ATT&CK MITRE as an effective method of defence against cyber threats

In the face of cybersecurity threats, teams that respond to security incidents need greater skill and operational efficiency.

Author: Jan Rześny
In the face of cyber security threats, teams that respond to security incidents need greater skill and operational efficiency. One important aspect of security threat detection is comprehensive knowledge of tactics, techniques and procedures (TTPs) used by cyber criminals. Even ancient philosophers, such as Sun Tzu, knew that the key to winning a war was theability to distinguish between strategies and techniques of warfare. TTPs areat the very top of the Bianco Pyramid, which presents the relationships between various IOC indicators. The higher they are in this pyramid, the higher the cost to cyber criminals. The goal of every SOC is to reach the top of this pyramid, and therefore the situation in which the Blue Team is able to observethe activities of its adversaries. The ATT&CK MITRE knowledge base is an invaluable help for an organisation to achieve this level of security maturity.

What is ATT&CK MITRE?

ATT&CK MITRE (Adversarial Tactics, Techniques and Common Knowledge) methodology is a collection of knowledge about cybercriminal behaviour models that have been grouped in a matrix of tactics and techniques. This framework is useful for understanding an organisation’s security risks, methods used by cybercriminals and for planning improvement sand verifying that any defence mechanisms work as anticipated. The MITRE threat knowledge base was created mainly to improve the detection of security threatsand to therefore find gaps in an organisation’s defence systems. The organisation’s main idea was to create a guide that would detect advanced APT attacks faster than it is happening now. The time it takes to detect a targeted attack is measured in months, and the average time to recognise an enemy in an organisation is estimated to be five months. This is a long time for an attacker to thoroughly learn about the company under attack and even to gainillegal possession of sensitive information that could have an impact on the organisation’s future. It should be remembered that even if an organisation hasa perfect security patches programme and a compliance programme, the attacker can still succeed using zero-day exploits or social engineering methods.

Tactics, techniques…

Over two hundred ATT&CK MITRE techniques have been divided into twelve groups, the so-called tactics. Breaking down individual phases of attacks so meticulously gives a broad view of the techniques and capabilities of the attackers that we would like to detect as quickly and asprecisely as possible (without the so-called noise associated with FalsePositives). A cyber criminal carries out an advanced attack and hits the redflag that we have set. These flags are mechanisms for the detection and mitigation of threats implemented in the organisation’s security systems.
The MITRE threat database is not only a table of tactics and techniques, butalso a number of tips on the necessary data sources required for detecting suspicious activities, as well as numerous examples of actual attacks related to specific criminal groups.

 

Monitoring

In order to detect advanced attacks based on the behaviour of cyber criminals, the MITRE organisation recommends the analysis of suspicious activities by monitoring work stations, i.e. advanced monitoring of logs from operating systems (including Sysmon), network logs (including Netflow), logs from firewalls, applications, authentication systems, cloud node components, DNS, PowerShell and many other data sources.

Drawing on this wealth of knowledge about threats, the creators of Sycope system decided to implement it in their own productfor monitoring network flows. In addition to detecting DDoS attacks, Sycope system detects many types of security threats and network anomalies, including those from areas such as Initial Access, Credential Access, Discovery, C2, Lateral Movement, Exfiltration and Impact. More information about Sycope system can be found here.

 

Summary

The use of ATT&CK MITRE makes it easier for organisations to tighten their levels of security thanks to the very meticulous placing of traps on attackers, e.g. in the form of correlation rules in SIEM or other security systems. Due to the enormous amount of work involved in covering all the techniques, I encourage you to proceed in stages, so that less experienced specialists have the right amount of time to become familiar with this methodology and are not discouraged too quickly. Yet through this learning, security specialists improve the effectiveness of tools for detecting and analysing security threats.

This week top knowledge