CIO Influence
Analytics CIO Influence News IoT

CardinalOps Contributes to MITRE ATT&CK for Fourth Consecutive Release

CardinalOps Contributes to MITRE ATT&CK for Fourth Consecutive Release

MITRE ATT&CK v14 includes newly discovered sub-technique that will be used to bolster Wi-Fi Security on systems like Windows, MacOS, and Linux

CardinalOps, the detection posture management company, announced that it contributed updates to the latest version of MITRE ATT&CK, a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. CardinalOps’ contributions to MITRE ATT&CK v14, which was released on Oct. 31, 2023, marks the fourth consecutive release of MITRE ATT&CK to which the CardinalOps team has contributed.

PREDICTIONS SERIES 2024 - CIO Influence

Containing over 800 techniques and sub-techniques employed by both cybercriminal and nation-state threat groups alike, MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is the industry-standard framework for understanding adversary playbooks and behavior. MITRE ATT&CK v14 introduced updates to techniques, groups, campaigns and software for Enterprise, Mobile, and ICS, including a large expansion of detection notes and analytics within techniques in Enterprise.

CIO INFLUENCE News: fifty-five Joins the Amazon Web Services Partner Network for Data-Driven Business Transformation

Liran Ravich, Cybersecurity Architect at CardinalOps, contributed a new sub-technique on Wi-Fi Discovery to the most recent version, as well as both a new technique and sub-technique specifically for Mobile, towards Defense Evasion (Data Destruction) and Impact (Masquerading) tactics, respectively.

Adversaries employ these methods by:

  • Wi-Fi Discovery – Looking to Wi-Fi networks to access information from hosts. By targeting local Wi-Fi networks or networks to which a device has recently been connected, adversaries can access sensitive information like p******** and other personal data. MITRE ATT&CK v14 highlights how these discoveries are made on different systems, including Windows, MacOS, and Linux.

  • Data Destruction – Disrupting the availability of systems, services, and network resources through the destruction of data and files in large numbers or on specific devices. This has the potential to render stored data irrecoverable by forensic techniques due to the overwriting of files or data on local and remote drives.

  • Masquerading – Evading defenses and observation by matching or closely imitating names and locations of legitimate resources and files. This is achieved by assigning the same name or icon as a legitimate, trusted file or application to trick users into selecting the illegitimate version.

CIO INFLUENCE News: Lacework Launches Generative AI Assistant to Level-Up Cloud Security Teams

“CardinalOps is pleased to have the opportunity to collaborate with MITRE to contribute new techniques for the fourth consecutive release of ATT&CK,” said Yair Manor, CTO and co-founder of CardinalOps. “As the threat landscape continues to evolve and present greater cyber risks for organizations, it is important to continue to provide the defender community with resources that allow them to apply this knowledge and continue developing a strong detection posture.”

CIO INFLUENCE News: Interface Systems Appoints New Leaders to its Executive Team

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Vertiv Joins the RISE Partnership Program to Develop Sustainable Data Centre Technologies

CIO Influence News Desk

SnapLogic Continues Significant Momentum Marked by Record Revenue Growth, Global Employee Expansion, and Product Innovation

CIO Influence News Desk

WiMi Developed FPGA-based Holographic Computing System

PR Newswire