TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

F5 Labs

2021 APR Supplement: Of Sectors and Vectors

2021-06-23 · Read original ↗

ATT&CK techniques detected

16 predictions
T1110.004Credential Stuffing
84%
"information technology, such as consulting services, and specific services related to heavy industry, but it also includes both law practices and accountants. in other words, this sector captures a wide range of organizations with a presumably wide range of technical environments…"
T1003OS Credential Dumping
82%
"information technology, such as consulting services, and specific services related to heavy industry, but it also includes both law practices and accountants. in other words, this sector captures a wide range of organizations with a presumably wide range of technical environments…"
T1588.006Vulnerabilities
71%
"that is not easy to sell within the attacker community. figure 2 shows how attacker techniques vary by sector. the clear targeting pattern that was present in 2019 was not seen in 2020 ; in 2019, web exploits constituted 87 % of retail breaches, and nearly every other sector was …"
T1588.006Vulnerabilities
66%
", the prevalence of targeted campaigns of web exploits against sectors like educational services and other services ( meaning, for our purposes, professional advocacy organizations and trade unions ) also shows that the moment that sector no longer correlates to more tactical tar…"
T1110.004Credential Stuffing
60%
"stuffing is underrepresented in this report, and that the large number of unknown initial access techniques probably includes unidentified credential stuffing attacks. it was a bit of a surprise to see credential stuffing reported explicitly in this sector, but we suspect this is…"
T1657Financial Theft
57%
"the two most prevalent attack chains, formjacking and ransomware attacks, are dramatically different in the details but share many of the same tactical objectives, namely initial access, execution, and exfiltration. this is why the overall attack chain visualization, as shown in …"
T1657Financial Theft
52%
"stuffing is underrepresented in this report, and that the large number of unknown initial access techniques probably includes unidentified credential stuffing attacks. it was a bit of a surprise to see credential stuffing reported explicitly in this sector, but we suspect this is…"
T1657Financial Theft
48%
"the information sector. however, only a handful of these tactics appeared in the entire data set, and the information sector contains tech companies, telecommunications companies, and publishing companies, making it hard to determine if persistence is tied to a single kind of org…"
T1078Valid Accounts
47%
"information technology, such as consulting services, and specific services related to heavy industry, but it also includes both law practices and accountants. in other words, this sector captures a wide range of organizations with a presumably wide range of technical environments…"
T1110Brute Force
40%
"information technology, such as consulting services, and specific services related to heavy industry, but it also includes both law practices and accountants. in other words, this sector captures a wide range of organizations with a presumably wide range of technical environments…"
T1566.002Spearphishing Link
38%
"##ypted for impact [ t1486 ] ) and a relatively high rate of both phishing and credential stuffing, they also had a significantly higher number of accidents, both from human errors and technological misconfiguration. the finance industry also had the highest rates of insider atta…"
T1589.001Credentials
36%
"stuffing is underrepresented in this report, and that the large number of unknown initial access techniques probably includes unidentified credential stuffing attacks. it was a bit of a surprise to see credential stuffing reported explicitly in this sector, but we suspect this is…"
T1486Data Encrypted for Impact
34%
"stuffing is underrepresented in this report, and that the large number of unknown initial access techniques probably includes unidentified credential stuffing attacks. it was a bit of a surprise to see credential stuffing reported explicitly in this sector, but we suspect this is…"
T1589.001Credentials
31%
"information technology, such as consulting services, and specific services related to heavy industry, but it also includes both law practices and accountants. in other words, this sector captures a wide range of organizations with a presumably wide range of technical environments…"
T1486Data Encrypted for Impact
31%
", and instead the educational services sector would have been characterized by third - party data loss events, nearly all of which came from the blackbaud cloud storage breach described in the apr. in this event, the educational services sector would have looked very similar to t…"
T1003OS Credential Dumping
30%
"stuffing is underrepresented in this report, and that the large number of unknown initial access techniques probably includes unidentified credential stuffing attacks. it was a bit of a surprise to see credential stuffing reported explicitly in this sector, but we suspect this is…"

Summary

A detailed examination of application risk and cybersecurity attack chains, broken down by sector.