Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • MITRE ATT&CK July 2020 Update: Sub-Techniques!
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

MITRE ATT&CK July 2020 Update: Sub-Techniques!

6 years ago David Lu
MITRE ATT&CK July 2020 Update: Sub-Techniques!

The highly anticipated structural update to the MITRE ATT&CK framework was released July 8th, 2020. After a quiet first half of the year, it appears the ATT&CK team has been putting in lots of work into some significant redesign of the framework’s structure. This update introduces a new layer of abstraction: sub-techniques.

ATT&CK is a taxonomy of adversarial behavior comprised of tactics and techniques, the what and how of adversarial behavior. Tactics classify objectives attackers look to achieve, i.e. what they are trying to do. Whereas techniques classify specific behavior to achieve those objectives, i.e. how they do it. However, with 266 enterprise techniques and growing, ATT&CK needed a way to better organize and represent the knowledge it contained.

I examined the structural problems within ATT&CK exactly one year ago in this two-part blog post on ontology and ATT&CK (part 1, part 2). There I argued that ad hoc tagging of techniques led to an unevenness of abstraction. Some techniques are very specific and others are very general. Moreover, some techniques are just types of other techniques. So, I concluded that a richer, more principled structure is needed to resolve those problems, and sub-techniques are a natural solution.

(Photo by Zvi Roger – Haifa Municipality)

Sub-techniques are specific techniques. In some ways, the analogy to the animal kingdom taxonomy is apt, where subspecies refer to specific population groups of a species. For instance, the Bengal tiger, Sunda Island tiger, Trinil tiger are all subspecies of tiger. This kind of taxonomic structure allows for more granularity and relationship modeling between categories.

Consider technique T1574, Hijack Execution Flow. Adversaries can execute their own payloads by hijacking the way operating systems run programs. This can be used to achieve persistence, evade defenses, and escalate privileges. However, there is a myriad of ways that attackers can hijack execution flow. This new ATT&CK technique groups up some of the more specific techniques from the old version into a single technique grouping, with 11 sub-techniques.

Hijack Execution Flow

The new ATT&CK with sub-techniques has 156 techniques and 272 sub-techniques. Techniques from the old ATT&CK have either (1) remained techniques, (2) become sub-techniques, (3) merged with other techniques/sub-techniques, or (4) become deprecated. There are some new techniques and new sub-techniques. It will be a bit painful for most organizations to transition at first, but the useability payoff in the long run will recoup the cost.

MITRE’s official blog post about the update goes into detail about how to ease the transition from the old to the new framework. Previous versions of the ATT&CK framework are still available, however new content will only be added to the sub-techniques version. We look forward to the exciting ways MITRE is developing and evolving the ATT&CK framework.

The post ” MITRE ATT&CK July 2020 Update: Sub-Techniques!” appeared first on TripWire

Source:TripWire – David Lu

Tags: APT, Encryption, Medium Severity, TripWire

Continue Reading

Previous Joker Malware Apps Once Again Bypass Google’s Security to Spread via Play Store
Next Joker Spyware Infiltrated Google Play, Abused Old Trick to Target Users

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware

OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs

7 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Claude Code Security and Magecart: Getting the Threat Model Right

13 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

13 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels

14 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

17 hours ago [email protected] (The Hacker News)

Recent Posts

  • OFAC Sanctions DPRK IT Worker Network Funding WMD Programs Through Fake Remote Jobs
  • Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access
  • Claude Code Security and Magecart: Getting the Threat Model Right
  • 9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors
  • Product Walkthrough: How Mesh CSMA Reveals and Breaks Attack Paths to Crown Jewels

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT