Blog

Getting Value with the MITRE ATT&CK Framework

Anomali‘s mission to empower cybersecurity professionals to disrupt cyber threats has led us to integrate the ATT&CK framework into our solutions with a focus on mapping techniques to actual events to get ahead of the adversarial lifecycle.

Joe Ariganello
October 5, 2022
Table of contents
<p>In 2013, researchers at MITRE Corporation published the Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK) framework. This framework describes how attackers operate within an organization and offers a common language for describing these attacks. The framework describes both adversaries’ behaviors and their attempts to compromise systems and provides a set of indicators for measuring the effectiveness of security measures.</p> <p>Recent <a href="https://www.anomali.com/resources/ebooks/soc-modernization-and-the-role-of-xdr">ESG Research</a> found that the MITRE ATT&amp;CK framework has grown in popularity to the point that nearly nine in ten organizations use it today. As SOC managers look into the future, they see even greater MITRE utilization. 97% of security professionals believe that MITRE ATT&amp;CK (and derivative projects) will be critically important to their organization’s security operations strategy.</p> <p>If you missed our recent <a href="https://www.anomali.com/resources/webcasts/mitre-engenuity-and-anomali-help-you-anticipate-an-adversarys-next-move">webinar</a>, here’s an excerpt on how to explain MITRE ATT&amp;CK to executives: </p> <div><script async="" src="https://fast.wistia.com/embed/medias/2skkpry7lp.jsonp"></script><script async="" src="https://fast.wistia.com/assets/external/E-v1.js"></script> <div class="wistia_responsive_padding" style="padding:56.25% 0 0 0;position:relative;"> <div class="wistia_responsive_wrapper" style="height:100%;left:0;position:absolute;top:0;width:100%;"> <div class="wistia_embed wistia_async_2skkpry7lp videoFoam=true" style="height:100%;position:relative;width:100%"> <div class="wistia_swatch" style="height: 100%; left: 0px; opacity: 1; overflow: hidden; position: absolute; top: 0px; transition: opacity 200ms ease 0s; width: 100%;"><img alt="" aria-hidden="true" onload="this.parentNode.style.opacity=1;" src="https://cdn.filestackcontent.com/S4zjpAYHQD2cjtZnYjS7" style="filter:blur(5px);height:100%;object-fit:contain;width:100%;"/></div> </div> </div> </div> </div> <div><script async="" src="https://fast.wistia.com/embed/medias/2skkpry7lp.jsonp"></script><script async="" src="https://fast.wistia.com/assets/external/E-v1.js"></script></div> <div><script async="" src="https://fast.wistia.com/embed/medias/2skkpry7lp.jsonp"></script><script async="" src="https://fast.wistia.com/assets/external/E-v1.js"></script></div> <p> </p> <p>Or check out our <a href="https://www.anomali.com/resources/what-mitre-attck-is-and-how-it-is-useful">“What is the MITRE ATT&amp;CK Framework” </a>resource for an in-depth overview.</p> <h2>Seeing the Big Picture with the MITRE ATT&amp;CK Framework</h2> <p>Breaches are inevitable. Anyone who tells you otherwise probably has a bridge for sale as well.</p> <p>The reality is that breaches happen—and often multiple times. Our <a href="https://www.anomali.com/resources/whitepapers/anomali-cybersecurity-insights-report?utm_medium=document&amp;utm_source=anomali&amp;utm_campaign=harris-poll&amp;utm_content=blog&amp;cid=7014z000001Ivxt">Cybersecurity Insights</a> report showed that no industry is safe as even with increased investment, most businesses (87%) have fallen victim to successful cyberattacks in the past three years that resulted in damage, disruption, or a breach to their businesses.</p> <p>As an organization’s attack surface grows, it provides more opportunities and vulnerabilities for attackers to exploit. Adversaries continuously improve their stealth and TTPs to bypass existing security controls, a reality that is forcing organizations to change how they approach threat detection and response.</p> <p>MITRE ATT&amp;CK helps organizations understand the bigger picture by shifting their focus away from just looking at IP addresses and domains to one that illuminates the threat within the context of an organization’s overall cybersecurity posture.</p> <p>With MITRE ATTACK, organizations are creating more secure futures by detecting incoming attacks and identifying and mitigating them before they cause damage.</p> <p>The ATT&amp;CK framework helps security professionals with their daily technical analyses, making them better at what they do. When used to its full potential, MITRE ATT&amp;CK can help security executives gain better value from existing technologies, including threat intelligence platforms (TIPs), SIEMs, and other security analytics tools.</p> <h2>Using ATT&amp;CK to Understand Gaps</h2> <p>ATT&amp;CK helps organizations establish strategic visibility into gaps in controls, making it easier to prioritize security investments in people, processes, services, and solutions. </p> <p>By using the MITRE ATT&amp;CK framework to apply contextualization to security postures and controls, organizations can quickly identify weaknesses within their security ecosystems. </p> <p>Security leaders should use the ATT&amp;CK framework with threat intelligence to validate their security tools and programs and determine the most prevalent threats in their environment. By understanding where their most significant risks lie, organizations can prioritize their threat mitigation efforts, assess the effectiveness of their current cybersecurity measures, and identify opportunities for cost savings. This leads to greater efficiencies, increased productivity, and better defense capabilities.</p> <h2>Applying Cyber Threat Intelligence with MITRE ATT&amp;CK</h2> <p>ATT&amp;CK and threat intelligence can be a powerful combination, as it allows for describing adversarial behaviors in a standard fashion. Actors can be tracked with associations to techniques and tactics in ATT&amp;CK that they have been known to utilize. This allows defenders to apply insights against operational controls to see their strengths and weaknesses against certain threat actors.</p> <p>By leveraging threat intel to enrich existing knowledge about threat actors by connecting their attacks, behavior, and tactics from specific threat actor campaigns, you’ll gain a richer understanding of attacker capabilities and intentions.</p> <p>The intelligence creation process can also benefit from using the common vocabulary of ATT&amp;CK. As mentioned, this can apply to actors and groups and observed behaviors as seen from the SOC or incident response activities. Malware can also be referred to in terms of behaviors via ATT&amp;CK. Tools supporting ATT&amp;CK can help make this process straightforward and consistent.</p> <p>Standardizing on ATT&amp;CK references can dramatically improve efficiency and ensure shared understanding. This makes disseminating intelligence to operations or management much more manageable when all parties speak the same language around adversarial behaviors. </p> <h2>Using ATT&amp;CK to Better Understand Adversaries</h2> <p>The ATT&amp;CK framework is one of the most widely adopted frameworks for analyzing malicious behavior and helping security professionals understand how attackers operate.</p> <p>While blocking or detecting attacks based on the techniques used is essential, it is equally important to understand what the technique does and how it works. By doing this, you can identify potential weaknesses in your environment and take appropriate measures to strengthen them.</p> <p>It’s equally important to understand both the techniques themselves and how attackers use them. If an attacker has pivoted to another target using stolen credentials, you must figure out why he did so. Is it because they don’t have access to the necessary tools to exploit a web server application’s remote code execution vulnerability? Or do they prefer to leverage credentials over exploits because it gives them greater flexibility and stealthiness?</p> <p>Understanding why attackers behave the way they do helps you identify the risks associated with their actions and what mitigation measures need to be taken to reduce the likelihood of successful attacks.</p> <p>The ATT&amp;CK framework provides an in-depth knowledge base of attack intelligence - making it more straightforward to apply these to investigations. Organizations can form conclusions based on verified data and structure to improve prioritization and remediation strategies based on observations from real-world activity.</p> <h2>Understanding Your Relevant Threat Landscape</h2> <p>In addition to providing a detailed view of attacker behavior, the ATT&amp;CK framework helps organizations build a complete picture of their threat landscape by identifying the tactics, techniques, and procedures used by different threat actors and mapping out their relationships with each other.</p> <p>This enables organizations to correlate events from different data streams, including emails, social network posts, and even malware, to understand the threats they face and their potential impact.</p> <p>For example. An organization wants to know where a specific threat group is attacking its targets. You could use the ATT&amp;CK framework to look up “targeting.” Once the tactics are identified, an analyst could drill down further to identify the specific techniques used by each technique. In this case, the TTPs may include phishing emails, spearphishing emails, watering hole attacks, etc. After reviewing the specific tactics, techniques, and procedures (TTPs) used by the threat group, an analyst can decide if they fit the profile of the attack and take action against the threats posed by that group.</p> <p>By leveraging ATT&amp;CK, organizations identify the specific threat groups targeting them. They can look at the TTPs used by those groups and use the insights to look at specific TTPs that specific threat actors use. This allows security teams to prioritize and plan remediation efforts based on observed attacks.</p> <h2>Anomali and MITRE </h2> <p>In 2021, Anomali joined MITRE Engenuity’s Center for Threat-Informed Defense to collaborate on the Attack Flow Project to better understand adversary behavior and improve defensive capabilities. This partnership culminated with the public release of the project in March 2022.</p> <p>The Attack Flow project will provide context around adversary behavior and help security teams expertly profile the adversary and visualize attack patterns. It will also enable them to better protect the organization against potential threats before an attack, detect it in real-time, and respond post-attack.</p> <h2>Why Analysts Should Use Threat Frameworks</h2> <p><em>Understand Context:</em></p> <p>A framework helps an organization better identify the context of a cyber attack and determine whether they’re at risk. With the latest vulnerability or breach making its way around, risk management frameworks can help organizations assess their current level of exposure and quickly respond to the question everyone wants to ask: “Are we impacted?”</p> <p><em>Improve Efficiencies:</em></p> <p>A further reason for adopting an agile approach is to improve organizational efficiency by allowing all teams to benefit from successful projects immediately. Security teams are already stretched thin, making it difficult to defend against every threat. Frameworks are scalable for all organizations, from small security operations centers to large enterprises with dedicated threat-hunting teams, incident response teams, red teaming teams, and blue teams.</p> <p><em>Visualize the Threat Landscape</em></p> <p>Finally, by visualizing the threats in real-time, analysts can map them to their footprints on the framework to reduce their scope of the investigation to only what is relevant to their organization’s security posture and vulnerability profile.</p> <h2>ESG Research Findings</h2> <p>ESG Research found that MITRE ATT&amp;CK has become instrumental in various security operations processes to defend against advanced threats. Of those organizations embracing the MITRE ATT&amp;CK framework,  35% use MITRE to better understand cyber adversaries’ tactics, techniques, and procedures.</p> <p>Using the ATT&amp;CK framework, organizations can quickly identify weaknesses within their security ecosystems to increase defensive activities against potential attacks.</p> <p><a href="https://www.anomali.com/resources/ebooks/soc-modernization-and-the-role-of-xdr">Download the ESG research</a> to learn more.</p>
Joe Ariganello

Joe Ariganello is the former VP of Product Marketing at Anomali.

Discover More About Anomali

Get the latest news about Anomali's Security and IT Operations platform,

SEe all Resources
No items found.
No items found.

Propel your mission with amplified visibility, analytics, and AI.

Learn how Anomali can help you cost-effectively improve your security posture.

October 5, 2022
-
Joe Ariganello
,

Getting Value with the MITRE ATT&CK Framework

<p>In 2013, researchers at MITRE Corporation published the Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK) framework. This framework describes how attackers operate within an organization and offers a common language for describing these attacks. The framework describes both adversaries’ behaviors and their attempts to compromise systems and provides a set of indicators for measuring the effectiveness of security measures.</p> <p>Recent <a href="https://www.anomali.com/resources/ebooks/soc-modernization-and-the-role-of-xdr">ESG Research</a> found that the MITRE ATT&amp;CK framework has grown in popularity to the point that nearly nine in ten organizations use it today. As SOC managers look into the future, they see even greater MITRE utilization. 97% of security professionals believe that MITRE ATT&amp;CK (and derivative projects) will be critically important to their organization’s security operations strategy.</p> <p>If you missed our recent <a href="https://www.anomali.com/resources/webcasts/mitre-engenuity-and-anomali-help-you-anticipate-an-adversarys-next-move">webinar</a>, here’s an excerpt on how to explain MITRE ATT&amp;CK to executives: </p> <div><script async="" src="https://fast.wistia.com/embed/medias/2skkpry7lp.jsonp"></script><script async="" src="https://fast.wistia.com/assets/external/E-v1.js"></script> <div class="wistia_responsive_padding" style="padding:56.25% 0 0 0;position:relative;"> <div class="wistia_responsive_wrapper" style="height:100%;left:0;position:absolute;top:0;width:100%;"> <div class="wistia_embed wistia_async_2skkpry7lp videoFoam=true" style="height:100%;position:relative;width:100%"> <div class="wistia_swatch" style="height: 100%; left: 0px; opacity: 1; overflow: hidden; position: absolute; top: 0px; transition: opacity 200ms ease 0s; width: 100%;"><img alt="" aria-hidden="true" onload="this.parentNode.style.opacity=1;" src="https://cdn.filestackcontent.com/S4zjpAYHQD2cjtZnYjS7" style="filter:blur(5px);height:100%;object-fit:contain;width:100%;"/></div> </div> </div> </div> </div> <div><script async="" src="https://fast.wistia.com/embed/medias/2skkpry7lp.jsonp"></script><script async="" src="https://fast.wistia.com/assets/external/E-v1.js"></script></div> <div><script async="" src="https://fast.wistia.com/embed/medias/2skkpry7lp.jsonp"></script><script async="" src="https://fast.wistia.com/assets/external/E-v1.js"></script></div> <p> </p> <p>Or check out our <a href="https://www.anomali.com/resources/what-mitre-attck-is-and-how-it-is-useful">“What is the MITRE ATT&amp;CK Framework” </a>resource for an in-depth overview.</p> <h2>Seeing the Big Picture with the MITRE ATT&amp;CK Framework</h2> <p>Breaches are inevitable. Anyone who tells you otherwise probably has a bridge for sale as well.</p> <p>The reality is that breaches happen—and often multiple times. Our <a href="https://www.anomali.com/resources/whitepapers/anomali-cybersecurity-insights-report?utm_medium=document&amp;utm_source=anomali&amp;utm_campaign=harris-poll&amp;utm_content=blog&amp;cid=7014z000001Ivxt">Cybersecurity Insights</a> report showed that no industry is safe as even with increased investment, most businesses (87%) have fallen victim to successful cyberattacks in the past three years that resulted in damage, disruption, or a breach to their businesses.</p> <p>As an organization’s attack surface grows, it provides more opportunities and vulnerabilities for attackers to exploit. Adversaries continuously improve their stealth and TTPs to bypass existing security controls, a reality that is forcing organizations to change how they approach threat detection and response.</p> <p>MITRE ATT&amp;CK helps organizations understand the bigger picture by shifting their focus away from just looking at IP addresses and domains to one that illuminates the threat within the context of an organization’s overall cybersecurity posture.</p> <p>With MITRE ATTACK, organizations are creating more secure futures by detecting incoming attacks and identifying and mitigating them before they cause damage.</p> <p>The ATT&amp;CK framework helps security professionals with their daily technical analyses, making them better at what they do. When used to its full potential, MITRE ATT&amp;CK can help security executives gain better value from existing technologies, including threat intelligence platforms (TIPs), SIEMs, and other security analytics tools.</p> <h2>Using ATT&amp;CK to Understand Gaps</h2> <p>ATT&amp;CK helps organizations establish strategic visibility into gaps in controls, making it easier to prioritize security investments in people, processes, services, and solutions. </p> <p>By using the MITRE ATT&amp;CK framework to apply contextualization to security postures and controls, organizations can quickly identify weaknesses within their security ecosystems. </p> <p>Security leaders should use the ATT&amp;CK framework with threat intelligence to validate their security tools and programs and determine the most prevalent threats in their environment. By understanding where their most significant risks lie, organizations can prioritize their threat mitigation efforts, assess the effectiveness of their current cybersecurity measures, and identify opportunities for cost savings. This leads to greater efficiencies, increased productivity, and better defense capabilities.</p> <h2>Applying Cyber Threat Intelligence with MITRE ATT&amp;CK</h2> <p>ATT&amp;CK and threat intelligence can be a powerful combination, as it allows for describing adversarial behaviors in a standard fashion. Actors can be tracked with associations to techniques and tactics in ATT&amp;CK that they have been known to utilize. This allows defenders to apply insights against operational controls to see their strengths and weaknesses against certain threat actors.</p> <p>By leveraging threat intel to enrich existing knowledge about threat actors by connecting their attacks, behavior, and tactics from specific threat actor campaigns, you’ll gain a richer understanding of attacker capabilities and intentions.</p> <p>The intelligence creation process can also benefit from using the common vocabulary of ATT&amp;CK. As mentioned, this can apply to actors and groups and observed behaviors as seen from the SOC or incident response activities. Malware can also be referred to in terms of behaviors via ATT&amp;CK. Tools supporting ATT&amp;CK can help make this process straightforward and consistent.</p> <p>Standardizing on ATT&amp;CK references can dramatically improve efficiency and ensure shared understanding. This makes disseminating intelligence to operations or management much more manageable when all parties speak the same language around adversarial behaviors. </p> <h2>Using ATT&amp;CK to Better Understand Adversaries</h2> <p>The ATT&amp;CK framework is one of the most widely adopted frameworks for analyzing malicious behavior and helping security professionals understand how attackers operate.</p> <p>While blocking or detecting attacks based on the techniques used is essential, it is equally important to understand what the technique does and how it works. By doing this, you can identify potential weaknesses in your environment and take appropriate measures to strengthen them.</p> <p>It’s equally important to understand both the techniques themselves and how attackers use them. If an attacker has pivoted to another target using stolen credentials, you must figure out why he did so. Is it because they don’t have access to the necessary tools to exploit a web server application’s remote code execution vulnerability? Or do they prefer to leverage credentials over exploits because it gives them greater flexibility and stealthiness?</p> <p>Understanding why attackers behave the way they do helps you identify the risks associated with their actions and what mitigation measures need to be taken to reduce the likelihood of successful attacks.</p> <p>The ATT&amp;CK framework provides an in-depth knowledge base of attack intelligence - making it more straightforward to apply these to investigations. Organizations can form conclusions based on verified data and structure to improve prioritization and remediation strategies based on observations from real-world activity.</p> <h2>Understanding Your Relevant Threat Landscape</h2> <p>In addition to providing a detailed view of attacker behavior, the ATT&amp;CK framework helps organizations build a complete picture of their threat landscape by identifying the tactics, techniques, and procedures used by different threat actors and mapping out their relationships with each other.</p> <p>This enables organizations to correlate events from different data streams, including emails, social network posts, and even malware, to understand the threats they face and their potential impact.</p> <p>For example. An organization wants to know where a specific threat group is attacking its targets. You could use the ATT&amp;CK framework to look up “targeting.” Once the tactics are identified, an analyst could drill down further to identify the specific techniques used by each technique. In this case, the TTPs may include phishing emails, spearphishing emails, watering hole attacks, etc. After reviewing the specific tactics, techniques, and procedures (TTPs) used by the threat group, an analyst can decide if they fit the profile of the attack and take action against the threats posed by that group.</p> <p>By leveraging ATT&amp;CK, organizations identify the specific threat groups targeting them. They can look at the TTPs used by those groups and use the insights to look at specific TTPs that specific threat actors use. This allows security teams to prioritize and plan remediation efforts based on observed attacks.</p> <h2>Anomali and MITRE </h2> <p>In 2021, Anomali joined MITRE Engenuity’s Center for Threat-Informed Defense to collaborate on the Attack Flow Project to better understand adversary behavior and improve defensive capabilities. This partnership culminated with the public release of the project in March 2022.</p> <p>The Attack Flow project will provide context around adversary behavior and help security teams expertly profile the adversary and visualize attack patterns. It will also enable them to better protect the organization against potential threats before an attack, detect it in real-time, and respond post-attack.</p> <h2>Why Analysts Should Use Threat Frameworks</h2> <p><em>Understand Context:</em></p> <p>A framework helps an organization better identify the context of a cyber attack and determine whether they’re at risk. With the latest vulnerability or breach making its way around, risk management frameworks can help organizations assess their current level of exposure and quickly respond to the question everyone wants to ask: “Are we impacted?”</p> <p><em>Improve Efficiencies:</em></p> <p>A further reason for adopting an agile approach is to improve organizational efficiency by allowing all teams to benefit from successful projects immediately. Security teams are already stretched thin, making it difficult to defend against every threat. Frameworks are scalable for all organizations, from small security operations centers to large enterprises with dedicated threat-hunting teams, incident response teams, red teaming teams, and blue teams.</p> <p><em>Visualize the Threat Landscape</em></p> <p>Finally, by visualizing the threats in real-time, analysts can map them to their footprints on the framework to reduce their scope of the investigation to only what is relevant to their organization’s security posture and vulnerability profile.</p> <h2>ESG Research Findings</h2> <p>ESG Research found that MITRE ATT&amp;CK has become instrumental in various security operations processes to defend against advanced threats. Of those organizations embracing the MITRE ATT&amp;CK framework,  35% use MITRE to better understand cyber adversaries’ tactics, techniques, and procedures.</p> <p>Using the ATT&amp;CK framework, organizations can quickly identify weaknesses within their security ecosystems to increase defensive activities against potential attacks.</p> <p><a href="https://www.anomali.com/resources/ebooks/soc-modernization-and-the-role-of-xdr">Download the ESG research</a> to learn more.</p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.