MITRE ATT&CK® Updates:
Enterprise
Casey Knerr, ATT&CK Enterprise Lead, MITRE
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
whoami
Casey Knerr
ATT&CK for Enterprise Lead
and...
• Cybersecurity engineer
• Cloud + web security enthusiast
• Collector of hobbies
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
These are the voyages…
(What have we been working on for v16?)
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Cloud Platforms
Infrastructure as a Service
Software as a Service
Azure AD
Office 365
Google Workspace
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Cloud Platforms
Infrastructure as a Service
Software as a Service
Azure AD
Office 365
Google Workspace
Infrastructure as a Service
Software as a Service
Identity Provider
Office Suite
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Why?
• There’s more than one identity-as-service platform!
• Okta
• Ping Identity
• JumpCloud
• OneLogin
• etc.
• Office 365 ≈ Google Workspace
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
V15 Updates: By popular demand
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
V15 Updates: An Oldie but a Goodie
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
V15 Updates: A Breakup…
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
To Boldly Go…
(What are we planning to do next?)
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Least Spicy: Content Updates
• Focus on Linux and Network
• More content
• More CTI
• Fill in the gaps
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Medium Spicy: Metadata Refactor
Supports Remote
Permissions Required
Effective Permissions
Defense Bypassed
Impact Type
Accurate?
Consistently Applied?
Standardized?
Are these…
Useful?
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Very Spicy: Another Breakup…
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Very Spicy: Another breakup…
• Defense Evasion is very big
• Could it be smaller?
One of these things is not like
the others…
© 2024 The MITRE Corporation. All rights reserved. Approved for public release.
Distribution unlimited 24-00779-13.
Very Spicy: Another Breakup…
• Defense Evasion is really big
• Can we tear it apart?
• Evading detections versus mitigations?
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Unclear Spicy: What is this?
Mandiant observed an unusual behavior by UNC5174
following their initial access on the compromised appliance.
After backdoor accounts were configured, they attempted to
self-patch the vulnerability using an F5-provided mitigation
script "mitigation.sh".Mandiant assesses that this was an
attempt to limit subsequent exploitation of the system by
additional unrelated threat actors attempting to access the
appliance.
https://cloud.google.com/blog/topics/threat-intelligence/initial-access-brokers-exploit-f5-screenconnect
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Unclear Spicy: What is this?
The clean_cron function’s script makes the cron files mutable
and removes all the existing cron jobs from /etc/crontab,
/var/spool/cron, /etc/cron.d, and /var/spool/cron/crontabs to
disrupt the existing malware functionalities, as well as the
legitimate system functionalities.
https://www.trendmicro.com/en_us/research/22/j/teamtnt-returns-or-does-it.html
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Unclear Spicy: What is this?
First, the threat actor creates a new user role with login
capability and high privileges.…Then, the current user
postgres is stripped of superuser privileges.This restricts the
privileges of other threat actors who might still gain access to
the system via the weak password.
https://www.aquasec.com/blog/pg_mem-a-malware-hidden-in-the-postgres-processes/
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
Unclear Spicy: What is this?
• Evading other threat actors rather than victim
• Patching vulnerabilities
• Killing malicious processes / cron jobs
• Removing privileges
• Changing credentials
• Closing ports
• Not quite Defense Evasion as currently scoped
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
How you can help
• Do you have Linux or Network CTI?
• Are you using the metadata fields currently?
• How do you feel about changes to Defense Evasion?
• Do you have CTI for ~weird~ not-quite-defense-evasion behavior?
• Do you have any other comments / complaints / questions?
attack@mitre.org
@MITREattack
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
https://attack.mitre.org
attack@mitre.org
@mitreattack
Casey Knerr
© 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.

MITRE ATT&CK Updates: Enterprise - Casey Knerr

  • 1.
    MITRE ATT&CK® Updates: Enterprise CaseyKnerr, ATT&CK Enterprise Lead, MITRE © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 2.
    whoami Casey Knerr ATT&CK forEnterprise Lead and... • Cybersecurity engineer • Cloud + web security enthusiast • Collector of hobbies © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 3.
    These are thevoyages… (What have we been working on for v16?) © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 4.
    Cloud Platforms Infrastructure asa Service Software as a Service Azure AD Office 365 Google Workspace © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 5.
    Cloud Platforms Infrastructure asa Service Software as a Service Azure AD Office 365 Google Workspace Infrastructure as a Service Software as a Service Identity Provider Office Suite © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 6.
    Why? • There’s morethan one identity-as-service platform! • Okta • Ping Identity • JumpCloud • OneLogin • etc. • Office 365 ≈ Google Workspace © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 7.
    V15 Updates: Bypopular demand © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 8.
    V15 Updates: AnOldie but a Goodie © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 9.
    V15 Updates: ABreakup… © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 10.
    To Boldly Go… (Whatare we planning to do next?) © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 11.
    Least Spicy: ContentUpdates • Focus on Linux and Network • More content • More CTI • Fill in the gaps © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 12.
    Medium Spicy: MetadataRefactor Supports Remote Permissions Required Effective Permissions Defense Bypassed Impact Type Accurate? Consistently Applied? Standardized? Are these… Useful? © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 13.
    Very Spicy: AnotherBreakup… © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 14.
    Very Spicy: Anotherbreakup… • Defense Evasion is very big • Could it be smaller? One of these things is not like the others… © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 15.
    Very Spicy: AnotherBreakup… • Defense Evasion is really big • Can we tear it apart? • Evading detections versus mitigations? © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 16.
    Unclear Spicy: Whatis this? Mandiant observed an unusual behavior by UNC5174 following their initial access on the compromised appliance. After backdoor accounts were configured, they attempted to self-patch the vulnerability using an F5-provided mitigation script "mitigation.sh".Mandiant assesses that this was an attempt to limit subsequent exploitation of the system by additional unrelated threat actors attempting to access the appliance. https://cloud.google.com/blog/topics/threat-intelligence/initial-access-brokers-exploit-f5-screenconnect © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 17.
    Unclear Spicy: Whatis this? The clean_cron function’s script makes the cron files mutable and removes all the existing cron jobs from /etc/crontab, /var/spool/cron, /etc/cron.d, and /var/spool/cron/crontabs to disrupt the existing malware functionalities, as well as the legitimate system functionalities. https://www.trendmicro.com/en_us/research/22/j/teamtnt-returns-or-does-it.html © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 18.
    Unclear Spicy: Whatis this? First, the threat actor creates a new user role with login capability and high privileges.…Then, the current user postgres is stripped of superuser privileges.This restricts the privileges of other threat actors who might still gain access to the system via the weak password. https://www.aquasec.com/blog/pg_mem-a-malware-hidden-in-the-postgres-processes/ © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 19.
    Unclear Spicy: Whatis this? • Evading other threat actors rather than victim • Patching vulnerabilities • Killing malicious processes / cron jobs • Removing privileges • Changing credentials • Closing ports • Not quite Defense Evasion as currently scoped © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 20.
    How you canhelp • Do you have Linux or Network CTI? • Are you using the metadata fields currently? • How do you feel about changes to Defense Evasion? • Do you have CTI for ~weird~ not-quite-defense-evasion behavior? • Do you have any other comments / complaints / questions? attack@mitre.org @MITREattack © 2024 The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.
  • 21.
    https://attack.mitre.org attack@mitre.org @mitreattack Casey Knerr © 2024The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited 24-00779-13.