{"id":84799,"date":"2023-06-22T10:04:11","date_gmt":"2023-06-22T08:04:11","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=84799"},"modified":"2023-06-22T11:43:23","modified_gmt":"2023-06-22T09:43:23","slug":"navigating-cybersecurity","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/blog-ciberseguridad\/navegando-por-cibersegurida\/","title":{"rendered":"Going deeper into MITER ATT&amp;CK: Navigating the cybersecurity labyrinth"},"content":{"rendered":"<p>In the first article, we briefly explored what MITER ATT&amp;CK is and its importance in cybersecurity. Like a map tracing routes through a maze, MITER ATT&amp;CK provides a guide to the techniques and tactics used by cybercriminals. Now, we&#039;ll dive deeper to discover how this framework can be used to defend against advanced persistent threats (APTs) and improve the operations of <a href=\"https:\/\/keepcoding.io\/blog\/que-es-red-team-en-ciberseguridad\/\" data-type=\"URL\" data-id=\"https:\/\/keepcoding.io\/blog\/que-es-red-team-en-ciberseguridad\/\" target=\"_blank\" rel=\"noopener\">RedTeams.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a>Detailed breakdown of MITER ATT&amp;CK<\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/www.incibe.es\/incibe-cert\/blog\/matriz-mitre-tacticas-y-tecnicas-entornos-industriales\" data-type=\"URL\" data-id=\"https:\/\/www.incibe.es\/incibe-cert\/blog\/matriz-mitre-tacticas-y-tecnicas-entornos-industriales\" target=\"_blank\" rel=\"noopener\">ATT&amp;CK Matrix<\/a><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"560\" height=\"218\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen2.png\" alt=\"cybersecurity threats\" class=\"wp-image-84800\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen2.png 560w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen2-300x117.png 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen2-123x48.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen2-500x195.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen2-200x78.png 200w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/figure>\n\n\n\n<p>The <a href=\"https:\/\/www.incibe.es\/incibe-cert\/blog\/matriz-mitre-tacticas-y-tecnicas-entornos-industriales\" data-type=\"URL\" data-id=\"https:\/\/www.incibe.es\/incibe-cert\/blog\/matriz-mitre-tacticas-y-tecnicas-entornos-industriales\" target=\"_blank\" rel=\"noopener\">ATT&amp;CK matrix<\/a> is a type of tactical map, which provides a detailed view of the tactics, techniques and procedures (TTPs) that cybercriminals can use in an attack. Each tactic represents a stage in the \u201clife cycle\u201d of an attack, while the associated techniques represent the different ways an adversary can achieve that tactic. For example, under the \u201cInitial Access\u201d tactic, we could find techniques such as \u201cSpearphishing\u201d or \u201cPublic Vulnerability Exploitation.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a>Techniques and tactics<\/a><\/h3>\n\n\n\n<p>Techniques are the specific methods that adversaries use to achieve their objectives. These are the specific steps that an attacker could follow. On the other hand, tactics are the high-level objectives that an adversary seeks to achieve, such as gaining initial access, lateral movement, or data exfiltration. Each technique is associated with one or more tactics, creating a comprehensive picture of how an attack could unfold.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a>Procedures<\/a><\/h3>\n\n\n\n<p>Procedures are specific implementations of the techniques, and provide additional details on how attacks are carried out. For example, under the \u201cSpearphishing\u201d technique, a procedure could be \u201cSend an email with a malicious attachment.\u201d Procedures help contextualize techniques, and can be useful in identifying the specific behaviors of an adversary or threat group.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a>Application of <\/a><a href=\"https:\/\/attack.mitre.org\/\" data-type=\"URL\" data-id=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noopener\">MITER ATT&amp;CK<\/a><a> for APT analysis<\/a><\/h2>\n\n\n\n<p>MITER&#039;s ATT&amp;CK matrix provides a solid foundation for the analysis of APTs. With their help, defenders can identify the tactics and techniques that a specific APT may use, helping to effectively anticipate, detect, and counter their attacks. The ATT&amp;CK matrix can also be useful to threat researchers, allowing them to classify and track the activities of APT groups, providing a common language for sharing information about these threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a>Use of ATT&amp;CK in Red Teaming operations<\/a><\/h2>\n\n\n\n<p>In the context of Red Teaming, ATT&amp;CK can be an invaluable tool. Red Team teams can use the matrix to plan and execute attack drills, selecting techniques and tactics based on those that are most relevant to their organization. By doing so, they can uncover and highlight vulnerabilities in the organization&#039;s security posture, allowing corrective action to be taken.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><strong>Case study: <\/strong><\/a><strong><a href=\"https:\/\/www.incibe.es\/incibe-cert\/blog\/matriz-mitre-tacticas-y-tecnicas-entornos-industriales\" data-type=\"URL\" data-id=\"https:\/\/www.incibe.es\/incibe-cert\/blog\/matriz-mitre-tacticas-y-tecnicas-entornos-industriales\" target=\"_blank\" rel=\"noopener\">Mapping a specific APT to ATT&amp;CK<\/a><\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"560\" height=\"395\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen1-1.jpg\" alt=\"cybersecurity threats 2\" class=\"wp-image-84801\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen1-1.jpg 560w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen1-1-300x212.jpg 300w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen1-1-234x165.jpg 234w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen1-1-123x87.jpg 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen1-1-500x353.jpg 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2023\/06\/imagen1-1-200x141.jpg 200w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/www.incibe.es\/incibe-cert\/publicaciones\/bitacora-de-seguridad\/estados-unidos-expulsa-35-diplomaticos-rusos-ciberataque\" target=\"_blank\" rel=\"noopener\">APT28<\/a><\/h3>\n\n\n\n<p>Now, let us consider the case of APT28, also known as \u201cFancy Bear\u201d or \u201cSofacy\u201d. This threat group, allegedly sponsored by the Russian government, has been active for more than a decade and is famous for its involvement in several high-profile cyberattacks. APT28 has employed a variety of techniques and tactics over the years, which can be mapped to MITER&#039;s ATT&amp;CK matrix.<\/p>\n\n\n\n<p>For example, they have used the \u201cSpearphishing Attachment\u201d technique (T1566.001) for Initialization. This involves the use of targeted phishing emails containing malicious attachments.<\/p>\n\n\n\n<p>Another technique frequently used by APT28 is \u201cCommand and Scripting Interpreter: PowerShell\u201d (T1059.001). This involves using PowerShell to execute malicious commands and scripts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/attack.mitre.org\/groups\/G0016\/\" data-type=\"URL\" data-id=\"https:\/\/attack.mitre.org\/groups\/G0016\/\" target=\"_blank\" rel=\"noopener\">APT29<\/a><\/h3>\n\n\n\n<p>Consider the case of APT29, also known as \u201cThe Dukes\u201d or \u201cCozy Bear.\u201d This threat group, allegedly associated with the Russian government, has been active for more than a decade, and is known for its sophisticated and highly targeted attacks. Using the ATT&amp;CK matrix, we can map APT29&#039;s known techniques and tactics, allowing us to better understand their operations and develop effective defense strategies.<\/p>\n\n\n\n<p>One technique that APT29 has employed is \u201cUser Execution: Malicious Link\u201d (T1204.001). This involves the use of malicious links that the end user must open.<\/p>\n\n\n\n<p>Additionally, APT29 has used the \u201cExploitation for Privilege Escalation\u201d (T1068) technique, which involves using vulnerabilities in software to gain higher privileges on a system.<\/p>\n\n\n\n<p>It is important to note that these advanced threat groups are constantly evolving, so the techniques and tactics they use may change over time. MITER&#039;s ATT&amp;CK matrix provides a useful framework for understanding and tracking these techniques and tactics as they evolve.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a>Conclusion<\/a><\/h2>\n\n\n\n<p>A deep understanding of MITER ATT&amp;CK can provide great value to organizations. It allows for better preparation against APTs, improves the effectiveness of Red Teams, and provides a common framework for sharing threat information. At the end of the day, ATT&amp;CK is a tool that can help organizations navigate the cybersecurity maze.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a>References<\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https:\/\/attack.mitre.org\/<\/li>\n\n\n\n<li>https:\/\/attack.mitre.org\/matrices\/enterprise\/<\/li>\n\n\n\n<li>https:\/\/attack.mitre.org\/tactics\/enterprise\/<\/li>\n\n\n\n<li>https:\/\/attack.mitre.org\/groups\/G0016\/<\/li>\n<\/ul>\n\n\n\n<p>Train yourself at the leading Employability School and make a place for yourself in the <a href=\"https:\/\/eiposgrados.com\/eng\/programs\/master-in-cybersecurity\/\" data-type=\"URL\" data-id=\"https:\/\/eiposgrados.com\/programas\/master-en-ciberseguridad\/\">Cybersecurity sector<\/a> through the best training on the market! <\/p>","protected":false},"excerpt":{"rendered":"<p>In the first article, we briefly explored what MITER ATT&amp;CK is and its importance in cybersecurity. Like a map that traces the routes\u2026 <a title=\"Going deeper into MITER ATT&amp;CK: Navigating the cybersecurity labyrinth\" class=\"read-more\" href=\"https:\/\/eiposgrados.com\/eng\/blog-ciberseguridad\/navegando-por-cibersegurida\/\" aria-label=\"Read more about Going deeper into MITER ATT&amp;CK: Navigating the cybersecurity labyrinth\">Read more<\/a><\/p>","protected":false},"author":1147,"featured_media":84500,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-84799","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/84799","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/1147"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=84799"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/84799\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/84500"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=84799"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=84799"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=84799"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}