MITRE announced last week that the latest update to the popular ATT&CK framework introduces techniques related to containers and the Google Workspace platform.
ATT&CK is a knowledge base of adversary tactics and techniques that is based on real-world observations. ATT&CK v9 adds container-related attack techniques, which is the result of a project conducted by MITRE’s Center for Threat-Informed Defense and sponsored by Microsoft, Citigroup and JPMorgan Chase.
There has been a debate on whether or not container techniques should be added considering that in a vast majority of cases they lead to cryptomining. However, containers have also been used by malicious actors for other purposes, including data harvesting and exfiltration. It has been determined that these incidents are “publicly under reported,” which is why developers of the ATT&CK framework have decided to include container-related techniques.
As for the addition of Google Workspace, MITRE explained, “Since ATT&CK already covers Office 365, we wanted to ensure that users of Google’s productivity tools were also able to map similar applicable adversary behaviors to ATT&CK.”
Another significant change in ATT&CK v9 is related to cloud platforms — AWS, Azure and Google Cloud Platform have been consolidated into a single infrastructure-as-a-service (IaaS) platform.
The latest version also includes some updates to macOS techniques and some changes in how data sources are described.
ATT&CK v9 covers 14 tactics, 185 techniques, and 367 sub-techniques, as well as 16 new threat groups and 67 new pieces of software. All new elements and updates are detailed on MITRE’s website. The next major update for the framework is scheduled for October.
Last year, MITRE announced the release of an ATT&CK knowledge base for industrial control systems (ICS), and introduced a knowledge base of techniques and tactics that defenders can use to secure their networks and assets.