Latest News
PRE-ATT&CK Techniques: The Key to Preventing Cyber Attacks
Reading Time: 4 minutes
Cyber attackers are now targeting any kind of information that can reward them: from personal data to corporate information to government secrets. However, behind each attack, there is a long chain of thoroughly selected actions.
While most organizations focus their attention on protecting the perimeter of their corporate network, the cybersecurity experts from MITRE advise expanding their ability to understand the behavior of adversaries.
Hackers select their victims long before their attack and carefully collect information about them before executing any malicious actions. Nowadays, the internet provides them with a great variety of data about almost any company, so adversaries can learn enough not only about a company’s activity but also about its cybersecurity weak spots.
To help security officers understand how hackers choose their victims and prevent an attack before it even begins, MITRE, a non-profit corporation that tackles cybersecurity problems, has created the PRE-ATT&CK matrix that is a part of the Adversarial Tactics, Techniques, and Common Knowledge, also known as the ATT&CK framework.
What is the PRE-ATT&CK matrix?
PRE-ATT&CK allows security officers to prevent a possible attack before an adversary penetrates into their network. The PRE-ATT&CK matrix contains 15 tactics and more than 150 techniques that explain the adversary planning, information gathering, reconnaissance, and setup when preparing their attack.
The tactics in PRE-ATT&CK explain the typical adversarial techniques and procedures for selecting a victim, obtaining information about it, and launching the cyber attack. This information provides security officers with a broader understanding of adversary behavior before any indicators of compromise appear.
PRE-ATT&CK allows security officers to find answers on the following questions:
- Are there any signs that cyber attackers are targeting your organization?
- What adversary techniques may an attacker apply to your company?
- How can you analyze the collected data to notice a hacker’s interest into your organisation?
Analyzing the PRE-ATT&CK techniques and tactics, defenders can get a better understanding of cyber attacker activities. They can use this knowledge to make appropriate decisions on what technical measures and mitigations to adopt in order to reduce hacker’s chances on properly preparing an attack on their organization.
How to use the PRE-ATT&CK matrix
The PRE-ATT&CK matrix provides detailed information about how adversaries prepare for arranging a cyber attack. The PRE-ATT&CK tactics explain what goals an aversary sets for themselves, while each technique shows how these goals can be achieved. The tactics in PRE ATT&CK reflect such attacker goals:
- Priority definition
- Victim selection
- Gathering information about a victim
- Victim weakness identification
- Persona development
- Capabilities setup
The PRE-ATT&CK techniques show how adversaries perform each tactic and allow enterprise defenders to track and organize attack statistics and patterns.
Priority definition
Using this tactic, an adversary weighs all the pros and cons of arranging an attack. They set their goals by considering how the information they are getting can benefit them and what kind of information has the biggest value for them. At this stage, cyber criminals compare the cost of cyber intrusions with the expected reward from their activity.
Victim selection
Taking into account their priorities, adversaries begin to look for their victims. They take their strategic considerations and then narrow them down tactically and operationally until a victim is selected. Depending on their target, adversaries can decide to attack it directly or through business partners. However, for making the right decision, hackers usually need to collect all possible information about their target.
Gathering information about the victim
After adversaries select their victim, they can’t blindly execute an attack. They first need to gather all information about their target: the type of technical system the victim uses, the personnel that works for the victim, and the victim organization itself.
Attackers usually collect information about their victims by using open-source intelligence tools and techniques. Such data about a victim as organization’s domains, email address format, names of top personnel can be freely found online by combining phishing and social engineering techniques.
While organizations can’t minimize their presence on the internet nowadays, security officers can consider how the public data of their company may be abused and define vectors of possible attacks.
Identifying victim weaknesses
By analyzing all the data collected at the previous stage, adversaries can find potential weaknesses of their victim. The discovered vulnerabilities become the basis of creating a plan of the attack. Weakness identification also allows adversaries to test and configure their own systems for attack execution.
At this stage, defenders can consider the Pyramid of Pain that will help them define the importance of indicators of compromise.
Persona development
Though the internet is a place where you can find everyone, it’s also a place where anyone can create a fake persona. A hacker can develop their persona by providing a fake email address and personal information to one of the social media sites. Getting in contact with a potential victim, an adversary can gain greater access to the victim’s personal profile with an intention to abuse this data later.
Unfortunately, most social media don’t inform their users whether someone viewed their profile. However, organizations can establish tight privacy control for their corporate accounts in social media by establishing trusted connections, blocking suspicious content, and educating their employees.
Capabilities setup
After getting in contact with potential victims, an adversary will establish capabilities for arranging an attack. Though some cyberc riminals may be really technology-savvy, most of them look for the easiest way to maintain their own internet infrastructure.
There are plenty of cost-effective ways to anonymously use servers, autonomous systems, and networks. Adversaries often abuse this anonymity for achieving their malicious goals. Paying just several dollars per month, they can get a virtual presence enough for compromising your organization.
Even if your logs detected adversarial activity from a specific server, it would be very difficult to legally pursue that source because of the lack of evidence. Though it may seem nearly impossible to detect an adversary at this stage of the cyber attack, security teams should pay attention to behavioral patterns that indicate hacker’s activity.
While PRE-ATT&CK describes only the adversarial behavior before an attack, MITRE has recently integrated some PRE-ATT&CK techniques into ATT&CK to let security teams define the potential vectors of attacks on their organizations and improve their security measures accordingly.
Enterprises that integrate PRE-ATT&CK into their security best practices can significantly enhance their protection measures and prevent adversaries long before they actually begin their malicious campaigns.
Conclusion
It’s not a secret that cyber attacks are now more targeted than any time before. Cyber criminals carefully select their next victim and conduct a thorough investigation before penetrating into your corporate network. Using the PRE-ATT&CK matrix from MITRE, security teams can reveal the early signs of adversarial behavior and prevent an attack before hackers compromise your organization.
This article is a contribution from Marcell Gogan. Marcell is a specialist within digital security solutions, business design and development, virtualization and cloud computing, R&D projects, establishment and management of software research direction – working with Ekran System. He also loves writing about data management and cybersecurity.
Source: Latest News on European Gaming Media Network
This is a Syndicated News piece. Photo credits or photo sources can be found on the source article: PRE-ATT&CK Techniques: The Key to Preventing Cyber Attacks
Latest News
Will Bolton named ‘David Orrick Journalist of the Year’ at ICE Barcelona
Will Bolton, Editor of G3 has been named the first ‘David Orrick Journalist of the Year’. Presented at ICE Barcelona by Clarion Gaming Managing Director Stuart Hunter, the Award has been created in memory of respected gambling industry writer David Orrick who passed in September 2024 aged 75.
Making the presentation, Stuart Hunter said: “Last year the industry sadly lost one of its most ardent and articulate supporters with the passing of David Orrick. David worked in the industry first as a journalist editing trade title EuroSlot and then heading-up PR and media relations for a raft of internationally recognised gambling brands.
“From the moment he joined the industry in 1995 he participated in our events first as a journalist and then as an exhibitor handling comms for many of the land-based sector’s best known manufacturers.
“David was a formidable personality steeped in the industry, highly knowledgeable and internationally respected. When David shared his opinion you listened and took note of his insights. He was a true ‘critical friend’ and made important contributions to the success of our brands not least ICE which he supported with a passion. He is greatly missed by everyone who knew him.
“In David’s honour and having consulted with his family we decided to launch a special award which carries his name. The David Orrick Journalist Of The Year Award recognises the talent and dedication which exists within the community of writers who report on the industry. Often overlooked, they provide an essential service helping to bring together games creators and providers with consumer-facing brands.
“To launch the David Orrick Award we invited publishers to nominate one of their star writers. From what was an extremely high quality short list a judging panel comprising members of the Clarion team identified our inaugural winner. Described by our judges as being extremely talented, diligent, easy to build a rapport with incisive and knowledgeable. I am delighted to confirm G3’s Will Bolton as the winner of the inaugural David Orrick Journalist of the Year.”
David’s son James Davidson reflected: “David lived and breathed the industry with everything that he had. It wasn’t a job , it was a way of life and something that he cherished dearly. David is hugely missed but he would be undoubtedly proud of the fact that his work and commitment to the industry has been valued. This Award would be something he would have hugely endorsed and shared avidly with the winners. Thank you for creating an award that shares and recognises David’s work.”
The post Will Bolton named ‘David Orrick Journalist of the Year’ at ICE Barcelona appeared first on European Gaming Industry News.
Latest News
Toshi.bet Expands in Crypto Gambling Market with Instant Withdrawals and Privacy-Focused Gaming
Toshi.bet introduces a streamlined crypto gambling experience with instant transactions, no KYC requirements, and tailored deposit bonuses.
Toshi.bet, a growing cryptocurrency casino, is expanding its presence in the online gambling industry with a focus on instant withdrawals, privacy, and a broad selection of gaming options. Operating as a no-KYC platform, Toshi.bet provides players with an alternative to traditional online casinos by leveraging blockchain-backed security and provably fair gaming.
Key Features of Toshi.bet
- Notable Growth in the Crypto Casino Sector – Toshi.bet has seen an increase in its user base, with thousands of players engaging in its gaming platform daily.
- Instant Deposits & Withdrawals – The platform supports Bitcoin (BTC), Ethereum (ETH), USDT, and various other cryptocurrencies, enabling near-instant, fee-free transactions.
- Privacy-Focused Gaming – With no KYC requirements, Toshi.bet offers users the ability to place bets while maintaining their anonymity.
- Deposit Bonuses & Reward Programs – Players can access tailored deposit bonuses of up to 200%, free spins, and rakeback rewards.
- Diverse Game Selection – The platform features a variety of gaming options, including slots, live casino, Plinko, dice, and other blockchain-optimized games.
The post Toshi.bet Expands in Crypto Gambling Market with Instant Withdrawals and Privacy-Focused Gaming appeared first on European Gaming Industry News.
Latest News
PopOK Gaming Introduces Poly Live Casino Studio by Alec Monopoly, Featuring Poly Blackjack & Poly Roulette
PopOK Gaming, a leading innovator in the iGaming industry, is pleased to announce the launch of the groundbreaking Poly Live Casino Studio by world-renowned street artist Alec Monopoly.
This one-of-a-kind live casino experience merges the excitement of classic table games with Monopoly’s signature artistic flair, offering an electrifying new dimension to online gaming.
The Poly Live Casino Studio introduces two premium live dealer games – Poly Blackjack and Poly Roulette – delivering an unparalleled fusion of art, entertainment, and immersive gameplay. Featuring exclusive designs by Alec Monopoly, the studio is set to captivate players with its bold visuals and dynamic atmosphere, transforming traditional casino gaming into a work of art.
A Live Casino Experience Like No Other
The Poly Live Casino Studio is a fully interactive, high-energy gaming environment where players can engage with professional dealers in real time. Designed to reflect Alec Monopoly’s iconic street art style, every element of the studio – from the tables to the backdrops – exudes creativity and luxury.
- Poly Blackjack: A fresh take on the timeless classic, featuring a customized table design with bold, colorful artwork and dynamic visuals that elevate the traditional roulette experience. Players can enjoy all the standard inside and outside bets, complemented by an electrifying atmosphere inspired by Monopoly’s signature art.
- Poly Roulette: This exclusive Blackjack table offers a seamless combination of strategy and style. With a fully immersive studio setting and high-quality streaming, players can engage in classic Blackjack gameplay while surrounded by a unique artistic backdrop. The game maintains all standard rules while offering an elevated, collector’s edition feel.
A Collaboration That Redefines Gaming
Alec Monopoly, known for his vibrant and unconventional artistic expressions, brings his signature touch to the live casino space in collaboration with PopOK Gaming. This partnership pushes the boundaries of iGaming by blending fine art with cutting-edge technology, offering players a gaming experience that is as visually striking as it is thrilling.
Elevating the Future of Live Casino Gaming
The launch of the Poly Live Casino Studio marks a new era for live dealer games, where creativity and gaming converge to create a uniquely engaging atmosphere. With PopOK Gaming’s cutting-edge technology and Monopoly’s artistic brilliance, this live casino experience is set to redefine industry standards.
The Poly Live Casino Studio is now available for operators worldwide, bringing a visually stunning and highly interactive gaming experience to players across multiple platforms.
For more information about Poly Blackjack, Poly Roulette, and the Poly Live Casino Studio, visit popokgaming.com.
The post PopOK Gaming Introduces Poly Live Casino Studio by Alec Monopoly, Featuring Poly Blackjack & Poly Roulette appeared first on European Gaming Industry News.
-
Latest News3 months ago
India’s top gamers Jonathan & TechnoGamerz to face off in eFootball showdown at DreamHack India 2024
-
Latest News3 months ago
The 2024 PUBG MOBILE Global Championship (PMGC) Grand Finals Arrive in London!
-
Latest News1 month ago
GamCare releases Annual Report following record breaking year of support on the National Gambling Helpline
-
Latest News2 months ago
Mortal cements his name as face of Indian gaming, wins ‘Content Creator of the Year’ at global Esports Awards 2024
-
Latest News2 months ago
Abios powers upcoming gaming media platform Apollo with in-play statistics for League of Legends
-
Latest News3 months ago
Mythpat, GamerFleet, Piyush Joshi Gaming: India’s popular Minecraft Players Gear Up for the Ultimate Battle in Creators Rumble
-
Latest News3 months ago
Booming Games Partners with Hollywoodbets to Launch Immersive Slots Games in South Africa
-
Latest News2 months ago
MelBet Appoints Bollywood Actress Sherlyn Chopra as its New Brand Ambassador
You must be logged in to post a comment Login