TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Experts Weigh in on the State of Email-Based Threats | Huntress

2021-07-14 · Read original ↗

ATT&CK techniques detected

8 predictions
T1566.002Spearphishing Link
99%
"malicious site. and even hovering over the link as we are all trained to do, an innocent user might think they are going to a valid and legitimate website. ” sg : “ regarding the delivery of the ransomware, we are seeing that images are increasingly used to instruct the victim to…"
T1566.002Spearphishing Link
95%
", malware uses living - off - the - land techniques to abuse tools and utilities inherently native to the victim ’ s operating system. even then, they weaponize fileless malware techniques to reside solely in memory and leave behind as few fingerprints as possible. until it is ti…"
T1566.001Spearphishing Attachment
83%
"experts weigh in on the state of email - based threats | huntress hackers often rely on email to be their delivery vehicle for malware. they develop a weaponized url or attachment before delivering it via email to their unlucky targets. email has become a hacker favorite in recen…"
T1486Data Encrypted for Impact
82%
"emails — meaning bad actors can be confident that if they cast a wide enough net, certainly one or more unsuspecting targets will open the email or click its links. ” how does ransomware evade detection or being flagged by security tools that defend the perimeter? sg : “ many tec…"
T1486Data Encrypted for Impact
68%
"… there are a number of things that can be done prior to delivery. if, for whatever reason, a nefarious email does enter an end user ’ s inbox, then we have to fall back to that weak ‘ user education ’ piece. again, relying on the human element is a weak dependency, but at minimu…"
T1598.003Spearphishing Link
35%
"malicious site. and even hovering over the link as we are all trained to do, an innocent user might think they are going to a valid and legitimate website. ” sg : “ regarding the delivery of the ransomware, we are seeing that images are increasingly used to instruct the victim to…"
T1585.002Email Accounts
32%
"it is certain that attacks are becoming more sophisticated. while businesses and employees leave themselves in a vulnerable position, the capabilities and prowess of the bad guys are ever - growing. it is a synthesis of both perspectives : we were unprepared for this onslaught, h…"
T1566Phishing
30%
"’ s fear. these malicious emails are crafted so that the victim has an emotional reaction — as opposed to a rational assessment of the email — to get their victim to take action and increase their chances of success. ” jh : “ we often discuss what i consider to be the boring, bas…"

Summary

Cybersecurity experts John Hammond and Sébastien Goutal provide insider insight on the current state of phishing, ransomware and email-based attacks.