Our cyber security products span from our next gen SIEM used in the most secure government and critical infrastructure environments, to automated cyber risk reporting applications for commercial and government organisations of all sizes.
The MITRE ATT&CK framework is a resource that security operations centre (SOC) teams can use to refine their detection rules against known attack profiles. Using ATT&CK allows them to build specific targeted defences against advanced persistent threats (APTs) that are tuned to their organisation’s context, while covering a broad range of different tactics, techniques and procedures (TTPs) used by sophisticated adversaries.
Australia’s Prime Minister’s recent announcement about the massive cyber offensive targeting a broad range of government, critical infrastructure and private sector organisations across Australia came as no surprise to SOC teams; the activity has been escalating for many months.
Since January, when the world began to react to COVID-19, cyber activity has accelerated, with adversaries taking advantage of our distracted state and a mass migration to home working. The most recent cyber-attacks targeting government and critical infrastructure have purportedly originated from a hostile nation state, so SOC teams understand they are dealing with highly motivated and talented hackers. A structured approach to cyber defence is necessary.
Enter the MITRE ATT&CK Framework. ATT&CK is a comprehensive knowledge base containing an array of offensive tactics and techniques used by hacker groups tracked by The MITRE Corporation. The observations detailed within ATT&CK are based on real-world data, gathered over several years. ATT&CK is the perfect reference from which SOC teams can develop threat detection rules, since each entry is based on real-world adversary TTPs.
There is a total of 12 tactic categories, mapping loosely to the different stages of the kill chain. The kill chain is used to model each of the steps a cyber adversary completes before they can achieve their goals. By detecting attacks in the earlier stages, means there is less likelihood that the adversary will achieve their objectives and the overall harm they cause can be reduced. As shown in Figure 1, the first three ATT&CK tactic categories relate to gaining initial access and establishing a foothold in the target’s network.
Figure 1 First three tactics of the MITRE ATT&CK matrix reflect the early stages of a cyber attack
Looking at the techniques listed under initial access, the topmost one is drive-by compromise. If the SOC team is concerned about their organisation’s susceptibility to drive-by compromise, they can drill into the ATT&CK knowledge base and see what details relate to this aspect of the attack. Here is what ATT&CK says about drive-by compromises:
A drive-by compromise is when an adversary gains access to a system through a user visiting a website over the normal course of browsing. With this technique, the user’s web browser is typically targeted for exploitation, but adversaries may also use compromised websites for non-exploitation behavior such as acquiring application access tokens.
There are various ways an attacker could initiate a drive-by compromise against your organisation, such as by compromising a website your organisation’s staff are known to use. It may be a supplier’s website, or a news site relating to your industry, or it may be a non-work-related site, but one that is very popular, such as for ordering takeaway food or online shopping.
The adversary will launch their initial attack against that unrelated website, installing malware and then subsequently infecting any of your organisation’s staff who use that site. Other methods used for drive-by compromises are paying for malicious ads to be published through legitimate ad providers such as Google, or your own web application interfaces are targeted for the insertion of malware that can be used to display web content or scripts that execute on the visiting client, such as forum posts and comments. The high-level process for drive-by compromises is shown in Figure 2.
Figure 2 Drive-by compromise process flow
By using ATT&CK, the SOC now understands how this kind of compromise works and can start building rules and defences to protect against it. Within the entry for drive-by compromises (as with all the techniques listed in ATT&CK), MITRE provides a list of examples of successful procedures used by adversaries (and lists known adversaries who have used this attack in the past). For example, the APT known as Darkhotel has been known to embed iframes on hotel login portals, redirecting victims to download their exploits.
Each technique comes with a list of mitigations and detections SOC teams can employ to detect and defend against this kind of attack. Mitigations such as application sandboxing and restricting web-based content will both introduce reasonable defences against drive-by compromises, while SOC teams can monitor firewalls and proxies, inspecting URLs for potentially known-bad domains (taken from their threat intelligence feeds). The SOC can also use reputation-based analytics such as how old a domain is and who registered it to determine whether it’s risky or not and use that to inform the security manager or IT operations team about these risks.
At the time the Prime Minister announced the recent and ongoing cyber campaign, the Australian Cyber Security Centre (ACSC) published a detailed threat advisory listing many of the TTPs used during recent attacks. These so-called Copy-paste compromises take their name from the adversary’s use of tools copied from open source repositories. Since many of these exploits are widely used, SOC teams can turn to the intelligence in ATT&CK’s knowledge base to find details of how the tool might be detected and neutralised. Furthermore, the ACSC has aligned each observed technique within its advisory to the TTPs in ATT&CK, so SOC teams can align their defences against real-world immediate concerns and build rules and alerts to spot these attacks in their own environment.
Cyber-attacks conducted by hostile nation states are a major issue for both the public and private sectors. Their objectives include stealing intellectual property, money and destroying economic stability and national security. SOC teams need to play their part in defending their organisations, whether it’s in a critical infrastructure provider or in a building company, since every business plays its part in maintaining its country’s economic health.
The MITRE ATTACK Framework has been designed to provide all the details of adversarial TTPs to reveal the motivations and intent behind active APTs. By understanding your own organisation’s context and who the threat actors are, you can quickly prioritise which TTPs are important and ensure your organisation does everything it can to prevent, detect and respond to cyber-attacks.
The UK market has its own regulators, security standards and challenges. And while rulings from SEC in the US or the Australian Prudential Regulation Authority (APRA) in Australia don’t apply to UK companies, for the most part, the observations are undoubtedly relevant and the resulting advice instructive. It would be wrong to think UK financial […]Read more
<<< Part 2a: Australia’s Essential Eight: Beyond Endpoint Control <<< Part 2b: Activating UK NCSC & US NIST Guidelines: Beyond Endpoint Control Part 4: Systematic Measurement of Cyber Controls >>> As much as we invest into cyber security controls, external threats are inevitable. In a recent Notifiable Data Breaches Report from the Office of the […]Read more
Keen campers, scouts and even the Swiss Army know – that a good penknife is indispensable. This simple device has mitigated many a disaster at one point in time or another. Whether it’s to cut through a bit of string, tighten a screw or simply to solve the problem of no bottle opener in the […]Read more
Supply chain risk is an area of cyber security that demands the ongoing attention of every enterprise; because it can make the difference between being resilient or not. It’s no surprise that insurers warn that the vulnerability of supply chains is potentially a systemic risk that can quickly propagate across supply chain dominated industries. Organisations […]Read more
It took a “tripartite cyber assessment” by the Australian Prudential Regulation Authority (APRA) to identify that a sample of financial organisations had inadequate cyber security: poor security control management, a lack of business recovery planning and inadequate 3rd party risk assessment. Why were there gaps? Where is the failure? Clearly the common practice of unsubstantiated […]Read more
The discussion over data-driven vs qualitative cyber security assessment has been going for some time. Nowadays, it is at the top of the priority list for many security and senior executive teams. Managing cyber security has always been a noble ambition but without reliable measurement, the lack of actionable information makes evidence-based management decisions almost […]Read more
Attack Surface Management (ASM) characterises a business’s security risks as the monitoring and risk mitigation of a constantly changing and vulnerable “risk-surface”. Importantly, this attack surface extends to both internal and external assets and services. Some ASM solutions deliver clear visibility across both Internet facing and internal assets. Others do not. Instead, they assess external […]Read more
The UK Government has released its annual “Cyber Security Breaches Survey 2023”. It provides some valuable insights into how cyber security is currently being managed in the UK, by a range of organisations. It also speaks to how current competing economic priorities are impacting the effectiveness of some cyber security management efforts. The full report […]Read more
Solving the mismatch between cyber security reporting and directors’ requirements You are undoubtedly familiar with the headlines; you may have even become in part desensitised to them: ‘Cyber-attacks are increasingly damaging’, or ‘large amounts of personal data are most at risk’. The important take-away, however, is that modern day thieves can easily gain access to […]Read more
A system to address the untrustworthy security environment Zero trust approaches to security have been talked about for a while; but in recent times they have certainly gained more currency. As a model for protecting data and services, the simplicity of the concept is its biggest strength – assume, as a default position, there is […]Read more
Read by directors, executives, and security professionals globally, operating in the most complex of security environments.