Skip to content

MITRE ATT&CK

Framework description

Statistics

Alerts examples

Most alerts of important threats reference the MITRE ATT&CK tactics and techniques.

  • Cuba Ransomware (see Table 6). The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint CSA to disseminate known Cuba ransomware IOCs and TTPs associated with Cuba ransomware actors
  • Understanding Ransomware Threat Actors: LockBit In 2022, LockBit was the most deployed ransomware variant across the world and continues to be prolific in 2023. Due to the large number of unconnected affiliates in the operation, LockBit ransomware attacks vary significantly in observed tactics, techniques, and procedures (TTPs).

Tools based on MITRE ATT&CK

Many tools and projects build on the MITRE ATT&CK framework. Just a few examples.

  • DeTT&CT aims to assist blue teams in using ATT&CK to score and compare data log source quality, visibility coverage, detection coverage and threat actor behaviours.
  • An excel-centric approach for managing the MITRE ATT&CK tactics and techniques A simple and portable way to get a sort of awareness about which attackers' tactics/techniques a customer is able to detect and, more important, what is missing.
  • Emulation libraries. Library of adversary emulation plans to allow organizations to evaluate their defensive capabilities against the real-world threats they face.