SlideShare a Scribd company logo
1 of 26
Download to read offline
MITRE ATT&CK® Updates:
State of the ATT&CK
Adam Pennington, ATT&CK Lead, MITRE
@_whatshisface
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
Celebrating ATT&CK’s 10th Anniversary (2013-2023)
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
TTP Chart Early Progress
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
Persistence Lateral Movement
New service
Modify existing service
DLL Proxying
Hypervisor Rookit
Winlogon Helper dll
Path Interception
Registry run keys / Startup folder addition
Modification of shortcuts
MBR / BIOS rootkit
Editing of default handlers
AT / Schtasks / Cron
Persistence Lateral Movement
New service RDP
Modify existing service Windows admin shares (C$, ADMIN$)
DLL Proxying Windows shared webroot
Hypervisor Rookit Remote Windows / Accessible Application vulnerability
Winlogon Helper dll Logon scripts
Path Interception Use application deployment software
Registry run keys / Startup folder addition Taint shared content
Modification of shortcuts Access to remote services with valid credentials
MBR / BIOS rootkit
Obtaining credentials from weaknesses in OS or
software
Editing of default handlers Obtaining credentials from user
AT / Schtasks / Cron
Persistence Lateral Movement Credential Access Privilege Escalation Defense Evasion Command and Control Exfiltration Host Enumeration
New service RDP Administrator privileges Exploitation of vulnerability Process enumeration
Modify existing service Windows admin shares (C$, ADMIN$) Administrator privileges (API hooking) Service file permissions weakness Service enumeration
DLL Proxying Windows shared webroot Ability to capture network traffic
Service registry permissions
weakness Local networking enumeration
Hypervisor Rookit Remote Windows / Accessible Application vulnerability Access to files DLL path hijacking Local network connection enumeration
Winlogon Helper dll Logon scripts Path interception Window enumeration
Path Interception Use application deployment software Modification of shortcuts Account enumeration
Registry run keys / Startup folder
addition Taint shared content Editing of default handlers Group enumeration
Modification of shortcuts Access to remote services with valid credentials AT / Schtasks / Cron Owner/user enumeration
MBR / BIOS rootkit Obtaining credentials from weaknesses in OS or software Operating system enumeration
Editing of default handlers Obtaining credentials from user Security software enumeration
AT / Schtasks / Cron File system enumeration
A.T.T.A.C.K. (Adversarial Tactics, Techniques, And Common Knowledge)
§ 10th Anniversary Panel tomorrow at 9:05am with ATT&CK’s original creators – Moderated by Katie Nickels
§ Blake Strom
§ Jen Miller Osborn
§ Brad Crawford
§ Eric Sheesley
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
Persistence Lateral Movement Credential Access Privilege Escalation Defense Evasion Command and Control Exfiltration Host Enumeration
New service RDP Administrator privileges Exploitation of vulnerability Software packing Commonly used protocol / Follows protocol standards Normal C&C channel Process enumeration
Modify existing service Windows admin shares (C$, ADMIN$)
Administrator privileges (API
hooking) Service file permissions weakness Masquerading
Commonly used protocol / Does not follow protocol
standards Alternate data channel Service enumeration
DLL Proxying Windows shared webroot Ability to capture network traffic
Service registry permissions
weakness DLL Injection Commonly used protocol on non-standard port
Exfiltration over other network
medium Local networking enumeration
Hypervisor Rookit
Remote Windows / Accessible Application
vulnerability Access to files DLL path hijacking DLL loading
Communications encrypted beyond any protocol
encryption Exfiltration over physical medium
Local network connection
enumeration
Winlogon Helper dll Logon scripts Path interception Standard protocols Communications are obfuscated Encrypted separately Window enumeration
Path Interception Use application deployment software Modification of shortcuts Obfuscated payload Distributed communications Compressed separately Account enumeration
Registry run keys / Startup folder
addition Taint shared content Editing of default handlers Indicator removal Multiple protocols combined Data staged Group enumeration
Modification of shortcuts Access to remote services with valid credentials AT / Schtasks / Cron Indicator blocking
Automated or scripted data
exfiltration Owner/user enumeration
MBR / BIOS rootkit
Obtaining credentials from weaknesses in OS or
software Size limits Operating system enumeration
Editing of default handlers Obtaining credentials from user Scheduled transfer Security software enumeration
AT / Schtasks / Cron File system enumeration
System Owner/User Discovery (T1033)
adamp$ whoami
§ He/him/his
§ Lead of MITRE ATT&CK
§ 15 years with MITRE
§ Focused on threat intel and deception
§ Past defender and CTI analyst
§ Involved with ATT&CK since it was a spreadsheet with no &
§ SCUBA diver certified for decompression and rebreather diving
©2022 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 21-00706-27.
MITRE ATT&CK Remains Strong
§Backed by 40+ MITRE staff and a growing community
©2022 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 21-00706-27.
Enterprise
Jamie Williams
Mac/Linux
Cat Self
Cloud
Casey Knerr
ICS
Jake Steele
Mobile
Jason Ajmo
Defenses
Lex Crumpton
Development
Jared Ondricek
Outreach
Amy Robertson
Threat Intel
Mike Hartley (act)
Since we last met…
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
ATT&CKcon 3.0
(3/22)
ATT&CK v11
(4/22)
ATT&CK v12
(10/22)
ATT&CK v13
(4/23)
ATT&CKcon 4.0
(You are here)
ATT&CK v14
(10/31/23)
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
ATT&CK– By the Numbers (Since ATT&CKcon 3.0)
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
111 18 22 100
NEW
TECHNIQUES/
SUB-TECHNIQUES
NEW
GROUPS
NEW
CAMPAIGNS
NEW
SOFTWARE
525 83 3 218
UPDATED
TECHNIQUES/
SUB-TECHNIQUES
UPDATED
GROUPS
UPDATED
CAMPAIGNS
UPDATED
SOFTWARE
ATT&CKcon 4.0– By the Numbers
§CFP open from to May 17th to June 27th, 2023
§79 submissions
§66% in the final week
§47% in the final day
§13% in the final hour
§22% acceptance rate– Judged blind by 6 person PC
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
Enterprise Structured Detections
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
ATT&CK for ICS Joined the attack.mitre.org Party
§ Integrated into main STIX and https://attack.mitre.org
§ Formerly our last remaining MediaWiki matrix
§ ICS’s Groups and Software added in addition to Techniques
§ Continued movement towards feature parity with Enterprise
§ Data sources and structured detections
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
Mobile
§ Continuing to add Enterprise features
§ Sub-techniques added Summer 2022
§ Just ICS left now!
§ Data sources added in v13 (April 2023)
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
Campaigns
§ Introduced in ATT&CK v12 (October 2022)
§ Allow us to
§ Break down groups
§ Handle unclustered reporting
§ Represent “it’s complicated” activity like RaaS
§ Work ongoing – new Campaigns each release
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
ATT&CK’s Contributors
@ionstorm
Aagam Shah, @neutrinoguy, ABB
Aaron Jornet
Abel Morales, Exabeam
Abhijit Mohanta, @abhijit_mohanta, Uptycs
Achute Sharma, Keysight
Adam Lichters
Adam Mashinchi
Adrien Bataille
Ai Kimura, NEC Corporation
Akiko To, NEC Corporation
Akshat Pradhan, Qualys
Alain Homewood
Alain Homewood, Insomnia Security
Alan Neville, @abnev
Alex Hinchliffe, Palo Alto Networks
Alex Parsons, Crowdstrike
Alex Soler, AttackIQ
Alex Spivakovsky, Pentera
Alexandros Pappas
Alfredo Abarca
Alfredo Oliveira, Trend Micro
Allen DeRyke, ICE
Amir Gharib, Microsoft Threat Intelligence
Anastasios Pingios
Anders Vejlby
Andrea Serrano Urea, Telefónica Tech
Andrew Allen, @whitehat_zero
Andrew Northern, @ex_raritas
Andrew Smith, @jakx_
Antonio Piazza, @antman1p
Antonio Villani, @LDO_CyberSec, Leonardo's Cyber Security Division
AppOmni
Arad Inbar, Fidelis Security
Arie Olshtein, Check Point
Ariel Shuper, Cisco
Arnim Rupp, Deutsche Lufthansa AG
Assaf Morag, @MoragAssaf, Team Nautilus Aqua Security
Atul Nair, Qualys
Austin Clark, @c2defense
Austin Herrin
Aviran Hazum, Check Point
Avneet Singh
Awake Security
Ayan Saha, Keysight
Barry Shteiman, Exabeam
Bart Parys
Bartosz Jerzman
Ben Smith, @ezaspy
Bencherchali Nasreddine, @nas_bench, ELIT Security Team (DSSD)
Bernaldo Penas Antelo
Bilal Bahadır Yenici
Blake Strom, Microsoft 365 Defender
Blake Strom, Microsoft Threat Intelligence
Bobby, Filar, Elastic
Boominathan Sundaram
Brad Geesaman, @bradgeesaman
Brandon Dalton @PartyD0lphin
Brent Murphy, Elastic
Brian Donohue
Brian Wiltse @evalstrings
Bryan Campbell, @bry_campbell
Bryan Lee
Bryan Onel
Caio Silva
Carlos Borges, @huntingneo, CIP
Carrie Roberts, @OrOneEqualsOne
Casey Smith
Catherine Williams, BT Security
Center for Threat-Informed Defense (CTID)
Chen Erlich, @chen_erlich, enSilo
Chris Heald
Chris Roffe
Chris Romano, Crowdstrike
Chris Ross @xorrior
Christiaan Beek, @ChristiaanBeek
Christoffer Strömblad
Christopher Glyer, Mandiant, @cglyer
Christopher Peacock
Cian Heasley
Cisco
Clément Notin, Tenable
Cody Thomas, SpecterOps
Conrad Layne - GE Digital
Craig Aitchison
Craig Smith, BT Security
CrowdStrike
CrowdStrike Falcon OverWatch
Csaba Fitzl @theevilbit of Offensive Security
Cybereason Nocturnus, @nocturnus
Daisuke Suzuki
Dan Borges, @1njection
Dan Nutting, @KerberToast
Daniel Acevedo, @darmad0, ARMADO
Daniel Feichter, @VirtualAllocEx, Infosec Tirol
Daniel Oakley
Daniel Prizmant, Palo Alto Networks
Daniel Stepanic, Elastic
Daniil Yugoslavskiy, @yugoslavskiy, Atomic Threat Coverage project
Daniyal Naeem, BT Security
Darin Smith, Cisco
Darren Spruell
Dave Westgard
David Ferguson, CyberSponse
David Fiser, @anu4is, Trend Micro
David French, Elastic
David Hughes, BT Security
David Lu, Tripwire
David Routin
David Tayouri
Deloitte Threat Library Team
Denise Tan
Diogo Fernandes
Dongwook Kim, KISA
Dor Edry, Microsoft
Doron Karmi, @DoronKarmi
Douglas Weir
Dragos Threat Intelligence
Dragos Threat Intelligence
Dray Agha, @Purp1eW0lf, Huntress Labs
Drew Church, Splunk
Dror Alon, Palo Alto Networks
Duane Michael
Dylan Silva, AWS Security
Ed Williams, Trustwave, SpiderLabs
Edward Millington
Edward Stevens, BT Security
Elastic
Elger Vinicius S. Rodrigues, @elgervinicius, CYBINT Centre
Eli Salem, @elisalem9
Elia Florio, Microsoft
Elly Searle, CrowdStrike — contributed to tactic definitions
Elpidoforos Maragkos, @emaragkos
Elvis Veliz, Citi
Emad Al-Mousa, Saudi Aramco
Emile Kenning, Sophos
Emily Ratliff, IBM
ENDGAME
Eran Ayalon, Cybereason
Eric Kaiser @ideologysec
Eric Kuehn, Secure Ideas
Erik Schamper, @Schamperr, Fox-IT
Erika Noerenberg, @gutterchurl, Carbon Black
Erye Hernandez, Palo Alto Networks
ESET
Expel
ExtraHop
Felipe Espósito, @Pr0teus
Felix Eberstaller
Filip Kafka, ESET
FIRST.ORG's Cyber Threat Intelligence SIG
Flavio Costa, Cisco
Ford Qin, Trend Micro
Francesco Bigarella
FS-ISAC
Gaetan van Diemen, ThreatFabric
Gal Singer, @galsinger29, Team Nautilus Aqua Security
Gareth Phillips, Seek Ltd.
Gavin Knapp
George Allen, VMware Carbon Black
George Thomas
Giorgi Gurgenidze, ISAC
Goldstein Menachem
Gordon Long, Box, Inc., @ethicalhax
Gregory Lesnewich
Gunji Satoshi, NEC Corporation
Hannah Simes, BT Security
Hans Christoffer Gaardløs
Harry Hill, BT Security
Harry Kim, CODEMIZE
Harry, CODEMIZE
Harshal Tupsamudre, Qualys
Harun Kuessner
Harun Küßner
Heather Linn
Hiroki Nagahama, NEC Corporation
Hubert Mank
Ian Davila, Tidal Cyber
Ian McKay
Ibrahim Ali Khan
ICSCoE Japan
Idan Frimark, Cisco
Idan Revivo, @idanr86, Team Nautilus Aqua Security
Ilan Sokol, Cybereason
Inna Danilevich, U.S. Bank
Isif Ibrahima, Mandiant
Itamar Mizrahi, Cymptom
Itzik Kotler, SafeBreach
Ivan Sinyakov
Jack Burns, HubSpot
Jacob Wilkin, Trustwave, SpiderLabs
Jacques Pluviose, @Jacqueswildy_IT
Jai Minton
James Dunn, @jamdunnDFW, EY
James_inthe_box, Me
Jan Miller, CrowdStrike
Jan Petrov, Citi
Janantha Marasinghe
Jannie Li, Microsoft Threat Intelligence Center (MSTIC)
Jared Atkinson, @jaredcatkinson
Jared Wilson
Jaron Bradley @jbradley89
Jason Sevilla
Jay Chen, Palo Alto Networks
Jean-Ian Boutin, ESET
Jeff Felling, Red Canary
Jeff Sakowicz, Microsoft Identity Developer Platform Services (IDPM Services)
Jeffrey Barto
Jen Burns, HubSpot
Jennifer Kim Roman, CrowdStrike
Jeremy Galloway
Jeremy Kennelly
Jesse Brown, Red Canary
Jimmy Astle, @AstleJimmy, Carbon Black
Jimmy Wylie, Dragos, Inc.
Joas Antonio dos Santos, @C0d3Cr4zy
Joas Antonio dos Santos, @C0d3Cr4zy, Inmetrics
Joas Antonio dos Santos, @Cr4zyC0d3
Joe Gervais
Joe Gumke, U.S. Bank
Joe Slowik - Dragos
Joey Lei
Johann Rehberger
John Lambert, Microsoft Threat Intelligence Center
John Page (aka hyp3rlinx), ApparitionSec
John Strand
Jon Sheedy
Jon Sternstein, Stern Security
Jonathan Boucher, @crash_wave, Bank of Canada
Jonathan Shimonovich, Check Point
Jonhnathan Ribeiro, 3CORESec, @_w0rk3r
Jonny Johnson
Jorell Magtibay, National Australia Bank Limited
Jorge Orchilles, SCYTHE
Jos Wetzels - Midnight Blue
Jose Luis Sánchez Martinez
Josh Abraham
Josh Arenas, Trustwave Spiderlabs
Josh Campbell, Cyborg Security, @cyb0rgsecur1ty
Josh Day, Gigamon
Josh Liburdi, @jshlbrd
João Paulo de A. Filho, @Hug1nN__
Juan Carlos Campuzano - Mnemo-CERT
Juan Tapiador
Justin Warner, ICEBRG
Jörg Abraham, EclecticIQ
Karim Hasanen, @_karimhasanen
Kaspersky
Katie & Tony Lambert
Katie Nickels, Red Canary
Kiyohito Yamamoto, RedLark, NTT Communications
Kobi Eisenkraft, Check Point
Kobi Haimovich, CardinalOps
Krishnan Subramanian, @krish203
Kyaw Pyiyt Htet, @KyawPyiytHtet
Kyoung-ju Kwak (S2W)
Lab52 by S2 Grupo
Lacework Labs
Lee Christensen, SpecterOps
Leo Loobeek, @leoloobeek
Leo Zhang, Trend Micro
Lior Ribak, SentinelOne
Liora Itkin
Liran Ravich, CardinalOps
Loic Jaquemet
Lorin Wu, Trend Micro
Lucas da Silva Pereira, @vulcanunsec, CIP
Lucas Heiligenstein
Lukáš Štefanko, ESET
Maarten van Dantzig, @MaartenVDantzig, Fox-IT
Magno Logan, @magnologan, Trend Micro
Manikantan Srinivasan, NEC Corporation India
Marc-Etienne M.Léveillé, ESET
Marcus Weeks
Maril Vernon @shewhohacks
Marina Krotofil
Mark Wee
Martin Jirkal, ESET
Martin McCloskey, Datadog
Martin Smolár, ESET
Martin Sohn Christensen, Improsec
Massimiliano Romano, BT Security
Matan Dobrushin - Otorio
Mathieu Hinse
Mathieu Tartare, ESET
Matias Nicolas Porolli, ESET
Matt Brenton, Zurich Global Information Security
Matt Brenton, Zurich Insurance Group
Matt Burrough, @mattburrough, Microsoft
Matt Graeber, @mattifestation, SpecterOps
Matt Kelly, @breakersall
Matt Snyder, VMware
Matthew Demaske, Adaptforward
Matthew Green
Matthew Molyett, @s1air, Cisco Talos
Matthieu Faou, ESET
Mayan Arora aka Mayan Mohan
Mayuresh Dani, Qualys
McAfee
Menachem Goldstein
Menachem Shafran, XM Cyber
Michael Cox
Michael Katchinskiy, @michael64194968, Team Nautilus Aqua Security
Michael Raggi @aRtAGGI
Michal Dida, ESET
Microsoft Detection and Response Team (DART)
Microsoft Security
Microsoft Threat Intelligence Center (MSTIC)
Mike Burns, Mandiant
Mike Kemmerer
Mike Moran
Milos Stojadinovic
Mindaugas Gudzis, BT Security
Miriam Wiesner, @miriamxyra, Microsoft Security
Mnemonic
Mnemonic AS
Mohamed Kmal
Mohit Rathore
Mugdha Peter Bansode
Muhammad Moiz Arshad, @5T34L7H
Nader Zaveri
Naikordian
Nathaniel Quist, Palo Alto Networks
Naveen Devaraja, bolttech
Naveen Vijayaraghavan, Nilesh Dherange (Gurucul)
NEC
Netskope
Nichols Jasper
Nick Cairns, @grotezinfosec
Nick Carr, Mandiant
Nik Seetharaman, Palantir
Nino Verde, @LDO_CyberSec, Leonardo's Cyber Security Division
Nishan Maharjan, @loki248
Noam Lifshitz, Sygnia
NST Assure Research Team, NetSentries Technologies
Oddvar Moe, @oddvarmoe
Ofir Almkias, Cybereason
Ohad Mana, Check Point
Ohad Zaidenberg, @ohad_mz
Olaf Hartong, Falcon Force
Oleg Kolesnikov, Securonix
Oleg Skulkin, Group-IB
Oleksiy Gayda
Omkar Gudhate
Or Kliger, Palo Alto Networks
Oren Biderman, Sygnia
Oren Ofer, Cybereason
Ozan Olali
Ozer Sarilar, @ozersarilar, STM
Pallavi Sivakumaran, WithSecure
Patrick Campbell, @pjcampbe11
Patrick Sungbahadoor
Paul Speulstra, AECOM Global Security Operations Center
Pawan Kinger, @kingerpawan, Trend Micro
Pawel Partyka, Microsoft 365 Defender
Pawel Partyka, Microsoft Threat Intelligence
Pedro Harrison
Phil Stokes, SentinelOne
Philip Winther
Phill Taylor, BT Security
Phyo Paing Htun
Phyo Paing Htun (ChiLai), I-Secure Co.,Ltd
Pià Consigny, Tenable
Pooja Natarajan, NEC Corporation India
Praetorian
Prasad Somasamudram, McAfee
Prasanth Sadanala, Cigna Information Protection (CIP) - Threat Response
Engineering Team
Prashant Verma, Paladion
Rahmat Nurfauzi, @infosecn1nja, PT Xynexis International
Ram Pliskin, Microsoft Azure Security Center
Raphaël Lheureux
Red Canary
RedHuntLabs, @redhuntlabs
Regina Elwell
Rex Guo, @Xiaofei_REX, Confluera
Ricardo Dias
Richard Gold, Digital Shadows
Richard Julian, Citi
Richie Cyrus, SpecterOps
Rick Cole, Mandiant
Rob Smith
Robby Winchester, @robwinchester3
Robert Falcone
Robert Simmons, @MalwareUtkonos
Robert Wilson
Rodrigo Garcia, Red Canary
Roi Kol, @roykol1, Team Nautilus Aqua Security
Romain Dumont, ESET
Rory McCune, Aqua Security
Ross Brittain
Ruben Dodge, @shotgunner101
Runa Sandvik
Ryan Becwar
Ryan Benson, Exabeam
Ryo Tamura, SecureBrain Corporation
Sahar Shukrun
Saisha Agrawal, Microsoft Threat Intelligent Center (MSTIC)
Sam Seabrook, Duke Energy
Sarathkumar Rajendran, Microsoft Defender365
SarathKumar Rajendran, Trimble Inc
Scott Cook, Capital One
Scott Dougherty
Scott Knight, @sdotknight, VMware Carbon Black
Scott Lundgren, @5twenty9, Carbon Black
Sebastian Salla, McAfee
Sebastian Showell-Westrip, BT Security
Sekhar Sarukkai, McAfee
Selena Larson, @selenalarson
Sergey Persikov, Check Point
Serhii Melnyk, Trustwave SpiderLabs
Shailesh Tiwary (Indian Army)
Shane Tully, @securitygypsy
Shanief Webb
Shankar Raman, Gen Digital and Abhinand, Amrita University
Shilpesh Trivedi, Uptycs
Shlomi Salem, SentinelOne
Shotaro Hamamoto, NEC Solution Innovators, Ltd
Shuhei Sasada, Cyber Defense Institute, Inc
Silvio La Porta, @LDO_CyberSec, Leonardo's Cyber Security Division
Simona David
Sittikorn Sangrattanapitak
SOCCRATES
Stan Hegt, Outflank
Stefan Kanthak
Steven Du, Trend Micro
Sudhanshu Chauhan, @Sudhanshu_C
Sunders Bruskin, Microsoft Threat Intelligence
Sunny Neo
Suzy Schapperle - Microsoft Azure Red Team
Swapnil Kumbhar
Swasti Bhushan Deb, IBM India Pvt. Ltd.
Swetha Prabakaran, Microsoft Threat Intelligence Center (MSTIC)
Syed Ummar Farooqh, McAfee
Sylvain Gil, Exabeam
Sébastien Ruel, CGI
Taewoo Lee, KISA
Tahseen Bin Taj
Takuma Matsumoto, LAC Co., Ltd
Tatsuya Daitoku, Cyber Defense Institute, Inc.
Ted Samuels, Rapid7
Teodor Cimpoesu
Thanabodi Phrakhun, I-SECURE
The DFIR Report, @TheDFIRReport
The Wover, @TheRealWover
Thijn Bukkems, Amazon
Thirumalai Natarajan, Mandiant
Tiago Faria, 3CORESec
Tim (Wadhwa-)Brown
Tim MalcomVetter
Tim Peck
Toby Kohlenberg
Tom Hegel
Tom Simpson, CrowdStrike Falcon OverWatch
Tom Ueltschi @c_APT_ure
Tony Lambert, Red Canary
Tony Lee
Travis Smith, Qualys
Travis Smith, Tripwire
Trend Micro Incorporated
Tristan Bennett, Seamless Intelligence
Tristan Madani (Cybereason)
TruKno
Tsubasa Matsuda, NEC Corporation
Uriel Kosayev
Vadim Khrykov
Valerii Marchuk, Cybersecurity Help s.r.o.
Varonis Threat Labs
Veeral Patel
Vijay Lalwani
Vikas Singh, Sophos
Vinay Pidathala
Vinayak Wadhwa, Lucideus
Vinayak Wadhwa, SAFE Security
Vincent Le Toux
Viren Chaudhari, Qualys
Vishwas Manral, McAfee
Walker Johnson
Wataru Takahashi, NEC Corporation
Wayne Silva, F-Secure Countercept
Wes Hurd
Wietze Beukema, @wietze
Will Jolliffe
Will Thomas, Cyjax
Will Thomas, Equinix
Will Thomas, Equinix Threat Analysis Center (ETAC)
William Cain
Wojciech Lesicki
Xavier Rousseau
Yaniv Agman, @AgmanYaniv, Team Nautilus Aqua Security
Yasuhito Kawanishi, NEC Corporation
Ye Yint Min Thu Htut, Offensive Security Team, DBS Bank
Yinon Engelsman, Talon Cyber Security
Yonatan Gotlib, Deep Instinct
Yonatan Gotlib, Talon Cyber Security
Yoshihiro Kori, NEC Corporation
Yossi Nisani, Cymptom
Yossi Weizman, Azure Defender Research Team
Yossi Weizman, Microsoft Threat Intelligence
Yusuke Kubo, RedLark, NTT Communications
Yusuke Niwa, ITOCHU Corporation
Yuval Avrahami, Palo Alto Networks
Zachary Abzug, @ZackDoesML
Zachary Stanford, @svch0st
Zaw Min Htun, @Z3TAE
Ziv Karliner, @ziv_kr, Team Nautilus Aqua Security
Ziv Kaspersky, Cymptom
Zur Ulianitzky, XM Cyber
©2022 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 21-00706-27.
468 orgs and
individuals
82 in 2019
130 in 2020
155 in 2021
155 in 2022
4 pt font
Thank You!
The Future
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
Detection Enhancements
Notes
Analytics
Mobile
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
Linux
§ We’ve added to our Linux platform the past several releases
§ It’s used heavily in containers, cloud, embedded devices, network appliances, IoT, etc
§ Linux systems are often mentioned as a part of intrusions
§ …And yet it’s still an incredibly challenging platform to gather intelligence on
§ Continues to be a focus area for us
§ Seeking better intelligence on Linux actor behaviors
§ Join us in #linux_attack on the MITRE ATT&CK Slack (same Slack as Q&A)
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
ATT&CK Update Presentations
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
ATT&CK Updates: ICS
§Today – 1:30pm
§ Jake Steele
§Adding assets to better represent the space
§ Lots of industries with many kinds of devices
§ Much broader space than Enterprise platforms
§Bringing standards into the mix
§ High adoption in the ICS community
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
ATT&CK Updates: Software
§Today – 3:45pm
§ Jared Ondricek
§ Improvements to ATT&CK website search!
§ ATT&CK develops several open source projects
§ Tools for managing/maintaining ATT&CK
§ Tools for working with ATT&CK
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
ATT&CK Updates: A Few New Ideas in Enterprise
§Tomorrow – 10:20am
§ Patrick Howell O’Neill
§There are spaces we’ve explicitly avoided in ATT&CK
§You’ve been asking about them for years
§As our adversaries evolve, we do too
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
ATT&CK Updates: Cloud
§Tomorrow – 12:00pm
§ Casey Knerr
§Cloud is different!
§ Complicated to defend
§ Sparse public reporting
§Is it time for some new platforms?
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
https://media.giphy.com/media/r3Yeh3aAjsyYGObizC/giphy.gif
ATT&CK Benefactor Program
§ Opportunity for organizations to help sustain and advance ATT&CK
§ Accepting charitable donations via the Center for Threat-Informed Defense
§ Contributions leveraged directly by ATT&CK
§ Parallel programs for Engage, Caldera, and the Center for Threat-Informed Defense
§ Recognition on attack.mitre.org, CTID’s website, and our social media
§ To learn about other benefits or to contact us visit https://bit.ly/ATBenif
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
© 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
https://attack.mitre.org
attack@mitre.org
@mitreattack
Adam Pennington
@_whatshisface
whatshisface@infosec.exchange
Join our Slack for Q&A: https://bit.ly/ATTj
Or Join the #attackcon4 channel: https://bit.ly/ATTk
#attackcon4-qa-pennington

More Related Content

What's hot

Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...MITRE ATT&CK
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...MITRE ATT&CK
 
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideMITRE ATT&CK
 
Landing on Jupyter: The transformative power of data-driven storytelling for ...
Landing on Jupyter: The transformative power of data-driven storytelling for ...Landing on Jupyter: The transformative power of data-driven storytelling for ...
Landing on Jupyter: The transformative power of data-driven storytelling for ...MITRE ATT&CK
 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CKMITRE ATT&CK
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageErik Van Buggenhout
 
.LNK Tears of the Kingdom
.LNK Tears of the Kingdom.LNK Tears of the Kingdom
.LNK Tears of the KingdomMITRE ATT&CK
 
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red TeamWhat is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red TeamMITRE ATT&CK
 
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudMITRE ATT&CK
 
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...MITRE - ATT&CKcon
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!MITRE ATT&CK
 
ATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKMITRE ATT&CK
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsMITRE ATT&CK
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSMITRE ATT&CK
 
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR TelemetryTidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR TelemetryMITRE ATT&CK
 
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CKOne Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CKMITRE ATT&CK
 
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CKATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CKMITRE ATT&CK
 
Mapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMITRE ATT&CK
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKMITRE ATT&CK
 

What's hot (20)

Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
Would you Rather Have Telemetry into 2 Attacks or 20? An Insight Into Highly ...
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
 
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue Divide
 
Landing on Jupyter: The transformative power of data-driven storytelling for ...
Landing on Jupyter: The transformative power of data-driven storytelling for ...Landing on Jupyter: The transformative power of data-driven storytelling for ...
Landing on Jupyter: The transformative power of data-driven storytelling for ...
 
State of the ATT&CK
State of the ATT&CKState of the ATT&CK
State of the ATT&CK
 
Leveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common LanguageLeveraging MITRE ATT&CK - Speaking the Common Language
Leveraging MITRE ATT&CK - Speaking the Common Language
 
.LNK Tears of the Kingdom
.LNK Tears of the Kingdom.LNK Tears of the Kingdom
.LNK Tears of the Kingdom
 
ATT&CKcon Intro
ATT&CKcon IntroATT&CKcon Intro
ATT&CKcon Intro
 
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red TeamWhat is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
 
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudATT&CKING Containers in The Cloud
ATT&CKING Containers in The Cloud
 
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
MITRE ATT&CKcon 2.0: Lessons in Purple Team Testing with MITRE ATT&CK; Daniel...
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!
 
ATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CK
 
ATT&CK Updates- Campaigns
ATT&CK Updates- CampaignsATT&CK Updates- Campaigns
ATT&CK Updates- Campaigns
 
ATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICSATT&CK Updates- ATT&CK for ICS
ATT&CK Updates- ATT&CK for ICS
 
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR TelemetryTidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry
 
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CKOne Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
One Leg to Stand on: Adventures in Adversary Tracking with ATT&CK
 
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CKATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
ATT&CK Metaverse - Exploring the Limitations of Applying ATT&CK
 
Mapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE Activities
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
 

Similar to MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)

State of the ATT&CK May 2023
State of the ATT&CK May 2023State of the ATT&CK May 2023
State of the ATT&CK May 2023Adam Pennington
 
Emulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect IntelligenceEmulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect IntelligenceAdam Pennington
 
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...Robert Brandel
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) MITRE ATT&CK
 
State of the ATT&CK - ATT&CKcon Power Hour
State of the ATT&CK - ATT&CKcon Power HourState of the ATT&CK - ATT&CKcon Power Hour
State of the ATT&CK - ATT&CKcon Power HourAdam Pennington
 
Update from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamUpdate from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamAdam Pennington
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Adam Pennington
 
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...Adam Pennington
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...Adam Pennington
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoKatie Nickels
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CKPennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CKAdam Pennington
 
Blockchain and Apache NiFi
Blockchain and Apache NiFiBlockchain and Apache NiFi
Blockchain and Apache NiFiTimothy Spann
 
MITRE-Module 1 Slides.pdf
MITRE-Module 1 Slides.pdfMITRE-Module 1 Slides.pdf
MITRE-Module 1 Slides.pdfReZa AdineH
 
Fast Secure and Anonymous Key Agreement Against Bad Randomness for CloudCompu...
Fast Secure and Anonymous Key Agreement Against Bad Randomness for CloudCompu...Fast Secure and Anonymous Key Agreement Against Bad Randomness for CloudCompu...
Fast Secure and Anonymous Key Agreement Against Bad Randomness for CloudCompu...IRJET Journal
 

Similar to MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition) (20)

State of the ATT&CK May 2023
State of the ATT&CK May 2023State of the ATT&CK May 2023
State of the ATT&CK May 2023
 
Emulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect IntelligenceEmulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect Intelligence
 
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
Slideshare.net rh-isac summit 2019 - adam pennington - leveraging mitre at ta...
 
State of the ATTACK
State of the ATTACKState of the ATTACK
State of the ATTACK
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
 
Putting the PRE into ATTACK
Putting the PRE into ATTACKPutting the PRE into ATTACK
Putting the PRE into ATTACK
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?)
 
State of the ATT&CK - ATT&CKcon Power Hour
State of the ATT&CK - ATT&CKcon Power HourState of the ATT&CK - ATT&CKcon Power Hour
State of the ATT&CK - ATT&CKcon Power Hour
 
Update from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamUpdate from the MITRE ATT&CK Team
Update from the MITRE ATT&CK Team
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
 
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the Cloud
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
 
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
 
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status QuoBSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CKPennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
 
Blockchain and Apache NiFi
Blockchain and Apache NiFiBlockchain and Apache NiFi
Blockchain and Apache NiFi
 
MITRE-Module 1 Slides.pdf
MITRE-Module 1 Slides.pdfMITRE-Module 1 Slides.pdf
MITRE-Module 1 Slides.pdf
 
Fast Secure and Anonymous Key Agreement Against Bad Randomness for CloudCompu...
Fast Secure and Anonymous Key Agreement Against Bad Randomness for CloudCompu...Fast Secure and Anonymous Key Agreement Against Bad Randomness for CloudCompu...
Fast Secure and Anonymous Key Agreement Against Bad Randomness for CloudCompu...
 

More from MITRE ATT&CK

Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailMITRE ATT&CK
 
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureAutomating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureMITRE ATT&CK
 
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKI can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKMITRE ATT&CK
 
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesCISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesMITRE ATT&CK
 
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)MITRE ATT&CK
 
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...MITRE ATT&CK
 
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingEvaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingMITRE ATT&CK
 
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSMITRE ATT&CK
 
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataUsing ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataMITRE ATT&CK
 
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK
 
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...MITRE ATT&CK
 
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...MITRE ATT&CK
 
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...MITRE ATT&CK
 
The case for quishing
The case for quishingThe case for quishing
The case for quishingMITRE ATT&CK
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataMITRE ATT&CK
 
The art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFOThe art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFOMITRE ATT&CK
 
Updates from the Center for Threat-Informed Defense
Updates from the Center for Threat-Informed DefenseUpdates from the Center for Threat-Informed Defense
Updates from the Center for Threat-Informed DefenseMITRE ATT&CK
 
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixCloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixMITRE ATT&CK
 
MITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: SoftwareMITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: SoftwareMITRE ATT&CK
 

More from MITRE ATT&CK (20)

Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of Detail
 
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureAutomating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard Architecture
 
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKI can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CK
 
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesCISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity Advisories
 
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
 
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
 
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingEvaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
 
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight BagMITRE ATT&CK based Threat Analysis for Electronic Flight Bag
MITRE ATT&CK based Threat Analysis for Electronic Flight Bag
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
 
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataUsing ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real data
 
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
 
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
Detection as Code, Automation, and Testing: The Key to Unlocking the Power of...
 
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
 
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
 
The case for quishing
The case for quishingThe case for quishing
The case for quishing
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
 
The art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFOThe art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFO
 
Updates from the Center for Threat-Informed Defense
Updates from the Center for Threat-Informed DefenseUpdates from the Center for Threat-Informed Defense
Updates from the Center for Threat-Informed Defense
 
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixCloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK Matrix
 
MITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: SoftwareMITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: Software
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)

  • 1. MITRE ATT&CK® Updates: State of the ATT&CK Adam Pennington, ATT&CK Lead, MITRE @_whatshisface © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 2. Celebrating ATT&CK’s 10th Anniversary (2013-2023) © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 3. TTP Chart Early Progress © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12. Persistence Lateral Movement New service Modify existing service DLL Proxying Hypervisor Rookit Winlogon Helper dll Path Interception Registry run keys / Startup folder addition Modification of shortcuts MBR / BIOS rootkit Editing of default handlers AT / Schtasks / Cron Persistence Lateral Movement New service RDP Modify existing service Windows admin shares (C$, ADMIN$) DLL Proxying Windows shared webroot Hypervisor Rookit Remote Windows / Accessible Application vulnerability Winlogon Helper dll Logon scripts Path Interception Use application deployment software Registry run keys / Startup folder addition Taint shared content Modification of shortcuts Access to remote services with valid credentials MBR / BIOS rootkit Obtaining credentials from weaknesses in OS or software Editing of default handlers Obtaining credentials from user AT / Schtasks / Cron Persistence Lateral Movement Credential Access Privilege Escalation Defense Evasion Command and Control Exfiltration Host Enumeration New service RDP Administrator privileges Exploitation of vulnerability Process enumeration Modify existing service Windows admin shares (C$, ADMIN$) Administrator privileges (API hooking) Service file permissions weakness Service enumeration DLL Proxying Windows shared webroot Ability to capture network traffic Service registry permissions weakness Local networking enumeration Hypervisor Rookit Remote Windows / Accessible Application vulnerability Access to files DLL path hijacking Local network connection enumeration Winlogon Helper dll Logon scripts Path interception Window enumeration Path Interception Use application deployment software Modification of shortcuts Account enumeration Registry run keys / Startup folder addition Taint shared content Editing of default handlers Group enumeration Modification of shortcuts Access to remote services with valid credentials AT / Schtasks / Cron Owner/user enumeration MBR / BIOS rootkit Obtaining credentials from weaknesses in OS or software Operating system enumeration Editing of default handlers Obtaining credentials from user Security software enumeration AT / Schtasks / Cron File system enumeration
  • 4. A.T.T.A.C.K. (Adversarial Tactics, Techniques, And Common Knowledge) § 10th Anniversary Panel tomorrow at 9:05am with ATT&CK’s original creators – Moderated by Katie Nickels § Blake Strom § Jen Miller Osborn § Brad Crawford § Eric Sheesley © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12. Persistence Lateral Movement Credential Access Privilege Escalation Defense Evasion Command and Control Exfiltration Host Enumeration New service RDP Administrator privileges Exploitation of vulnerability Software packing Commonly used protocol / Follows protocol standards Normal C&C channel Process enumeration Modify existing service Windows admin shares (C$, ADMIN$) Administrator privileges (API hooking) Service file permissions weakness Masquerading Commonly used protocol / Does not follow protocol standards Alternate data channel Service enumeration DLL Proxying Windows shared webroot Ability to capture network traffic Service registry permissions weakness DLL Injection Commonly used protocol on non-standard port Exfiltration over other network medium Local networking enumeration Hypervisor Rookit Remote Windows / Accessible Application vulnerability Access to files DLL path hijacking DLL loading Communications encrypted beyond any protocol encryption Exfiltration over physical medium Local network connection enumeration Winlogon Helper dll Logon scripts Path interception Standard protocols Communications are obfuscated Encrypted separately Window enumeration Path Interception Use application deployment software Modification of shortcuts Obfuscated payload Distributed communications Compressed separately Account enumeration Registry run keys / Startup folder addition Taint shared content Editing of default handlers Indicator removal Multiple protocols combined Data staged Group enumeration Modification of shortcuts Access to remote services with valid credentials AT / Schtasks / Cron Indicator blocking Automated or scripted data exfiltration Owner/user enumeration MBR / BIOS rootkit Obtaining credentials from weaknesses in OS or software Size limits Operating system enumeration Editing of default handlers Obtaining credentials from user Scheduled transfer Security software enumeration AT / Schtasks / Cron File system enumeration
  • 5. System Owner/User Discovery (T1033) adamp$ whoami § He/him/his § Lead of MITRE ATT&CK § 15 years with MITRE § Focused on threat intel and deception § Past defender and CTI analyst § Involved with ATT&CK since it was a spreadsheet with no & § SCUBA diver certified for decompression and rebreather diving ©2022 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 21-00706-27.
  • 6. MITRE ATT&CK Remains Strong §Backed by 40+ MITRE staff and a growing community ©2022 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 21-00706-27. Enterprise Jamie Williams Mac/Linux Cat Self Cloud Casey Knerr ICS Jake Steele Mobile Jason Ajmo Defenses Lex Crumpton Development Jared Ondricek Outreach Amy Robertson Threat Intel Mike Hartley (act)
  • 7. Since we last met… © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 8. ATT&CKcon 3.0 (3/22) ATT&CK v11 (4/22) ATT&CK v12 (10/22) ATT&CK v13 (4/23) ATT&CKcon 4.0 (You are here) ATT&CK v14 (10/31/23) © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 9. ATT&CK– By the Numbers (Since ATT&CKcon 3.0) © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12. 111 18 22 100 NEW TECHNIQUES/ SUB-TECHNIQUES NEW GROUPS NEW CAMPAIGNS NEW SOFTWARE 525 83 3 218 UPDATED TECHNIQUES/ SUB-TECHNIQUES UPDATED GROUPS UPDATED CAMPAIGNS UPDATED SOFTWARE
  • 10. ATT&CKcon 4.0– By the Numbers §CFP open from to May 17th to June 27th, 2023 §79 submissions §66% in the final week §47% in the final day §13% in the final hour §22% acceptance rate– Judged blind by 6 person PC © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 11. Enterprise Structured Detections © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 12. ATT&CK for ICS Joined the attack.mitre.org Party § Integrated into main STIX and https://attack.mitre.org § Formerly our last remaining MediaWiki matrix § ICS’s Groups and Software added in addition to Techniques § Continued movement towards feature parity with Enterprise § Data sources and structured detections © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 13. Mobile § Continuing to add Enterprise features § Sub-techniques added Summer 2022 § Just ICS left now! § Data sources added in v13 (April 2023) © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 14. Campaigns § Introduced in ATT&CK v12 (October 2022) § Allow us to § Break down groups § Handle unclustered reporting § Represent “it’s complicated” activity like RaaS § Work ongoing – new Campaigns each release © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 15. ATT&CK’s Contributors @ionstorm Aagam Shah, @neutrinoguy, ABB Aaron Jornet Abel Morales, Exabeam Abhijit Mohanta, @abhijit_mohanta, Uptycs Achute Sharma, Keysight Adam Lichters Adam Mashinchi Adrien Bataille Ai Kimura, NEC Corporation Akiko To, NEC Corporation Akshat Pradhan, Qualys Alain Homewood Alain Homewood, Insomnia Security Alan Neville, @abnev Alex Hinchliffe, Palo Alto Networks Alex Parsons, Crowdstrike Alex Soler, AttackIQ Alex Spivakovsky, Pentera Alexandros Pappas Alfredo Abarca Alfredo Oliveira, Trend Micro Allen DeRyke, ICE Amir Gharib, Microsoft Threat Intelligence Anastasios Pingios Anders Vejlby Andrea Serrano Urea, Telefónica Tech Andrew Allen, @whitehat_zero Andrew Northern, @ex_raritas Andrew Smith, @jakx_ Antonio Piazza, @antman1p Antonio Villani, @LDO_CyberSec, Leonardo's Cyber Security Division AppOmni Arad Inbar, Fidelis Security Arie Olshtein, Check Point Ariel Shuper, Cisco Arnim Rupp, Deutsche Lufthansa AG Assaf Morag, @MoragAssaf, Team Nautilus Aqua Security Atul Nair, Qualys Austin Clark, @c2defense Austin Herrin Aviran Hazum, Check Point Avneet Singh Awake Security Ayan Saha, Keysight Barry Shteiman, Exabeam Bart Parys Bartosz Jerzman Ben Smith, @ezaspy Bencherchali Nasreddine, @nas_bench, ELIT Security Team (DSSD) Bernaldo Penas Antelo Bilal Bahadır Yenici Blake Strom, Microsoft 365 Defender Blake Strom, Microsoft Threat Intelligence Bobby, Filar, Elastic Boominathan Sundaram Brad Geesaman, @bradgeesaman Brandon Dalton @PartyD0lphin Brent Murphy, Elastic Brian Donohue Brian Wiltse @evalstrings Bryan Campbell, @bry_campbell Bryan Lee Bryan Onel Caio Silva Carlos Borges, @huntingneo, CIP Carrie Roberts, @OrOneEqualsOne Casey Smith Catherine Williams, BT Security Center for Threat-Informed Defense (CTID) Chen Erlich, @chen_erlich, enSilo Chris Heald Chris Roffe Chris Romano, Crowdstrike Chris Ross @xorrior Christiaan Beek, @ChristiaanBeek Christoffer Strömblad Christopher Glyer, Mandiant, @cglyer Christopher Peacock Cian Heasley Cisco Clément Notin, Tenable Cody Thomas, SpecterOps Conrad Layne - GE Digital Craig Aitchison Craig Smith, BT Security CrowdStrike CrowdStrike Falcon OverWatch Csaba Fitzl @theevilbit of Offensive Security Cybereason Nocturnus, @nocturnus Daisuke Suzuki Dan Borges, @1njection Dan Nutting, @KerberToast Daniel Acevedo, @darmad0, ARMADO Daniel Feichter, @VirtualAllocEx, Infosec Tirol Daniel Oakley Daniel Prizmant, Palo Alto Networks Daniel Stepanic, Elastic Daniil Yugoslavskiy, @yugoslavskiy, Atomic Threat Coverage project Daniyal Naeem, BT Security Darin Smith, Cisco Darren Spruell Dave Westgard David Ferguson, CyberSponse David Fiser, @anu4is, Trend Micro David French, Elastic David Hughes, BT Security David Lu, Tripwire David Routin David Tayouri Deloitte Threat Library Team Denise Tan Diogo Fernandes Dongwook Kim, KISA Dor Edry, Microsoft Doron Karmi, @DoronKarmi Douglas Weir Dragos Threat Intelligence Dragos Threat Intelligence Dray Agha, @Purp1eW0lf, Huntress Labs Drew Church, Splunk Dror Alon, Palo Alto Networks Duane Michael Dylan Silva, AWS Security Ed Williams, Trustwave, SpiderLabs Edward Millington Edward Stevens, BT Security Elastic Elger Vinicius S. Rodrigues, @elgervinicius, CYBINT Centre Eli Salem, @elisalem9 Elia Florio, Microsoft Elly Searle, CrowdStrike — contributed to tactic definitions Elpidoforos Maragkos, @emaragkos Elvis Veliz, Citi Emad Al-Mousa, Saudi Aramco Emile Kenning, Sophos Emily Ratliff, IBM ENDGAME Eran Ayalon, Cybereason Eric Kaiser @ideologysec Eric Kuehn, Secure Ideas Erik Schamper, @Schamperr, Fox-IT Erika Noerenberg, @gutterchurl, Carbon Black Erye Hernandez, Palo Alto Networks ESET Expel ExtraHop Felipe Espósito, @Pr0teus Felix Eberstaller Filip Kafka, ESET FIRST.ORG's Cyber Threat Intelligence SIG Flavio Costa, Cisco Ford Qin, Trend Micro Francesco Bigarella FS-ISAC Gaetan van Diemen, ThreatFabric Gal Singer, @galsinger29, Team Nautilus Aqua Security Gareth Phillips, Seek Ltd. Gavin Knapp George Allen, VMware Carbon Black George Thomas Giorgi Gurgenidze, ISAC Goldstein Menachem Gordon Long, Box, Inc., @ethicalhax Gregory Lesnewich Gunji Satoshi, NEC Corporation Hannah Simes, BT Security Hans Christoffer Gaardløs Harry Hill, BT Security Harry Kim, CODEMIZE Harry, CODEMIZE Harshal Tupsamudre, Qualys Harun Kuessner Harun Küßner Heather Linn Hiroki Nagahama, NEC Corporation Hubert Mank Ian Davila, Tidal Cyber Ian McKay Ibrahim Ali Khan ICSCoE Japan Idan Frimark, Cisco Idan Revivo, @idanr86, Team Nautilus Aqua Security Ilan Sokol, Cybereason Inna Danilevich, U.S. Bank Isif Ibrahima, Mandiant Itamar Mizrahi, Cymptom Itzik Kotler, SafeBreach Ivan Sinyakov Jack Burns, HubSpot Jacob Wilkin, Trustwave, SpiderLabs Jacques Pluviose, @Jacqueswildy_IT Jai Minton James Dunn, @jamdunnDFW, EY James_inthe_box, Me Jan Miller, CrowdStrike Jan Petrov, Citi Janantha Marasinghe Jannie Li, Microsoft Threat Intelligence Center (MSTIC) Jared Atkinson, @jaredcatkinson Jared Wilson Jaron Bradley @jbradley89 Jason Sevilla Jay Chen, Palo Alto Networks Jean-Ian Boutin, ESET Jeff Felling, Red Canary Jeff Sakowicz, Microsoft Identity Developer Platform Services (IDPM Services) Jeffrey Barto Jen Burns, HubSpot Jennifer Kim Roman, CrowdStrike Jeremy Galloway Jeremy Kennelly Jesse Brown, Red Canary Jimmy Astle, @AstleJimmy, Carbon Black Jimmy Wylie, Dragos, Inc. Joas Antonio dos Santos, @C0d3Cr4zy Joas Antonio dos Santos, @C0d3Cr4zy, Inmetrics Joas Antonio dos Santos, @Cr4zyC0d3 Joe Gervais Joe Gumke, U.S. Bank Joe Slowik - Dragos Joey Lei Johann Rehberger John Lambert, Microsoft Threat Intelligence Center John Page (aka hyp3rlinx), ApparitionSec John Strand Jon Sheedy Jon Sternstein, Stern Security Jonathan Boucher, @crash_wave, Bank of Canada Jonathan Shimonovich, Check Point Jonhnathan Ribeiro, 3CORESec, @_w0rk3r Jonny Johnson Jorell Magtibay, National Australia Bank Limited Jorge Orchilles, SCYTHE Jos Wetzels - Midnight Blue Jose Luis Sánchez Martinez Josh Abraham Josh Arenas, Trustwave Spiderlabs Josh Campbell, Cyborg Security, @cyb0rgsecur1ty Josh Day, Gigamon Josh Liburdi, @jshlbrd João Paulo de A. Filho, @Hug1nN__ Juan Carlos Campuzano - Mnemo-CERT Juan Tapiador Justin Warner, ICEBRG Jörg Abraham, EclecticIQ Karim Hasanen, @_karimhasanen Kaspersky Katie & Tony Lambert Katie Nickels, Red Canary Kiyohito Yamamoto, RedLark, NTT Communications Kobi Eisenkraft, Check Point Kobi Haimovich, CardinalOps Krishnan Subramanian, @krish203 Kyaw Pyiyt Htet, @KyawPyiytHtet Kyoung-ju Kwak (S2W) Lab52 by S2 Grupo Lacework Labs Lee Christensen, SpecterOps Leo Loobeek, @leoloobeek Leo Zhang, Trend Micro Lior Ribak, SentinelOne Liora Itkin Liran Ravich, CardinalOps Loic Jaquemet Lorin Wu, Trend Micro Lucas da Silva Pereira, @vulcanunsec, CIP Lucas Heiligenstein Lukáš Štefanko, ESET Maarten van Dantzig, @MaartenVDantzig, Fox-IT Magno Logan, @magnologan, Trend Micro Manikantan Srinivasan, NEC Corporation India Marc-Etienne M.Léveillé, ESET Marcus Weeks Maril Vernon @shewhohacks Marina Krotofil Mark Wee Martin Jirkal, ESET Martin McCloskey, Datadog Martin Smolár, ESET Martin Sohn Christensen, Improsec Massimiliano Romano, BT Security Matan Dobrushin - Otorio Mathieu Hinse Mathieu Tartare, ESET Matias Nicolas Porolli, ESET Matt Brenton, Zurich Global Information Security Matt Brenton, Zurich Insurance Group Matt Burrough, @mattburrough, Microsoft Matt Graeber, @mattifestation, SpecterOps Matt Kelly, @breakersall Matt Snyder, VMware Matthew Demaske, Adaptforward Matthew Green Matthew Molyett, @s1air, Cisco Talos Matthieu Faou, ESET Mayan Arora aka Mayan Mohan Mayuresh Dani, Qualys McAfee Menachem Goldstein Menachem Shafran, XM Cyber Michael Cox Michael Katchinskiy, @michael64194968, Team Nautilus Aqua Security Michael Raggi @aRtAGGI Michal Dida, ESET Microsoft Detection and Response Team (DART) Microsoft Security Microsoft Threat Intelligence Center (MSTIC) Mike Burns, Mandiant Mike Kemmerer Mike Moran Milos Stojadinovic Mindaugas Gudzis, BT Security Miriam Wiesner, @miriamxyra, Microsoft Security Mnemonic Mnemonic AS Mohamed Kmal Mohit Rathore Mugdha Peter Bansode Muhammad Moiz Arshad, @5T34L7H Nader Zaveri Naikordian Nathaniel Quist, Palo Alto Networks Naveen Devaraja, bolttech Naveen Vijayaraghavan, Nilesh Dherange (Gurucul) NEC Netskope Nichols Jasper Nick Cairns, @grotezinfosec Nick Carr, Mandiant Nik Seetharaman, Palantir Nino Verde, @LDO_CyberSec, Leonardo's Cyber Security Division Nishan Maharjan, @loki248 Noam Lifshitz, Sygnia NST Assure Research Team, NetSentries Technologies Oddvar Moe, @oddvarmoe Ofir Almkias, Cybereason Ohad Mana, Check Point Ohad Zaidenberg, @ohad_mz Olaf Hartong, Falcon Force Oleg Kolesnikov, Securonix Oleg Skulkin, Group-IB Oleksiy Gayda Omkar Gudhate Or Kliger, Palo Alto Networks Oren Biderman, Sygnia Oren Ofer, Cybereason Ozan Olali Ozer Sarilar, @ozersarilar, STM Pallavi Sivakumaran, WithSecure Patrick Campbell, @pjcampbe11 Patrick Sungbahadoor Paul Speulstra, AECOM Global Security Operations Center Pawan Kinger, @kingerpawan, Trend Micro Pawel Partyka, Microsoft 365 Defender Pawel Partyka, Microsoft Threat Intelligence Pedro Harrison Phil Stokes, SentinelOne Philip Winther Phill Taylor, BT Security Phyo Paing Htun Phyo Paing Htun (ChiLai), I-Secure Co.,Ltd Pià Consigny, Tenable Pooja Natarajan, NEC Corporation India Praetorian Prasad Somasamudram, McAfee Prasanth Sadanala, Cigna Information Protection (CIP) - Threat Response Engineering Team Prashant Verma, Paladion Rahmat Nurfauzi, @infosecn1nja, PT Xynexis International Ram Pliskin, Microsoft Azure Security Center Raphaël Lheureux Red Canary RedHuntLabs, @redhuntlabs Regina Elwell Rex Guo, @Xiaofei_REX, Confluera Ricardo Dias Richard Gold, Digital Shadows Richard Julian, Citi Richie Cyrus, SpecterOps Rick Cole, Mandiant Rob Smith Robby Winchester, @robwinchester3 Robert Falcone Robert Simmons, @MalwareUtkonos Robert Wilson Rodrigo Garcia, Red Canary Roi Kol, @roykol1, Team Nautilus Aqua Security Romain Dumont, ESET Rory McCune, Aqua Security Ross Brittain Ruben Dodge, @shotgunner101 Runa Sandvik Ryan Becwar Ryan Benson, Exabeam Ryo Tamura, SecureBrain Corporation Sahar Shukrun Saisha Agrawal, Microsoft Threat Intelligent Center (MSTIC) Sam Seabrook, Duke Energy Sarathkumar Rajendran, Microsoft Defender365 SarathKumar Rajendran, Trimble Inc Scott Cook, Capital One Scott Dougherty Scott Knight, @sdotknight, VMware Carbon Black Scott Lundgren, @5twenty9, Carbon Black Sebastian Salla, McAfee Sebastian Showell-Westrip, BT Security Sekhar Sarukkai, McAfee Selena Larson, @selenalarson Sergey Persikov, Check Point Serhii Melnyk, Trustwave SpiderLabs Shailesh Tiwary (Indian Army) Shane Tully, @securitygypsy Shanief Webb Shankar Raman, Gen Digital and Abhinand, Amrita University Shilpesh Trivedi, Uptycs Shlomi Salem, SentinelOne Shotaro Hamamoto, NEC Solution Innovators, Ltd Shuhei Sasada, Cyber Defense Institute, Inc Silvio La Porta, @LDO_CyberSec, Leonardo's Cyber Security Division Simona David Sittikorn Sangrattanapitak SOCCRATES Stan Hegt, Outflank Stefan Kanthak Steven Du, Trend Micro Sudhanshu Chauhan, @Sudhanshu_C Sunders Bruskin, Microsoft Threat Intelligence Sunny Neo Suzy Schapperle - Microsoft Azure Red Team Swapnil Kumbhar Swasti Bhushan Deb, IBM India Pvt. Ltd. Swetha Prabakaran, Microsoft Threat Intelligence Center (MSTIC) Syed Ummar Farooqh, McAfee Sylvain Gil, Exabeam Sébastien Ruel, CGI Taewoo Lee, KISA Tahseen Bin Taj Takuma Matsumoto, LAC Co., Ltd Tatsuya Daitoku, Cyber Defense Institute, Inc. Ted Samuels, Rapid7 Teodor Cimpoesu Thanabodi Phrakhun, I-SECURE The DFIR Report, @TheDFIRReport The Wover, @TheRealWover Thijn Bukkems, Amazon Thirumalai Natarajan, Mandiant Tiago Faria, 3CORESec Tim (Wadhwa-)Brown Tim MalcomVetter Tim Peck Toby Kohlenberg Tom Hegel Tom Simpson, CrowdStrike Falcon OverWatch Tom Ueltschi @c_APT_ure Tony Lambert, Red Canary Tony Lee Travis Smith, Qualys Travis Smith, Tripwire Trend Micro Incorporated Tristan Bennett, Seamless Intelligence Tristan Madani (Cybereason) TruKno Tsubasa Matsuda, NEC Corporation Uriel Kosayev Vadim Khrykov Valerii Marchuk, Cybersecurity Help s.r.o. Varonis Threat Labs Veeral Patel Vijay Lalwani Vikas Singh, Sophos Vinay Pidathala Vinayak Wadhwa, Lucideus Vinayak Wadhwa, SAFE Security Vincent Le Toux Viren Chaudhari, Qualys Vishwas Manral, McAfee Walker Johnson Wataru Takahashi, NEC Corporation Wayne Silva, F-Secure Countercept Wes Hurd Wietze Beukema, @wietze Will Jolliffe Will Thomas, Cyjax Will Thomas, Equinix Will Thomas, Equinix Threat Analysis Center (ETAC) William Cain Wojciech Lesicki Xavier Rousseau Yaniv Agman, @AgmanYaniv, Team Nautilus Aqua Security Yasuhito Kawanishi, NEC Corporation Ye Yint Min Thu Htut, Offensive Security Team, DBS Bank Yinon Engelsman, Talon Cyber Security Yonatan Gotlib, Deep Instinct Yonatan Gotlib, Talon Cyber Security Yoshihiro Kori, NEC Corporation Yossi Nisani, Cymptom Yossi Weizman, Azure Defender Research Team Yossi Weizman, Microsoft Threat Intelligence Yusuke Kubo, RedLark, NTT Communications Yusuke Niwa, ITOCHU Corporation Yuval Avrahami, Palo Alto Networks Zachary Abzug, @ZackDoesML Zachary Stanford, @svch0st Zaw Min Htun, @Z3TAE Ziv Karliner, @ziv_kr, Team Nautilus Aqua Security Ziv Kaspersky, Cymptom Zur Ulianitzky, XM Cyber ©2022 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 21-00706-27. 468 orgs and individuals 82 in 2019 130 in 2020 155 in 2021 155 in 2022 4 pt font Thank You!
  • 16. The Future © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 18. Mobile © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 19. Linux § We’ve added to our Linux platform the past several releases § It’s used heavily in containers, cloud, embedded devices, network appliances, IoT, etc § Linux systems are often mentioned as a part of intrusions § …And yet it’s still an incredibly challenging platform to gather intelligence on § Continues to be a focus area for us § Seeking better intelligence on Linux actor behaviors § Join us in #linux_attack on the MITRE ATT&CK Slack (same Slack as Q&A) © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 20. ATT&CK Update Presentations © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 21. ATT&CK Updates: ICS §Today – 1:30pm § Jake Steele §Adding assets to better represent the space § Lots of industries with many kinds of devices § Much broader space than Enterprise platforms §Bringing standards into the mix § High adoption in the ICS community © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 22. ATT&CK Updates: Software §Today – 3:45pm § Jared Ondricek § Improvements to ATT&CK website search! § ATT&CK develops several open source projects § Tools for managing/maintaining ATT&CK § Tools for working with ATT&CK © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 23. ATT&CK Updates: A Few New Ideas in Enterprise §Tomorrow – 10:20am § Patrick Howell O’Neill §There are spaces we’ve explicitly avoided in ATT&CK §You’ve been asking about them for years §As our adversaries evolve, we do too © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 24. ATT&CK Updates: Cloud §Tomorrow – 12:00pm § Casey Knerr §Cloud is different! § Complicated to defend § Sparse public reporting §Is it time for some new platforms? © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12. https://media.giphy.com/media/r3Yeh3aAjsyYGObizC/giphy.gif
  • 25. ATT&CK Benefactor Program § Opportunity for organizations to help sustain and advance ATT&CK § Accepting charitable donations via the Center for Threat-Informed Defense § Contributions leveraged directly by ATT&CK § Parallel programs for Engage, Caldera, and the Center for Threat-Informed Defense § Recognition on attack.mitre.org, CTID’s website, and our social media § To learn about other benefits or to contact us visit https://bit.ly/ATBenif © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12.
  • 26. © 2023 THE MITRE CORPORATION. ALL RIGHTS RESERVED. APPROVED FOR PUBLIC RELEASE. DISTRIBUTION UNLIMITED 23-00696-12. https://attack.mitre.org attack@mitre.org @mitreattack Adam Pennington @_whatshisface whatshisface@infosec.exchange Join our Slack for Q&A: https://bit.ly/ATTj Or Join the #attackcon4 channel: https://bit.ly/ATTk #attackcon4-qa-pennington