“, thus effectively reminding their customers that regional cloud disruptions propagate through the supply chain in ways that aren ' t always visible until something breaks. aws, for one, has explicitly advised customers with middle east workloads to migrate them. prepare for dest…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1491.001Internal Defacement
76%
“cyber fallout from the iran war : what to have on your radar the war in iran was less than 24 hours old when it produced a historic first : the deliberate targeting of commercial data centers. on march 1st, iranian drones hit three amazon web services ( aws ) facilities in the un…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
67%
“israeli software developer, hitting targets in various verticals and well beyond israel. the blast radius of a supply - chain attack could reach organizations that were never directly targeted and have no obvious connection to the conflict. a related risk concerns managed service…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1485Data Destruction
66%
“self - imposed, near - total internet blackout. at any rate, as google ’ s threat analysis group ( tag ) also said in its analysis of cyber - activity around the israel - hamas war, " cyber capabilities [ … ] are a tool of first resort. " this observation remains relevant today –…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1584.001Domains
52%
“department of homeland security. threats and threat actors the outbreak of a kinetic conflict often broadens both the volume and the cast of cyber - actors involved. hacktivist activity – noisy and often wrapped in bluster and bravado – often surges first. advanced persistent thr…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566Phishing
51%
“network traffic and complicate detection. the group is also known to favor internal spearphishing from already - compromised inboxes – emails from a colleague ' s account rather than an external sender – with a high success rate, for obvious reasons. spearphishing attachments and…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078Valid Accounts
50%
“possible, enforce network segmentation between it and ot environments and establish behavioral baselines for industrial protocols so that anomalous traffic can trigger alerts. close the gaps most iranian state - sponsored groups have made identity compromise their consistent focu…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1190Exploit Public-Facing Application
44%
“- facing : remote access, web applications, vpn gateways, and internet - connected ot / ics devices if your organization operates such systems. default credentials should be changed on all devices. if a device doesn ' t support strong authentication, consider whether it should be…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1525Implant Internal Image
43%
“access tools and whether they ' ve reviewed their own exposure in light of the conflict. muddywater ' s exploitation of the simplehelp tool at msps showed that your provider ' s security posture is effectively part of your attack surface. watch out for phishing as muddywater and …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1110.003Password Spraying
42%
“possible, enforce network segmentation between it and ot environments and establish behavioral baselines for industrial protocols so that anomalous traffic can trigger alerts. close the gaps most iranian state - sponsored groups have made identity compromise their consistent focu…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1498Network Denial of Service
39%
“department of homeland security. threats and threat actors the outbreak of a kinetic conflict often broadens both the volume and the cast of cyber - actors involved. hacktivist activity – noisy and often wrapped in bluster and bravado – often surges first. advanced persistent thr…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
The cybersecurity implications of the war in the Middle East extend far beyond the region. Here’s where to focus your defenses.