TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

The Age of Rapid-Response Managed Detection and Response | Huntress

2021-07-26 · Read original ↗

ATT&CK techniques detected

7 predictions
T1588.001Malware
76%
". utilize ai and machine learning to monitor both known and unknown cyber threats at every state of their lifecycle. - isolate. generate real - time forensics and storyline visualizations to map attacks ' point of origin and progression across endpoints. - block. use policy - dri…"
T1547.001Registry Run Keys / Startup Folder
72%
"inside. once we mark all the files as malicious, a report is generated with information for remediation steps to be taken to eradicate the malware. at huntress, real humans analyze every detail on every persistence mechanism we find. the autorun details — the file name, file path…"
T1486Data Encrypted for Impact
71%
"paths that come through. when a computer has a malware infestation, you might see a ransomware notice that states that your files have been encrypted. you might see lots of pop - up ads. your system administration tools / antivirus software applications might be disabled. these a…"
T1588.006Vulnerabilities
55%
"of cyber threats today means protecting your endpoints on multiple fronts. with cyber criminals ratcheting their attacks on remote workers, managed detection and response can provide the visibility organizations need to proactively counter attacks before they penetrate your endpo…"
T1078Valid Accounts
52%
"holding you back. below are some questions to ask. - do we have full visibility into all endpoint environments? whether traffic is on the corporate network, in a hybrid data center or on the remote employee ’ s endpoint, central visibility into the devices that employees are work…"
T1547Boot or Logon Autostart Execution
41%
"inside. once we mark all the files as malicious, a report is generated with information for remediation steps to be taken to eradicate the malware. at huntress, real humans analyze every detail on every persistence mechanism we find. the autorun details — the file name, file path…"
T1547.001Registry Run Keys / Startup Folder
39%
"machines had been infected. the huntress solution collects data using forensics, looking for footholds and backdoors that usually are found in startup folders, autoruns and, scheduled tasks, to name a few. this data then goes to huntress ’ threatops team who analyzes the data man…"

Summary

We teamed up with our partners at Magna5 to talk about providing real-time prevention, detection and response.