SlideShare a Scribd company logo
1 of 18
Download to read offline
I can haz cake: Benefits of working with MITRE
on ATT&CK
I can haz cake: Working
with MITRE on building a
better ATT&CK (for Linux)
Just my thoughts…
(Not those of the wider MITRE or Cisco teams)
The ATT&CK framework has undoubtably
been a huge success
• For MITRE
• Anecdotally, one of their most successful projects
• For the community
• Something to be studied, learnt from and often mimic’d
• Just look at the people, companies, projects and communities represented
here today
• For someone like me
• Many projects have built on it
• Threat-crank – extracts threat profiles from ATT&CK
• Ftd-attack-mapper – maps Cisco Firepower log events to ATT&CK
• Linux-malware – tracksadvances in Linux offensive and defensive capability
Some reflections on the nature of that
success
• What other technologies could be
considered?
• Collaboration?
• Applications?
• End user applications
• Enterprise applications
• Mainframes and enterprise UNIX?
• What about other non-ATT&CK matrices?
• What do more theoretical frameworks like FiGHT
and ATLAS offer?
• How might the incorporation of new matrices
impact users?
• How are other verticals best represented?
• We already have things like matrices such as
FiGHT and ATT&CK ICS but what about others
such as Finance
• What are the ”golden” protocols
• How could we map dependencies?
• Technique Command and Scripting Interpreter
begets Setuid and Setgid
• Are there better ways to think about
detection?
• Techniques > Data sources > Procedures > (…) >
Indicators
• Should attacker motivation and business
impact be considered?
• Beyond the scope of ATT&CK based matrices?
• Verizon’s DBIR might hold some clues
Why these questions are interesting
• Just as others here have done, I wanted to bring my passion and knowledge
to ATT&CK
• The threat landscape is changing
• FastCash – 31st December 2018
• UNC1945 – 2nd November 2020
• LightBasin/UNC1945 – 19th October 2021
• BPFDoor – 8th May 2022
• Symbiote – 9th June 2022
• CiscoTools – 13th May 2022
• Syslogk – 13th June 2022
• ProcessTreeSpoofingBindMountProc – 2nd May 2023
• FreeDownloadManager – 12th September 2023
A brief summary of the threat landscape
1. Botnets and bitcoins... Mostly target exposed IoT
2. Access brokers... Your Linux-based VPN provides a foothold into the org
3. Ransomware... Wherever they can get to in the enterprise, on Linux,
likely to target compute especially commercial hypervisors
4. Cloud/supply chain enthusiasts... Often but not always linked to 1 but
taking a path of deployment artefact compromise to reach their goal.
Haven't really seen them do this for 2, 3, 5 yet
5. Specialists... Likely to target specific protocols for commercial/political
value through collection (e.g. packets), these folks will probably only be
interested in you if you run a "golden" protocol e.g. payments,
communications or industrial control
The origins
of the linux-
malware
repository
May 2020
ATT&CK Community 5: All
of the threats -
Intelligence, modelling,
simulation and hunting
through an ATT&CKers
lens
July 2021
https://github.com/timb-
machine/linux-malware
October 2021
ATT&CK Community 8:
The UNIX malware
landscape - Reviewing the
goods at
MALWAREbazaar
Mar. 2022
ATT&CKcon 3.0 Threat
Modelling - It's not just
for developers
June 2022
ATT&CK Community 9:
Auditd for the newly
threatened
3 working hypotheses
• H1: Attackers are using our tools to target UNIX environments
• H2: Attackers are using techniques from ATT&CK to target UNIX
environments
• H3: ATT&CK is not representative of the TTPs that we find success
with
How it started…
• Gonna build me a honey pot, gonna
catch me some malware
• VPS instances
• Pcap all the things
• Containerised popular services
• Added default accounts
• Customised auditd policies
• Generic rules
• Bespoke rule generator
• Auditd based canaries
• Leverage MALWAREbazaar
• Free to use*
• Run your own hunts
• You can add Yara rules that fire on new
uploads
• You can build hunting rules based on
existing analytics
• You can browse, search for and download
samples
• Exposes APIs and statistics
• wget
• Python
• https://github.com/cocaman/malwar
e-bazaar
• Roll your own
* abuse.ch is a non-profit and benefits from donations and those who pay for
the API-based push functionality (vs email)
What I really want is UNIX malware (tag:elf et
al)
• Most is common garden IOT malware
• It would be super nice to grab just the unclassified stuff
• Not something I’ve got around to
H2: Attackers are using techniques from
ATT&CK to target UNIX environments
• Lazarus Group/HIDDEN COBRA: Probably the second best public UNIX breach report I’ve read
• https://github.com/fboldewin/FastCashMalwareDissected/
• https://malpedia.caad.fkie.fraunhofer.de/details/aix.fastcash
• Attacked AIX systems running payment software (SmartVista which is used for processing ATM transactions)
• UNC1945/LightBasin: A more recent example and my new favourite public UNIX breach report
• https://www.crowdstrike.com/blog/an-analysis-of-lightbasin-telecommunications-attacks/
• Attacked Solaris and Linux systems running mobile telco functions
• Unknown (high-end) adversary currently being investigated by Mandiant, Yoroi, CrowdStrike
• Binaries recently shared on VX Underground
• Targetting Solaris this time
• https://www.mandiant.com/resources/live-off-the-land-an-overview-of-unc1945
• https://twitter.com/timb_machine/status/1450595881732947968:
• The adversary is using a tool almost identical to an open source code from ~2001
• Had anyone spotted this?
• Perfect for a retro hunt
• This one is still being mapped… so many tools!
generate-
README.
md.py
generate-
ATT&CK.
md.py
retrieve-
articles.sh
binary-
lint.sh
triage-
binary.sh
intel-
lint.sh
analyse-
articles.pl
Automate all
the things…
• Wouldn’t it be nice to have Slack
integration?
• How about automated analysis?
• Robust enough to deal with Tim goes on
holiday J
Mapping reports with analytics (think
TRAM)…
Score reports’ word frequency
Compare reports word usage to
ATT&CK TTPs
Label reports
Identify artefacts documented but
missed in same or other report
•Title
•Content
•Industry references
•If report word matches ATT&CK TTP word
•Add word frequency score to label score
•If label score > threshold
•Propose label
•Known artefacts
•Similar scoring approach
•Different thresholds
•Again propose label
0
2
4
6
8
10
12
14
16
18
u
s
e
s
:
G
o
e
s
:
N
o
n
-
p
e
r
s
i
s
t
e
n
t
S
t
o
r
a
g
e
u
s
e
s
:
e
B
P
F
u
s
e
s
:
P
r
o
c
e
s
s
T
r
e
e
S
p
o
o
f
i
n
g
u
s
e
s
:
R
e
d
i
r
e
c
t
i
o
n
T
o
N
u
l
l
u
s
e
s
:
F
a
k
e
E
x
p
l
o
i
t
u
s
e
s
:
D
T
r
a
c
e
u
s
e
s
:
P
y
t
h
o
n
u
s
e
s
:
A
u
d
i
t
d
u
s
e
s
:
k
8
s
u
s
e
s
:
S
H
C
u
s
e
s
:
P
o
r
t
H
i
d
i
n
g
u
s
e
s
:
P
e
r
l
u
s
e
s
:
L
D
_
P
R
E
L
O
A
D
u
s
e
s
:
J
a
v
a
S
c
r
i
p
t
u
s
e
s
:
C
r
o
s
s
C
o
m
p
i
l
e
d
u
s
e
s
:
k
s
h
9
3
u
s
e
s
:
i
o
c
t
l
u
s
e
s
:
b
a
s
h
u
s
e
s
:
R
u
s
t
u
s
e
s
:
M
i
M
i
u
s
e
s
:
L
K
M
u
s
e
s
:
K
i
l
l
C
o
m
p
e
t
i
t
i
o
n
u
s
e
s
:
I
R
C
u
s
e
s
:
P
r
o
c
e
s
s
T
r
e
e
S
p
o
o
f
i
n
g
B
i
n
d
M
o
u
n
t
P
r
o
c
u
s
e
s
:
E
l
e
c
t
r
o
n
J
S
u
s
e
s
:
B
P
F
Techniques we’re interested in
Count
Could a similar approach be
applied to other aspects of
ATT&CK?
Does it appeal to MITRE and the wider community?
We’d love to see more contributions to
ATT&CK for Linux
• Join the community
• Slack
• Contribute to linux-malware?
• Help create and update technique
ideas
• We can take hypotheses where MITRE
can’t
• Have we missed things?
• Ideas
• Help us build the pipeline?
• Integrate with the wider OSS security
community?
• Develop ATT&CK aligned SOC/DFIR
training for Linux?
• If you’re working for an intel or
response team?
• Ensure your reporting is retrievable
• Ensure you annotate your reporting
with ATT&CK
• Include your hashes
• Open a ticket?
Thanks! Too many to list them all L
• @r3c0nst
• MITRE ATT&CK crew,
@coolestcatiknow and
@jamieantisocial
• @abuse_ch, @vxunderground,
@virustotal
• @mandiant, @yoroisecurity
• @intezerlabs
• @_darrenmartyn
• @unixfreakjp and
@malwaremustd1e
• @crowdstrike
• @craighrowland
• Cisco Talos and CX APT crews
https://github.com/timb-
machine/linux-malware
Send more PRs

More Related Content

Similar to I can haz cake: Benefits of working with MITRE on ATT&CK

IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinDigicomp Academy AG
 
Hacking for fun & profit - The Kubernetes Way - Demi Ben-Ari - Panorays
Hacking for fun & profit - The Kubernetes Way - Demi Ben-Ari - PanoraysHacking for fun & profit - The Kubernetes Way - Demi Ben-Ari - Panorays
Hacking for fun & profit - The Kubernetes Way - Demi Ben-Ari - PanoraysDemi Ben-Ari
 
Modern Computing System & Beyond
Modern Computing System & BeyondModern Computing System & Beyond
Modern Computing System & BeyondNuwan Bandara
 
The world is not black and white – Impact of decisions over the lifetime of a...
The world is not black and white – Impact of decisions over the lifetime of a...The world is not black and white – Impact of decisions over the lifetime of a...
The world is not black and white – Impact of decisions over the lifetime of a...Eric Reiche
 
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp
 
Open Source Automated Documentation in a Development Environment
Open Source Automated Documentation in a Development EnvironmentOpen Source Automated Documentation in a Development Environment
Open Source Automated Documentation in a Development Environmentnealemorison
 
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...CloudVillage
 
[WSO2Con USA 2018] Microservices, Containers, and Beyond
[WSO2Con USA 2018] Microservices, Containers, and Beyond[WSO2Con USA 2018] Microservices, Containers, and Beyond
[WSO2Con USA 2018] Microservices, Containers, and BeyondWSO2
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationSatria Ady Pradana
 
Continuum Analytics and Python
Continuum Analytics and PythonContinuum Analytics and Python
Continuum Analytics and PythonTravis Oliphant
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillOllie Whitehouse
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsSBWebinars
 
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...Advanced Internet of Things firmware engineering with Thingsquare and Contiki...
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...Adam Dunkels
 
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
DEF CON 27 - workshop - RICHARD GOLD - mind the gapDEF CON 27 - workshop - RICHARD GOLD - mind the gap
DEF CON 27 - workshop - RICHARD GOLD - mind the gapFelipe Prado
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Sean Whalen
 
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK Framework
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK FrameworkSecure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK Framework
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK FrameworkLeszek Mi?
 
Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...
Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...
Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...Jennifer Burns
 
Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Diego Oppenheimer
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009dnomura
 
Scaling face recognition with big data - Bogdan Bocse
 Scaling face recognition with big data - Bogdan Bocse Scaling face recognition with big data - Bogdan Bocse
Scaling face recognition with big data - Bogdan BocseITCamp
 

Similar to I can haz cake: Benefits of working with MITRE on ATT&CK (20)

IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
 
Hacking for fun & profit - The Kubernetes Way - Demi Ben-Ari - Panorays
Hacking for fun & profit - The Kubernetes Way - Demi Ben-Ari - PanoraysHacking for fun & profit - The Kubernetes Way - Demi Ben-Ari - Panorays
Hacking for fun & profit - The Kubernetes Way - Demi Ben-Ari - Panorays
 
Modern Computing System & Beyond
Modern Computing System & BeyondModern Computing System & Beyond
Modern Computing System & Beyond
 
The world is not black and white – Impact of decisions over the lifetime of a...
The world is not black and white – Impact of decisions over the lifetime of a...The world is not black and white – Impact of decisions over the lifetime of a...
The world is not black and white – Impact of decisions over the lifetime of a...
 
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud ResourcesITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
ITCamp 2019 - Mihai Tataran - Governing your Cloud Resources
 
Open Source Automated Documentation in a Development Environment
Open Source Automated Documentation in a Development EnvironmentOpen Source Automated Documentation in a Development Environment
Open Source Automated Documentation in a Development Environment
 
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
 
[WSO2Con USA 2018] Microservices, Containers, and Beyond
[WSO2Con USA 2018] Microservices, Containers, and Beyond[WSO2Con USA 2018] Microservices, Containers, and Beyond
[WSO2Con USA 2018] Microservices, Containers, and Beyond
 
Python-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming OperationPython-Assisted Red-Teaming Operation
Python-Assisted Red-Teaming Operation
 
Continuum Analytics and Python
Continuum Analytics and PythonContinuum Analytics and Python
Continuum Analytics and Python
 
Why defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skillWhy defensive research is sexy too.. … and a real sign of skill
Why defensive research is sexy too.. … and a real sign of skill
 
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud ThreatsBeyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
Beyond S3 Buckets - Effective Countermeasures for Emerging Cloud Threats
 
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...Advanced Internet of Things firmware engineering with Thingsquare and Contiki...
Advanced Internet of Things firmware engineering with Thingsquare and Contiki...
 
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
DEF CON 27 - workshop - RICHARD GOLD - mind the gapDEF CON 27 - workshop - RICHARD GOLD - mind the gap
DEF CON 27 - workshop - RICHARD GOLD - mind the gap
 
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
 
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK Framework
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK FrameworkSecure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK Framework
Secure 2019 - APT for Everyone - Adversary Simulations based on ATT&CK Framework
 
Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...
Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...
Using ATT&CK® for Containers to Level Up your Cloud Defenses - Jen Burns, fwd...
 
Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009
 
Scaling face recognition with big data - Bogdan Bocse
 Scaling face recognition with big data - Bogdan Bocse Scaling face recognition with big data - Bogdan Bocse
Scaling face recognition with big data - Bogdan Bocse
 

More from MITRE ATT&CK

Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailMITRE ATT&CK
 
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureAutomating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureMITRE ATT&CK
 
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesCISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesMITRE ATT&CK
 
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)MITRE ATT&CK
 
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...MITRE ATT&CK
 
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingEvaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingMITRE ATT&CK
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK
 
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK
 
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR TelemetryTidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR TelemetryMITRE ATT&CK
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSMITRE ATT&CK
 
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK
 
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataUsing ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataMITRE ATT&CK
 
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK
 
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...MITRE ATT&CK
 
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...MITRE ATT&CK
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...MITRE ATT&CK
 
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...MITRE ATT&CK
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK
 
The case for quishing
The case for quishingThe case for quishing
The case for quishingMITRE ATT&CK
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataMITRE ATT&CK
 

More from MITRE ATT&CK (20)

Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of Detail
 
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureAutomating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard Architecture
 
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesCISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity Advisories
 
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
 
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
 
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingEvaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
 
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
 
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR TelemetryTidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
 
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the Cloud
 
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataUsing ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real data
 
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
 
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
 
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
 
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
 
The case for quishing
The case for quishingThe case for quishing
The case for quishing
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
 

Recently uploaded

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

I can haz cake: Benefits of working with MITRE on ATT&CK

  • 1. I can haz cake: Benefits of working with MITRE on ATT&CK I can haz cake: Working with MITRE on building a better ATT&CK (for Linux)
  • 2. Just my thoughts… (Not those of the wider MITRE or Cisco teams)
  • 3. The ATT&CK framework has undoubtably been a huge success • For MITRE • Anecdotally, one of their most successful projects • For the community • Something to be studied, learnt from and often mimic’d • Just look at the people, companies, projects and communities represented here today • For someone like me • Many projects have built on it • Threat-crank – extracts threat profiles from ATT&CK • Ftd-attack-mapper – maps Cisco Firepower log events to ATT&CK • Linux-malware – tracksadvances in Linux offensive and defensive capability
  • 4. Some reflections on the nature of that success • What other technologies could be considered? • Collaboration? • Applications? • End user applications • Enterprise applications • Mainframes and enterprise UNIX? • What about other non-ATT&CK matrices? • What do more theoretical frameworks like FiGHT and ATLAS offer? • How might the incorporation of new matrices impact users? • How are other verticals best represented? • We already have things like matrices such as FiGHT and ATT&CK ICS but what about others such as Finance • What are the ”golden” protocols • How could we map dependencies? • Technique Command and Scripting Interpreter begets Setuid and Setgid • Are there better ways to think about detection? • Techniques > Data sources > Procedures > (…) > Indicators • Should attacker motivation and business impact be considered? • Beyond the scope of ATT&CK based matrices? • Verizon’s DBIR might hold some clues
  • 5. Why these questions are interesting • Just as others here have done, I wanted to bring my passion and knowledge to ATT&CK • The threat landscape is changing • FastCash – 31st December 2018 • UNC1945 – 2nd November 2020 • LightBasin/UNC1945 – 19th October 2021 • BPFDoor – 8th May 2022 • Symbiote – 9th June 2022 • CiscoTools – 13th May 2022 • Syslogk – 13th June 2022 • ProcessTreeSpoofingBindMountProc – 2nd May 2023 • FreeDownloadManager – 12th September 2023
  • 6. A brief summary of the threat landscape 1. Botnets and bitcoins... Mostly target exposed IoT 2. Access brokers... Your Linux-based VPN provides a foothold into the org 3. Ransomware... Wherever they can get to in the enterprise, on Linux, likely to target compute especially commercial hypervisors 4. Cloud/supply chain enthusiasts... Often but not always linked to 1 but taking a path of deployment artefact compromise to reach their goal. Haven't really seen them do this for 2, 3, 5 yet 5. Specialists... Likely to target specific protocols for commercial/political value through collection (e.g. packets), these folks will probably only be interested in you if you run a "golden" protocol e.g. payments, communications or industrial control
  • 7. The origins of the linux- malware repository May 2020 ATT&CK Community 5: All of the threats - Intelligence, modelling, simulation and hunting through an ATT&CKers lens July 2021 https://github.com/timb- machine/linux-malware October 2021 ATT&CK Community 8: The UNIX malware landscape - Reviewing the goods at MALWAREbazaar Mar. 2022 ATT&CKcon 3.0 Threat Modelling - It's not just for developers June 2022 ATT&CK Community 9: Auditd for the newly threatened
  • 8. 3 working hypotheses • H1: Attackers are using our tools to target UNIX environments • H2: Attackers are using techniques from ATT&CK to target UNIX environments • H3: ATT&CK is not representative of the TTPs that we find success with
  • 9. How it started… • Gonna build me a honey pot, gonna catch me some malware • VPS instances • Pcap all the things • Containerised popular services • Added default accounts • Customised auditd policies • Generic rules • Bespoke rule generator • Auditd based canaries • Leverage MALWAREbazaar • Free to use* • Run your own hunts • You can add Yara rules that fire on new uploads • You can build hunting rules based on existing analytics • You can browse, search for and download samples • Exposes APIs and statistics • wget • Python • https://github.com/cocaman/malwar e-bazaar • Roll your own * abuse.ch is a non-profit and benefits from donations and those who pay for the API-based push functionality (vs email)
  • 10. What I really want is UNIX malware (tag:elf et al) • Most is common garden IOT malware • It would be super nice to grab just the unclassified stuff • Not something I’ve got around to
  • 11. H2: Attackers are using techniques from ATT&CK to target UNIX environments • Lazarus Group/HIDDEN COBRA: Probably the second best public UNIX breach report I’ve read • https://github.com/fboldewin/FastCashMalwareDissected/ • https://malpedia.caad.fkie.fraunhofer.de/details/aix.fastcash • Attacked AIX systems running payment software (SmartVista which is used for processing ATM transactions) • UNC1945/LightBasin: A more recent example and my new favourite public UNIX breach report • https://www.crowdstrike.com/blog/an-analysis-of-lightbasin-telecommunications-attacks/ • Attacked Solaris and Linux systems running mobile telco functions • Unknown (high-end) adversary currently being investigated by Mandiant, Yoroi, CrowdStrike • Binaries recently shared on VX Underground • Targetting Solaris this time • https://www.mandiant.com/resources/live-off-the-land-an-overview-of-unc1945 • https://twitter.com/timb_machine/status/1450595881732947968: • The adversary is using a tool almost identical to an open source code from ~2001 • Had anyone spotted this? • Perfect for a retro hunt • This one is still being mapped… so many tools!
  • 12. generate- README. md.py generate- ATT&CK. md.py retrieve- articles.sh binary- lint.sh triage- binary.sh intel- lint.sh analyse- articles.pl Automate all the things… • Wouldn’t it be nice to have Slack integration? • How about automated analysis? • Robust enough to deal with Tim goes on holiday J
  • 13. Mapping reports with analytics (think TRAM)… Score reports’ word frequency Compare reports word usage to ATT&CK TTPs Label reports Identify artefacts documented but missed in same or other report •Title •Content •Industry references •If report word matches ATT&CK TTP word •Add word frequency score to label score •If label score > threshold •Propose label •Known artefacts •Similar scoring approach •Different thresholds •Again propose label
  • 15. Could a similar approach be applied to other aspects of ATT&CK? Does it appeal to MITRE and the wider community?
  • 16. We’d love to see more contributions to ATT&CK for Linux • Join the community • Slack • Contribute to linux-malware? • Help create and update technique ideas • We can take hypotheses where MITRE can’t • Have we missed things? • Ideas • Help us build the pipeline? • Integrate with the wider OSS security community? • Develop ATT&CK aligned SOC/DFIR training for Linux? • If you’re working for an intel or response team? • Ensure your reporting is retrievable • Ensure you annotate your reporting with ATT&CK • Include your hashes • Open a ticket?
  • 17. Thanks! Too many to list them all L • @r3c0nst • MITRE ATT&CK crew, @coolestcatiknow and @jamieantisocial • @abuse_ch, @vxunderground, @virustotal • @mandiant, @yoroisecurity • @intezerlabs • @_darrenmartyn • @unixfreakjp and @malwaremustd1e • @crowdstrike • @craighrowland • Cisco Talos and CX APT crews