
Blog Post
Last updated: June 18, 2024
In 2013, the not-for-profit security research organization MITRE developed the Adversarial Tactics, Techniques, and Common Knowledge Framework, otherwise known as ATT&CK.
The framework provides businesses with a detailed overview of the methods that advanced persistent threats (APTs) have used in past cyberattacks so that users of the framework can tailor their cybersecurity strategy accordingly. After all, threat actors often resort to the same old strategies (as long as they still work).
The MITRE ATT&CK Framework provides a "standardized language" that participants can use to describe the threats they face. That helps get those in the cybersecurity industry on the same page to address the threat landscape more efficiently.
The framework has proven to be an excellent tool, helping users globally understand and handle cybersecurity more effectively. It offers a consistent, accessible, industry-specific knowledge base that's as comprehensive as possible, and helps you think like a threat actor to keep them from ever infiltrating your system—or mitigate the damage if they do.
Knowing how best to use the framework can be slightly overwhelming, but working with the right experts can help simplify things. That's why in this article, we'll take a deeper look at the MITRE ATT&CK Framework, what it consists of, how to use it, and more.
The MITRE ATT&CK Framework started as a research project in 2013 when a sponsor organization needed a better way to detect threat actors within its IT stack.
As MITRE searched for ways to meet the sponsor's needs, they quickly realized that finding a way to emulate adversarial behavior would help them achieve their goal and help others prepare for a threat. Enter the MITRE ATT&CK Framework.
The primary feature of the MITRE ATT&CK Framework is the ATT&CK matrix. It also includes a global cybersecurity community formed by private and public sectors and leading product and service vendors. They come from different parts of the industry, but their common goal is the same: to guard against cyber threats.
They do it by developing better cyber threat models and sharing their insights from attacks that they've faced. And because the cybersecurity industry has so many varying terms, they created a common language that all can use for better communication.
Initially developed for Windows operating systems only, the MITRE ATT&CK Framework has since expanded its scope to include macOS, Linux, mobile devices, and industrial control systems (ICS).
And since APTs often use different methods to break into the cloud, there's a separate framework for cloud and enterprise systems.
The ATT&CK matrix is essentially a grid plotting an APT's purposes for attempting their attacks (tactics) and their methods to achieve them (techniques), to give users a detailed understanding of what threat actors do and why.
Intended to describe an APT’s motives when they carry out their threats, tactics give the "why" behind a threat actor's actions. MITRE has classified these motives into 14 different categories, namely:
These 14 tactics are listed as the columns of the MITRE ATT&CK Framework Matrix, and underneath are the methods that adversaries use to achieve each goal.
Threat actors have many tools to help them achieve their goals, which is why cybersecurity teams need to understand each one if they want to model adversary behavior accurately.
Describing the methods used to accomplish tactics and techniques gives the "how" behind an attacker's behavior. In total, 227 techniques are listed in the 2022 Enterprise version of the matrix, which you can check out here.
Techniques don't describe the exact means adversaries use to execute their attacks but give a general overview of how the threat was carried out.
Techniques show ATT&CK users the general methods adversaries are most likely to use to attack their IT infrastructure, but sub-techniques provide more specific insights.
For example, an adversary may attempt to achieve its "Collection" tactic by archiving collected data. They may do that by archiving them by a utility, library, or another custom method—all sub-techniques listed within the matrix.
The 2022 Enterprise version of the MITRE ATT&CK Framework matrix contains 401 sub-techniques in total. Some techniques have multiple sub-techniques, while others have zero.
Just as sub-techniques provide more specific details on adversaries' techniques, procedures dive even deeper into the exact methods used in the past. They can be found in each report's "Procedure Examples" section after you select the technique or sub-technique you'd like to learn more about.
For example, suppose you'd like to guard against adversaries attempting the "Collection" tactic who archive collected data. In that case, you can select this technique and find the three sub-techniques listed earlier.
You'll then find an extensive list of known programs adversaries have used to encrypt and compress stolen data before exfiltration to avoid detection.
These specific methods that threat actors have used constitute the procedures portion of the MITRE ATT&CK matrix, and they help users know which ploys to guard themselves against.
The MITRE ATT&CK Framework gives one of, if not the most thorough listings of adversary behavior available. That brings many advantages—but it's not without challenges.
Such an extensive tool can be difficult to make the most of and overwhelming to use. Here are some of the benefits it offers, along with the challenges that come with it.
From improving threat awareness to sharing information, the MITRE ATT&CK Framework offers all sorts of benefits, including:
Despite all its benefits, some challenges arise that keep organizations from using the MITRE ATT&CK Framework to its fullest potential. These barriers include:
To implement the MITRE ATT&CK Framework effectively, you'll need to integrate it with your other cybersecurity tools.
Thankfully, it's becoming an industry standard for cybersecurity vendors to leverage the MITRE ATT&CK Framework in their threat detection and blocking capabilities.
In fact, Covalence’s automated monitoring is designed to confidently detect tactics outlined in the framework and is routinely updated to reflect the latest techniques and indicators of compromise.
Beyond threat detection, the framework can also be used for:
The MITRE ATT&CK Framework is particularly helpful for anticipating threat actors' behaviours to prevent attacks before they occur, giving you a reference point from which you can reduce your vulnerabilities.
The MITRE ATT&CK Framework started as a research project and has been expanding its scope ever since. It lets you think like a cybercriminal so that you can meet a threat head-on and gives you a common language to describe the landscape you face.
If you want to learn more about how Covalence protects your business at every stage of an attack, schedule a demo today.