The MITRE ATT&CK Framework: Know Your Enemy
Techsense team I 8:12 am, 4th December

Protection against cyberattacks is a priority for modern business. Detecting potential threats requires a thorough understanding of common attacker techniques and tactics. It is also important for organizations to know how to mitigate these risks. Unfortunately, cybercriminals are innovative and come up with new tactics all the time. It has become impossible for a single organization to monitor every single one of these techniques. It is even more difficult to translate these findings meaningfully for people outside the organization. To address these issues, MITRE created the ATT&CK Framework in 2013.
What is the MITRE ATT&CK framework?
MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is a comprehensive knowledge base for cybercriminal behavior, the various phases of attack, and the common platforms they target. It also offers a complete matrix of techniques and tactics used by cybersecurity specialists to classify attacks and evaluate an organization’s risk profile.
The framework is designed to answer pertinent questions about a cyberattack. For instance, how did the criminal manage the attack? How did he gain access? How did he move around? Having answers to such questions can help organizations take measures to prevent cyberattacks in the future. The MITRE ATT&CK framework provides real-life examples of appropriate adversary behavior. It also provides information about methods and techniques for environment-specific attacks and standardized language for different cybercriminal methodologies.
Who can use it?
All organizations can use the MITRE ATT&CK framework, regardless of whether they are public, private, or non-profit. It is available for enterprise environments and supports Windows, PRE, Linux, Mac OS, and Cloud. The framework is also available on Android and iOS mobile devices.
What does the MITRE ATT&CK matrix contain?
The MITRE ATT&CK matrix consists of a collection of techniques that adversaries use to accomplish an objective. Enterprise tactics have been segregated into 14 tactics:
1. Reconnaissance: Collecting information about the target organization
2. Resource Development: Establishing resources to execute an attack
3. Initial Access: Common techniques to get inside your network
4. Execution: Running a malicious code on the target network
5. Persistence: Maintain a foothold evading defense attempts
6. Privilege Escalation: Obtaining access to higher-level permissions
7. Defense Evasion: Avoiding detection by disabling security systems
8. Credential Access: Stealing account credentials
9. Discovery: Figuring out the network environment
10. Lateral Movement: Using legitimate credentials to move between systems
11. Collection: Gathering information to steal data
12. Command and Control: Controlling the network with different levels of stealth
13. Exfiltration: Exfiltrate data from the compromised network.
14. Impact: Manipulate, destroy, or interrupt the compromised systems
Who can benefit from the MITRE ATT&CK Framework?
All organizations can benefit from the MITRE ATT&CK framework. They can use it for tracking attacks, deciphering patterns, and evaluating the effectiveness of defense systems already in place.
Subscribe to our Newsletters

Stay up to date with our latest news
more news

GhostRedirector, nouveau groupe de menaces chinois, manipule Google et empoisonne les serveurs Windows – une découverte d’ESET
by ESET I 2:00 pm, 9th September
• ESET Research a découvert au moins 65 serveurs Windows compromis, d'après une analyse Internet réalisée en juin dernier.• ESET estime qu'un acteur malveillant et jusqu'alors inconnu, lié à la Chine, est probablement à l'origine de ces attaques. Il a été baptisé GhostRedirector par les chercheurs.• Les victimes se trouvent principalement aux États-Unis, au Brésil, en Thaïlande et au Vietnam.• Les victimes ne sont pas liées à un secteur spécifique, mais à divers secteurs, dont l'assurance, la santé, la vente au détail, les transports, la technologie et l'éducation.• GhostRedirector a développé Rungan, une nouvelle porte dérobée C++, capable d'exécuter des commandes sur le serveur de la victime.• GhostRedirector a aussi développé Gamshen, un module malveillant natif IIS, capable de perturber le référencement naturel (SEO - Search Engine Optimization).
load more