{"id":7369,"date":"2019-08-09T23:04:58","date_gmt":"2019-08-10T06:04:58","guid":{"rendered":"https:\/\/www.acalvio.com\/?p=7369"},"modified":"2019-08-09T23:04:58","modified_gmt":"2019-08-10T06:04:58","slug":"know-your-adversary-before-they-attck","status":"publish","type":"post","link":"https:\/\/acalvio.p2staging.us\/index.php\/2019\/08\/09\/know-your-adversary-before-they-attck\/","title":{"rendered":"Know Your Adversary, Before They ATT&#038;CK"},"content":{"rendered":"<h3>The Cyber Kill Chain<\/h3>\n<p>If youb\u0000\u0019re reading this blog, you likely know the basics of the cyber kill chain. You might even be able to name a few of the seven stages in the kill chain, which lays out the steps adversaries take to attack and exploit their victims. Where you might have a lot more difficulty is in explaining two things: how attackers actually execute these steps, and what youb\u0000\u0019re doing to detect and mitigate them.<\/p>\n<h3>Too much Focus on Early Steps of the Kill Chain<\/h3>\n<p>At Acalvio we tend to see too much focus on the early steps of the kill chain, which detail how attackers initially get in. For example, most organizations are well-aware that phishing is a big problem, and have training and technology in place to try to deal with it. However things get dicey in the later stages, which detail how attackers establish a persistent footprint, discover sensitive data targets, and exfiltrate said data. Itb\u0000\u0019s true that certain limited technologies (e.g. endpoint detection) are gaining traction. But beyond that itb\u0000\u0019s not a pretty sight.<\/p>\n<h3>MITRE | ATT&#038;CK<\/h3>\n<p>The US Government agrees that this problem is widespread, and they tasked MITRE (the non-profit that does government-sponsored research) to tackle it. As a result, MITRE has recently published what they call ATT&amp;CK, which is dedicated to addressing how attackers execute the post-infiltration stages of the kill chain. Crucially, ATT&amp;CK documents exactly what tactics and techniques adversaries actually use b\u0000\u0013 itb\u0000\u0019s not a theoretical exercise. Want to know what methods you need to be able to detect and defend against? ATT&amp;CK should be your first port of call.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2019\/08\/mitre6.jpg\" target=\"_blank\" rel=\"noopener\"><img class=\"aligncenter\" src=\"https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2019\/08\/mitre6.jpg\" alt=\"\" \/><br \/>\n<em>MITRE ATT&amp;CK focuses on the kill chainb\u0000\u0019s post-infiltration stages<\/em><\/a><\/p>\n<h3>Acalvio ShadowPlex<\/h3>\n<p>Acalvio solutions were designed to handle the actual post-infiltration threats and techniques youb\u0000\u0019re likely to encounter as you try to defend your network. In fact Acalvio ShadowPlex provides capabilities relevant to 7 of the 11 tactics in the ATT&amp;CK framework. At a high level, Acalvio delivers<\/p>\n<ul>\n<li>Fast and accurate incident detection<\/li>\n<li>Adversary engagement and forensics<\/li>\n<li>Threat response to retard attack propagation<\/li>\n<\/ul>\n<p>Like MITRE ATT&amp;CK, Acalvio starts with the premise that attacks will be successful in penetrating the network b\u0000\u0013 we focus on b\u0000\u001cI know theyb\u0000\u0019re here b\u0000\u0013 what should I do about it?b\u0000\u001d ShadowPlex is designed to detect typical attacker methods quickly, so that response measures can be executed before persistence and data exfiltration is achieved. Furthermore, we facilitate slowing down the attacker and gathering information on their methods. Taken together, they go beyond pure detection, and provide significant assistance with containment and remediation efforts.<br \/>\nThere are numerous security frameworks floating around, but none that are as tightly aligned with the post-infiltration threat landscape reality as ATT&amp;CK. With limited budgets and staff time, you need to focus on the real threats and techniques, not the theoretical ones. Alcavio recommends MITRE ATT&amp;CK as a great place to start. Want to know more? The full ATT&amp;CK Technique Matrix can be found at: <a href=\"https:\/\/attack.mitre.org\/wiki\/Technique_Matrix\" target=\"_blank\" rel=\"noopener\">https:\/\/attack.mitre.org\/wiki\/Technique_Matrix<\/a>. And detailed info on how Shadowplex helps you get a grip the ATT&amp;CK tactics and techniques can be found <a href=\"https:\/\/www.acalvio.com\/acalvio-deception-and-the-nist-framework-2\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<br \/>\n<a href=\"https:\/\/www.acalvio.com\/acalvio-deception-and-the-nist-framework-2\/\"><img loading=\"lazy\" class=\"alignnone size-medium wp-image-7394\" src=\"https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2019\/08\/mitredoc-300x188.jpg\" alt=\"\" width=\"300\" height=\"188\" srcset=\"https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2019\/08\/mitredoc-300x188.jpg 300w, https:\/\/acalvio.p2staging.us\/wp-content\/uploads\/2019\/08\/mitredoc.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<div style=\"border: 1px solid #f1f2f2; padding: 12px;margin-top:24px;\"><em>b\u0000\u001cATT&amp;CKb\u0000\u0019s use of an adversaryb\u0000\u0019s perspective makes it easier to understand actions and potential countermeasures in context than it would from a purely defense perspective.b\u0000\u001d<\/em><br \/>\n<strong>MITRE ATT&amp;CKb\u0004&#8221;: Design and Philosophy, July 2018<\/strong><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber Kill Chain If youb\u0019re reading this blog, you likely know the basics of the cyber kill chain. You might even be able to name a few of the seven stages in the kill chain, which lays out the steps adversaries take to attack and exploit their victims. Where you might have a lot [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":7401,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/7369"}],"collection":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/comments?post=7369"}],"version-history":[{"count":0,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/posts\/7369\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media\/7401"}],"wp:attachment":[{"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/media?parent=7369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/categories?post=7369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acalvio.p2staging.us\/index.php\/wp-json\/wp\/v2\/tags?post=7369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}