Anatomy of a Cyber Attack
A typical cyber attack follows a sequence of steps, from initial entry to data theft and destruction. One way to understand this is to use a common language, such as the MITRE ATT&CK Framework, which maps an attacker's actions to specific tactics, techniques, and procedures (TTPs).
Here's a breakdown of a common attack scenario mapped to the ATT&CK framework:
A Sample Attack Scenario
-
Assets:
-
Web server (connected to database)
-
Email server
-
File-sharing system
-
-
Attacker (“bad guy”) tries to exploit these.
Reconnaissance: The attacker begins by scanning the target's network to identify systems like web servers, email servers, and file shares.
Tactic: Reconnaissance
Technique: Active Scanning
Initial Access: The attacker sends a phishing email to an unsuspecting employee. The email contains a malicious link that tricks the user into entering their credentials on a fake login page.
Tactic: Initial Access
Technique: Phishing and Valid Accounts
Credential Access: The attacker now has the employee's credentials and uses them to access a file-sharing system. They discover an unencrypted file containing a list of passwords.
Tactic: Credential Access
Technique: Unsecured Credentials
Privilege Escalation: The attacker uses a more powerful credential found on the file share to log in to a sensitive database.
Tactic: Privilege Escalation
Technique: Valid Accounts
Collection & Exfiltration: The attacker copies the sensitive data from the database and sends it back to themselves over the network.
Tactic: Collection & Exfiltration
Technique: Data from Removable Media & Exfiltration Over C2 Channel
Impact: The attacker finishes the attack by destroying the data on the organization's server, leaving them "empty-handed."
Tactic: Impact
Technique: Data Destruction
Using the MITRE ATT&CK Framework
The MITRE ATT&CK Framework provides a common language for classifying and understanding cyberattacks. Each tactic (the "why") and technique (the "how") is documented with details on how to detect and mitigate it. This framework allows security professionals to describe complex attacks in a way that everyone in the industry can understand.
While attackers use TTPs (Tactics, Techniques, and Procedures), defenders can counter them with PPT (People, Process, and Technology). By using this framework, security teams can better understand the threat and develop a more effective defense.
No comments:
Post a Comment