Get a demo

Voyager18 (research)

The MITRE ATT&CK framework: Getting started

The MITRE ATT&CK framework helps security teams detect avenues of attack and better manage vulnerabilities. Here are the basics.

Lior Ben-Dayan | February 22, 2024

Managing security vulnerabilities can feel like swatting at flies—one vulnerability may be resolved, but a dozen more can pop up elsewhere.

Traditional security management strategies are struggling to keep up due to their growing complexity and the emergence of modern threats that are adept at evading detection. This has necessitated a shift towards more sophisticated detection methods, such as anomaly-based detection using machine learning and big data analysis. 

To navigate these challenges, organizations are turning to comprehensive frameworks like Lockheed Martin’s Cyber Kill Chain, NIST’s Cybersecurity Framework, or the leading MITRE ATT&CK, to establish a more holistic security program. However, the real-world application of these theoretical frameworks requires a practical approach to integrate them with the Common Vulnerabilities and Exposures (CVE) system for a detailed understanding of vulnerabilities. 

This blog post delves into the MITRE ATT&CK framework and the CVE system, highlighting the benefits of their integration to enhance organizational security and resilience against cyber threats.

TL;DR

Addressing security vulnerabilities in the digital age requires more than traditional methods due to the complexity of threats and advancements in detection technology. Organizations are turning to frameworks like MITRE ATT&CK and integrating them with the CVE system for a comprehensive approach to cyber risk management. This strategy enhances the understanding and mitigation of vulnerabilities, combining the theoretical depth of ATT&CK with the practical application of CVEs to improve security posture and resilience against cyber threats.

The challenge today

It’s becoming increasingly clear that standard vulnerability management strategies are no longer enough. There are two reasons for this. First, is the growing complexity of traditional techniques. Typical security management techniques such as signatures, suspicious IP address lists, and indicators of compromise (IOCs) have grown increasingly complex and harder to track and manage. Second, is the introduction of modern techniques that increase effectiveness against emerging threats.

While traditional vulnerability and cyber risk management techniques are still effective and important, they may not be sufficient on their own to block modern threats. Today’s threats are more likely to adapt and work actively to evade detection.

Meanwhile, the fast proliferation of new technologies and attack areas across application, network and cloud enivoronments means that teams can no longer depend on traditional methods of detection:

200

Cybersecurity Ventures predicts that global data storage will exceed 200 zettabytes by 2025. This includes data stored on private, public, and utility infrastructures, private and public cloud data centers, personal devices, and IoT (Internet-of-Things) devices.

This has led to the rise of anomaly-based detection, which uses sophisticated methods like machine learning, statistical and other big data analysis to detect atypical, or anomalous, events. This combination of behavior-based and traditional techniques offers more protection.

 

Frameworks and best practices: MITRE leads the pack

To simplify cyber risk management and encourage best practices—while also paving the way for new techniques—many organizations are adopting comprehensive frameworks such as Lockheed Martin’s Cyber Kill Chain, NIST’s Cybersecurity Framework, or MITRE ATT&CK. 

Today’s leading framework is MITRE ATT&CK, but as with other frameworks, it’s largely theoretical. All of these frameworks are based on a big picture of vulnerability management and prevention, aiming to help organizations establish a more comprehensive security program. But when dealing with vulnerabilities in the real world, a theoretical framework isn’t always enough. 

As specific software vulnerabilities emerge, they are classified through the CVE system, also developed by MITRE, to create a common language around vulnerability management.

And in the real world, what would really help organizations plan, prepare, and prevent attack is a system that can bring these two concepts together: identifying the most prevalent attack strategies using the ATT&CK framework, and identifying specific software vulnerabilities using the CVE system.

 

MITRE ATT&CK

 

 

What is the MITRE ATT&CK framework?

Recognizing changes sweeping the security industry and the need to pave the way for anomaly-based detection, the nonprofit MITRE corporation released its ATT&CK framework in 2023.

It now dominates the industry—across enterprises, government agencies, and security vendors.

The most important thing to know about ATT&CK is that it takes an “adversarial” approach. This means it classifies activities based on the actions of adversaries in attacking an organization.

The MITRE ATT&CK framework serves as a comprehensive compendium of adversary tactics, techniques, and procedures (TTPs) employed throughout the intrusion lifecycle. It breaks down each stage in the attack process down into TTPs, as seen in the following example.

In a watering hole attack (also called “waterholing”), hackers compromise websites that a target victim or group (such as employees of a specific company) often visits to gain access to their devices and networks. 

MITRE ATT&CK in action

Here’s an example of how this would look broken down into TTPs under the ATT&CK framework:

  • T – tactic: The tactic in this case is initial access (methods that leverage multiple entry points to gain an initial foothold in the target network).
  • T – technique: One technique used in a watering hole attack is drive-by compromise (delivering exploit code to the user’s web browser).
  • P – procedure: Snip3, a crypter-as-a-service, cloaks malware in deceptive layers, letting it evade detection and cause damage to victims’ systems. It can be used for drive-by attacks by encrypting malware that is then delivered through malicious downloads.

 

This is just one example of how the ATT&CK framework provides a valuable tool for identifying and mitigating risks. Using the framework can help improve security awareness and training to help organizations protect themselves from cyber threats.

However, it’s clear even from this one small example—describing one very specific attack vector out of hundreds—that the ATT&CK framework is massive and comprehensive. It is also, as mentioned, largely theoretical—helping understand the tactics, techniques, and procedures that attackers will adopt, as well as proposed detections and mitigation mechanisms.

For example, at the bottom of every Technique page, MITRE lists best practices for detection, such as—on this page for drive-by compromise—inspecting URLs for potentially problematic domains and performing reputation-based analytics on websites and resources to stop users from venturing into dangerous territory.

While these mitigation tips are helpful, they underscore the need to reconcile ATT&CK TTPs with actual CVEs that an organization might encounter in order to create the most intelligent possible prioritization along with the most relevant mitigation steps.

 

A practical solution: Mapping ATT&CK to CVEs

The Common Vulnerabilities and Exposures (CVE) system is the most widespread method of tracking and enumerating publicly known weaknesses in software that can be exploited by attackers to gain access to systems or data. 

The CVE system was also spearheaded by the MITRE Corporation in the late 1990s to help remedy inconsistent information sharing among organizations around vulnerability identification and classification. The CVE system was designed to be vendor-neutral and to provide a common language for discussing vulnerabilities.

For example, in the SolarWinds hack of 2020, attackers exploited a known vulnerability in the SolarWinds Orion software (enumerated as CVE-2020-10148) to gain access to the networks of multiple government agencies and private companies.

Yet though the CVE system was also created by MITRE, there is little to no innate crossover between ATT&CK TTPs and CVEs. Understanding the relationship between TTPs and CVEs, organizations can better prioritize vulnerability remediation efforts and improve their security posture.

Pro tip

Combining the real-world intelligence behind CVEs with the massive and comprehensive ATT&CK framework could help organizations in a number of ways:

 

  • Identify high-risk CVEs: Use knowledge of attacker techniques, like “spearphishing link” in the ATT&CK framework, to prioritize fixing vulnerabilities.
  • Discover relevant TTPs: Utilize the ATT&CK framework to find tactics likely to exploit known CVEs in the organization.
  • Build threat models: Combine TTPs and CVEs to assess and model potential threats more effectively.

Bringing the MITRE ATT&CK framework and CVE data together offers a great deal of promise to the threat hunting and threat intelligence fields—all of which will help make networks, data, and users safer into the future. But it also poses a number of challenges, making it one of the most fascinating areas of cyber security research today.

 

MITRE ATT&CK

 

Find out more about how the Vulcan Cyber Voyager 18 research team is solving this and other problems to help build its next generation of cyber risk management platforms. Read the full white paper.

Get rid of silos;

Start owning exposure risk

Test drive the leader in exposure risk management