TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Huntress Managed ITDR (formerly MDR for Microsoft 365) | Huntress

2023-10-16 · Read original ↗

ATT&CK techniques detected

4 predictions
T1078.004Cloud Accounts
96%
". once the new account is online, they can elevate that account to have global admin permissions and truly have the keys to the kingdom, being able to change anything, add rules, and cover their tracks. these are just two out of countless types of bec attacks that we at huntress …"
T1098.002Additional Email Delegate Permissions
80%
"or undo any compromise that has taken place, as well as ensure the environment is fortified against future attacks. some examples of the attacks that we are already looking for and detecting within microsoft 365 tenants are : suspicious inbox rules this attack looks to take real …"
T1598Phishing for Information
44%
"a fairly linear process for getting the end result — either financial gain for the threat actor or gaining personally identifiable information ( pii ) to be sold or used at a later date. the bec attack chain typically looks something like this : as you see in the above graphic, t…"
T1586.002Email Accounts
33%
"huntress managed itdr ( formerly mdr for microsoft 365 ) | huntress since our inception, huntress has had a guiding principle to protect the 99 %. this ethos has led us to create products, features, and functionality that look to prevent issues and stop problems that plague small…"

Summary

Read up on how and why Huntress built its Managed ITDR (formerly MDR for Microsoft 365) solution to help combat the growing threat of business email compromise (BEC).