TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Why App Allowlisting & Zero Trust Alone Won't Save You | Huntress

2025-04-16 · Read original ↗

ATT&CK techniques detected

6 predictions
T1486Data Encrypted for Impact
98%
“ransoms even in cases without encryption. data exfiltration doesn ’ t require malware or ransomware to execute, and therefore gives nothing for an allowlisting tool to block. it ’ s imperative to use detection and response experts to find and stop attacks as soon as they evade pr…”
T1219Remote Access Tools
95%
“##listing to “ block. ” the case of a rogue screenconnect threat actors love abusing known - good and trusted rmm ( remote monitoring and management ) tools for nefarious purposes. here ' s what went down in one organization : - a user was socially engineered into downloading a m…”
T1059.001PowerShell
94%
“starkly illustrates that attackers have many ways to compromise a system beyond simply executing a malicious executable. and what about executables hiding in plain sight by inheriting the trust of a known - good application? we actually see it all the time in the huntress soc. he…”
T1219Remote Access Tools
88%
“on your allowlist for malicious purposes. our own research highlights this reality : - abusing trusted tools like rmm lets attackers get in while blending in. we saw that 17. 3 % of all remote access methods originate from rmm abuse, making it the second - most used method for at…”
T1204.002Malicious File
81%
“combined with busy schedules of techs / admins can lead to an increased risk of a simple misconfiguration causing a disruption in good work or even allowing an attacker to have more access than expected. how hackers bypass application allowlisting allowlisting falls under the bro…”
T1204User Execution
32%
“crucial layer of visibility, detection, and response that complements your preventive strategy. here ’ s why this combination is so powerful : - catches what prevention misses : huntress specializes in identifying the subtle indicators of attacker presence that often go unnoticed…”

Summary

App Allowlisting is a good preventative software tool, but it's not enough. Learn why a layered security approach with detection and response is crucial to protect against today's cyber threats.