TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Ten Years of Resilience, Innovation & Community-Driven Defense

2025-08-25 · Read original ↗

ATT&CK techniques detected

19 predictions
T1190Exploit Public-Facing Application
99%
"##erabilities in on - premises microsoft exchange servers. these vulnerabilities, cve - 2021 - 26855, cve - 2021 - 26857, cve - 2021 - 26858, and cve - 2021 - 27065, affected exchange server 2013, 2016, and 2019 and created a perfect storm of security weaknesses that attackers ch…"
T1190Exploit Public-Facing Application
95%
"americans. this breach has turned into a textbook example of how a single unpatched vulnerability can disrupt livelihoods, careers, and corporate reputations. it all began with cve - 2017 - 5638, a critical vulnerability in apache struts 2, a popular web application framework. wh…"
T1486Data Encrypted for Impact
94%
"non - negotiable - investment in strong ir plans to control chaos in the aftermath of a hard - hitting cyberattack - criticality of early detection and response for minimizing cyberattacks at scale when chaos erupted across the threat landscape, our security experts at huntress q…"
T1486Data Encrypted for Impact
93%
"the attack was attributed to darkside, a ransomware - as - a - service ( raas ) operation, which used a single compromised vpn password for an account that wasn ’ t in use at the time of the attack and that didn ’ t have multi - factor authentication ( mfa ) enabled. darkside ran…"
T1190Exploit Public-Facing Application
92%
"the cl0p ransomware gang exploited a zero - day sql injection vulnerability ( cve - 2023 - 34362 ) in progress software ’ s moveit managed file transfer ( mft ) software, a tool for exchanging sensitive data. this triggered a cascade of breaches across hundreds of organizations w…"
T1190Exploit Public-Facing Application
88%
"you can ' t see. it pushed organizations to modernize their approach to third - party software security by : - focusing on software bill of materials ( sbom ) and tracking detailed inventories of every component in software supply chains - looking at every library, component, and…"
T1584.005Botnet
82%
"the qakbot botnet empire finally crumbled in august 2023, thanks to an international coalition of law enforcement agencies. operation duck hunt redirected qakbot botnet traffic through law enforcement servers and sent uninstall files to machines infected with qakbot. so what exac…"
T1190Exploit Public-Facing Application
82%
"to : - run security assessments for suppliers, scrutinize their security practices, and set clear incident response ( ir ) guidelines for the supply chain companies you work with - segment networks like crazy. limit the vendor software ’ s access to critical systems and data - us…"
T1195.002Compromise Software Supply Chain
74%
"assets because they ' re less likely to be monitored and patched consistently. 3. solarwinds supply chain attack ( december 2020 ) we all know that software updates make us safer. they patch vulnerabilities, add features, and keep our systems running smoothly. but what happens wh…"
T1190Exploit Public-Facing Application
66%
"##ct, a widely used remote monitoring and management ( rmm ) tool, was the latest company to warn of two critical vulnerabilities. what unfolded was an alarming, stereotypical example of how quickly threat actors can exploit security flaws, turning thousands of trusted software b…"
T1486Data Encrypted for Impact
60%
"##nect automatically operates with elevated privileges across networks, making it a perfect launchpad for attackers to move laterally and compromise endpoints. victims were suddenly dealing with : - ransomware deployments that encrypted critical business data - cryptocurrency min…"
T1195Supply Chain Compromise
57%
"assets because they ' re less likely to be monitored and patched consistently. 3. solarwinds supply chain attack ( december 2020 ) we all know that software updates make us safer. they patch vulnerabilities, add features, and keep our systems running smoothly. but what happens wh…"
T1657Financial Theft
53%
"the attack was attributed to darkside, a ransomware - as - a - service ( raas ) operation, which used a single compromised vpn password for an account that wasn ’ t in use at the time of the attack and that didn ’ t have multi - factor authentication ( mfa ) enabled. darkside ran…"
T1195Supply Chain Compromise
49%
"to : - run security assessments for suppliers, scrutinize their security practices, and set clear incident response ( ir ) guidelines for the supply chain companies you work with - segment networks like crazy. limit the vendor software ’ s access to critical systems and data - us…"
T1195Supply Chain Compromise
45%
"in around $ 10 billion in losses. the notpetya attack marked a significant turning point in cybersecurity, redefining how the world understood nation - state cyber warfare and supply chain vulnerabilities : - nation - state actors are willing to cause massive collateral damage to…"
T1190Exploit Public-Facing Application
38%
"assets because they ' re less likely to be monitored and patched consistently. 3. solarwinds supply chain attack ( december 2020 ) we all know that software updates make us safer. they patch vulnerabilities, add features, and keep our systems running smoothly. but what happens wh…"
T1588.006Vulnerabilities
38%
"americans. this breach has turned into a textbook example of how a single unpatched vulnerability can disrupt livelihoods, careers, and corporate reputations. it all began with cve - 2017 - 5638, a critical vulnerability in apache struts 2, a popular web application framework. wh…"
T1587.004Exploits
32%
"trip down memory lane starts on june 27, 2017. it began like any other tuesday for businesses around the world. but by the end of the day, global supply chains were paralyzed, hospitals were forced offline, and shipping giant maersk was operating with pen and paper across 76 port…"
T1583.005Botnet
30%
"the qakbot botnet empire finally crumbled in august 2023, thanks to an international coalition of law enforcement agencies. operation duck hunt redirected qakbot botnet traffic through law enforcement servers and sent uninstall files to machines infected with qakbot. so what exac…"

Summary

Celebrate 10 years of wrecking hackers! See how Huntress has evolved and elevated in an ever-changing cybersecurity landscape, shaped by key milestones and critical lessons.