TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Join Huntress' John Hammond & Dave Kleinatland on a | Huntress

2025-08-27 · Read original ↗

ATT&CK techniques detected

6 predictions
T1486Data Encrypted for Impact
92%
"which has allegedly racked up 900 or so victims — shows that different data sets linked to breaches even have timers leading to the deadline until publication. the site also signals data that has already been published. this is all part of the psychological manipulation that come…"
T1657Financial Theft
66%
"which has allegedly racked up 900 or so victims — shows that different data sets linked to breaches even have timers leading to the deadline until publication. the site also signals data that has already been published. this is all part of the psychological manipulation that come…"
T1486Data Encrypted for Impact
65%
"for the identification and location of an individual called “ yukari. ” we can only speculate about what this all means and how these two events are linked. we don ’ t know if the bounty for “ yukari ” was posted pre - compromise by shinyhunters or as bait by law enforcement offi…"
T1657Financial Theft
45%
"for the identification and location of an individual called “ yukari. ” we can only speculate about what this all means and how these two events are linked. we don ’ t know if the bounty for “ yukari ” was posted pre - compromise by shinyhunters or as bait by law enforcement offi…"
T1090.002External Proxy
33%
", and ransomware data leak sites. what is the dark web? first, what is the dark web? essentially, the dark web is still part of the internet ; it ’ s just made up of unindexed content that users can access anonymously. popular forums on the dark web, like breachforums, can be rea…"
T1583.001Domains
31%
"aren ’ t indexed by standard search engines, but these sites are available on the clearnet, meaning that they can be reached via regular web browsers. there ’ s also a slight difference when it comes to the top - level domains ( tlds ). deep websites use uncommon tlds, like. hn o…"

Summary

Huntress researchers take a tour through the dark web, from innovative threat actor marketing techniques to cybercrime drama on BreachForums.