TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

Post-Breach Analysis: Sophistication and Visibility

2022-10-18 · Read original ↗

ATT&CK techniques detected

6 predictions
T1556.006Multi-Factor Authentication
79%
“groups which are capable of bypassing all forms of mfa. while no solution is perfect, sms - based mfa is the least perfect of the mfa options, and nist has long recommended against its use, so organizations that do implement it should be clear about the ease with which determined…”
T1190Exploit Public-Facing Application
76%
“the risk we observed in this attack : - technical / preventative : patch web vulnerabilities as urgently as possible. - technical / detective : employ a web application firewall to detect and mitigate web exploits. - administrative / preventative : establish developer and adminis…”
T1190Exploit Public-Facing Application
69%
“post - breach analysis : sophistication and visibility much of our threat research is focused on analyzing quantitative threat data — the larger the sample size, the better. however, the critical piece of information about a specific attack, the thing that differentiates it from …”
T1621Multi-Factor Authentication Request Generation
65%
“awareness for most organizations. it was not for nothing that we subtitled the 2019 application protection report “ the virtue of visibility. ” the only reason that we even have the information to publish this analysis is because of f5 ’ s capabilities to detect complex combinati…”
T1556.006Multi-Factor Authentication
54%
“awareness for most organizations. it was not for nothing that we subtitled the 2019 application protection report “ the virtue of visibility. ” the only reason that we even have the information to publish this analysis is because of f5 ’ s capabilities to detect complex combinati…”
T1090.003Multi-hop Proxy
42%
“##tor between these higher - tier threats and more run - of - the - mill cybercrime actors is often treated as no more than access to significant zero - day exploits and quickly achieving persistence. whether this threat actor “ counts ” as a sophisticated actor or not ( which of…”

Summary

Analyzing a single attack in detail yields interesting findings about attacker sophistication, living off the land, and architectural risk.