Top 10 most used MITRE ATT&CK tactics and techniques

Top 10 most used MITRE ATT&CK tactics and techniques

Which tactics and techniques are cyber attackers favoring? vFeed has compiled a list of the Top 10 Most Used MITRE ATT&CK Tactics and Techniques to help security teams focus their defenses more effectively.



MITRE ATT&CK helps understand attacker behavior


The MITRE ATT&CK framework is a well known and widely used knowledge base of cyber adversary tactics, techniques and procedures, and is based on observations on real-world attacks.


The framework applies to the following technologies:


Enterprise IT systems: Windows, macOS, and Linux
Cloud systems: Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Software-as-a-Service (SaaS), Office 365, and Azure Active Directory (Azure AD)
Mobile devices: Android and iOS

MITRE ATT&CK can be used to develop threat models, emulate adversaries, help security operations, improve organizational security, verify defenses, develop security arthitecture, and so on.


What are the most used MITRE ATT&CK tactics and techniques?


vFeed, a security outfit that collects and correlates hundreds of data sources to provide an actionable vulnerability and threat intelligence feed, has compiled the list of the tactics and techniques cyber attackers are lately most partial to:



The list shows that the most used tactic is Defense Evasion, which means that companies should focus on hardening and patching their infrastructure, notes NJ Ouchn, founder of vFeed.


“We’ve mapped the relationship between this list and the list of the Top 10 most exploited vulnerabilities from 2020 and it shows that 70% of the latter have a connection with this ATT&CK list, which confirms the value of this ..

Support the originator by clicking the read the rest link below.