Threat Hunting Using Mitre Att&ck Matrix/Framework
In 2013, the MITRE federal nonprofit research project sought to identify and deliver best practices in defense of verified cyber threats. The intel it provides can be summarized with ATT&CK. ATT&CK is an acronym for Adversarial Tactics, Techniques, and Common Knowledge. Since its 2015 public release, it has helped “security teams in all sectors secure their organizations against known and emerging threats”?(Crowdstrike, 2021). Operating systems that are contained in the framework include Windows, Linux, ICS, macOS, and mobile devices.
The job of a threat hunter is vital because of the proactive service they provide. Their purpose is to find, pursue, and prevent cyber threats for the health of the organization they are affiliated with. They specialize in undiscovered threats that can hide inside data sources. Once they identify the threat, they “gather as much information on threat behavior, goals and methods as possible”?(Lane, 2020).
The ATT&CK matrix is a fantastic resource for threat hunters because they help find bad actors and vulnerabilities that make an organization an attractive target. The matrix is a repository of known hacker strategies and tools. Using the stored knowledge, threat hunters develop and test theories. Threat hunters can also “obtain a broader set of evidence by hunting for adversarial techniques rather than specific signatures”?(VMWare, 2022) allowing them to find a solution backed by thorough research.
Below are categories of threats identified in the Matrix. It is not an exhaustive list, but it does provide a glimpse of the value given to threat hunters.
Reconnaissance: Active Scanning
Resource Development: Acquire Infrastructure
Initial Access: Drive-by Compromise
Execution: Command and Scripting Interpreter
Persistence: Account Manipulation
Privilege Escalation: Abuse Elevation Control Mechanism
Defense Evasion: Access Token Manipulation
Credential Access: Adversary-in-the-Middle
领英推荐
Discovery: Application Window Discovery
Lateral Movement: Exploitation of Remote Services
Collection: Archive Collected Data
Command and Control: Application Layer Protocol
Exfiltration: Automated Exfiltration
Impact: Account Access Removal
References
Crowdstrike. (2021, May 27). MITRE ATT&CK FRAMEWORK. Retrieved from https://www.crowdstrike.com/: https://www.crowdstrike.com/cybersecurity-101/mitre-attack-framework/#:~:text=%EE%80%80History%EE%80%81%20of%20%EE%80%80MITRE%EE%80%81%20%EE%80%80ATTACK%EE%80%81%20%EE%80%80Framework%EE%80%81%20%EE%80%80MITRE%EE%80%81%20is%20a,is%20Adversarial%20Tactics%2
Lane, P. (2020, August 12). Your Next Move: Threat Hunter. Retrieved from www.comptia.org: https://www.comptia.org/blog/your-next-move-threat-hunter
MITRE ATT&CK. (2022, March 8). Active Scanning. Retrieved from attack.mitre.org: https://attack.mitre.org/techniques/T1595/
SentinelOne. (2022, July 27). Threat Hunter. Retrieved from www.dhirubhai.net: https://www.dhirubhai.net/jobs/view/threat-hunter-at-sentinelone-3122467597?trk=bingjobs
VMWare. (2022). Using the ATT&CK? Framework to Mature Your Threat Hunting Program. Retrieved from https://www.vmware.com/: https://www.vmware.com/resources/security/using-the-att-framework-to-mature-your-threat-hunting-program.html