TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

How Malicious Hackers Try to Infiltrate Your IT Team

2025-09-18 · Read original ↗

ATT&CK techniques detected

2 predictions
T1556.006Multi-Factor Authentication
64%
"this is the most secure form of mfa, requiring the use of physical devices, such as hardware security keys, to gain physical access to corporate devices. for instance, usb security keys require manual plug - in to a corporate device for authentication. regular, interactive securi…"
T1586.002Email Accounts
36%
", mimicking facial cues, voice patterns, and even online backgrounds. resumes are meticulously crafted with fake work experience, degrees, and certifications, often accompanied by fake linkedin profiles featuring ai - generated profile pictures and limited connections to appear l…"

Summary

Malicious hackers are impersonating IT and cybersecurity professionals to infiltrate your systems and steal sensitive data. Learn how to identify and defend against these insider threats and protect your organization from "fake workers."