch with us today and a member of our team will be in touch to provide you with a quotation. 

0

No products in the basket.

No products in the basket.