TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

CrowdStrike Blog

CrowdStrike Technical Risk Assessments Reveal Common Exposure Patterns

Jesse Vazquez - JJ Cranford · 2 days ago · Read original ↗

ATT&CK techniques detected

5 predictions
T1558.003Kerberoasting
80%
“harder for defenders to spot malicious logins in time. kerberos misconfigurations that make kerberoasting trivial kerberos is foundational to how many organizations authenticate users and services — and there are many ways it can be misconfigured. in many environments, we see ser…”
T1588.006Vulnerabilities
78%
“rarely find a lack of tools. most organizations have endpoint detection and response ( edr ), vulnerability scanners, and patch management platforms. the challenge they most often face is the gap between finding issues and fixing them within a defined window. the most common patt…”
T1558.004AS-REP Roasting
37%
“harder for defenders to spot malicious logins in time. kerberos misconfigurations that make kerberoasting trivial kerberos is foundational to how many organizations authenticate users and services — and there are many ways it can be misconfigured. in many environments, we see ser…”
T1558.004AS-REP Roasting
35%
“patch debt is accumulating. in a technical risk assessment, our team uses falcon exposure management to surface these high - risk cves on managed assets, show where sla breaches are concentrated, and give you a prioritized, evidence - based plan to close the most dangerous gaps. …”
T1588.006Vulnerabilities
32%
“of the technical risk assessment. falcon exposure management continuously discovers and maps internet - facing assets — domains, ip ranges, cloud services, and more — and correlates them with vulnerabilities, misconfigurations, and threat intelligence. this gives us a view of the…”