Industry News
PRE-ATT&CK Techniques: The Key to Preventing Cyber Attacks
Cyber attackers are now targeting any kind of information that can reward them: from personal data to corporate information to government secrets. However, behind each attack, there is a long chain of thoroughly selected actions.
While most organizations focus their attention on protecting the perimeter of their corporate network, the cybersecurity experts from MITRE advise expanding their ability to understand the behavior of adversaries.
Hackers select their victims long before their attack and carefully collect information about them before executing any malicious actions. Nowadays, the internet provides them with a great variety of data about almost any company, so adversaries can learn enough not only about a company’s activity but also about its cybersecurity weak spots.
To help security officers understand how hackers choose their victims and prevent an attack before it even begins, MITRE, a non-profit corporation that tackles cybersecurity problems, has created the PRE-ATT&CK matrix that is a part of the Adversarial Tactics, Techniques, and Common Knowledge, also known as the ATT&CK framework.
What is the PRE-ATT&CK matrix?
PRE-ATT&CK allows security officers to prevent a possible attack before an adversary penetrates into their network. The PRE-ATT&CK matrix contains 15 tactics and more than 150 techniques that explain the adversary planning, information gathering, reconnaissance, and setup when preparing their attack.
The tactics in PRE-ATT&CK explain the typical adversarial techniques and procedures for selecting a victim, obtaining information about it, and launching the cyber attack. This information provides security officers with a broader understanding of adversary behavior before any indicators of compromise appear.
PRE-ATT&CK allows security officers to find answers on the following questions:
- Are there any signs that cyber attackers are targeting your organization?
- What adversary techniques may an attacker apply to your company?
- How can you analyze the collected data to notice a hacker’s interest into your organisation?
Analyzing the PRE-ATT&CK techniques and tactics, defenders can get a better understanding of cyber attacker activities. They can use this knowledge to make appropriate decisions on what technical measures and mitigations to adopt in order to reduce hacker’s chances on properly preparing an attack on their organization.
How to use the PRE-ATT&CK matrix
The PRE-ATT&CK matrix provides detailed information about how adversaries prepare for arranging a cyber attack. The PRE-ATT&CK tactics explain what goals an aversary sets for themselves, while each technique shows how these goals can be achieved. The tactics in PRE ATT&CK reflect such attacker goals:
- Priority definition
- Victim selection
- Gathering information about a victim
- Victim weakness identification
- Persona development
- Capabilities setup
The PRE-ATT&CK techniques show how adversaries perform each tactic and allow enterprise defenders to track and organize attack statistics and patterns.
Priority definition
Using this tactic, an adversary weighs all the pros and cons of arranging an attack. They set their goals by considering how the information they are getting can benefit them and what kind of information has the biggest value for them. At this stage, cyber criminals compare the cost of cyber intrusions with the expected reward from their activity.
Victim selection
Taking into account their priorities, adversaries begin to look for their victims. They take their strategic considerations and then narrow them down tactically and operationally until a victim is selected. Depending on their target, adversaries can decide to attack it directly or through business partners. However, for making the right decision, hackers usually need to collect all possible information about their target.
Gathering information about the victim
After adversaries select their victim, they can’t blindly execute an attack. They first need to gather all information about their target: the type of technical system the victim uses, the personnel that works for the victim, and the victim organization itself.
Attackers usually collect information about their victims by using open-source intelligence tools and techniques. Such data about a victim as organization’s domains, email address format, names of top personnel can be freely found online by combining phishing and social engineering techniques.
While organizations can’t minimize their presence on the internet nowadays, security officers can consider how the public data of their company may be abused and define vectors of possible attacks.
Identifying victim weaknesses
By analyzing all the data collected at the previous stage, adversaries can find potential weaknesses of their victim. The discovered vulnerabilities become the basis of creating a plan of the attack. Weakness identification also allows adversaries to test and configure their own systems for attack execution.
At this stage, defenders can consider the Pyramid of Pain that will help them define the importance of indicators of compromise.
Persona development
Though the internet is a place where you can find everyone, it’s also a place where anyone can create a fake persona. A hacker can develop their persona by providing a fake email address and personal information to one of the social media sites. Getting in contact with a potential victim, an adversary can gain greater access to the victim’s personal profile with an intention to abuse this data later.
Unfortunately, most social media don’t inform their users whether someone viewed their profile. However, organizations can establish tight privacy control for their corporate accounts in social media by establishing trusted connections, blocking suspicious content, and educating their employees.
Capabilities setup
After getting in contact with potential victims, an adversary will establish capabilities for arranging an attack. Though some cyberc riminals may be really technology-savvy, most of them look for the easiest way to maintain their own internet infrastructure.
There are plenty of cost-effective ways to anonymously use servers, autonomous systems, and networks. Adversaries often abuse this anonymity for achieving their malicious goals. Paying just several dollars per month, they can get a virtual presence enough for compromising your organization.
Even if your logs detected adversarial activity from a specific server, it would be very difficult to legally pursue that source because of the lack of evidence. Though it may seem nearly impossible to detect an adversary at this stage of the cyber attack, security teams should pay attention to behavioral patterns that indicate hacker’s activity.
While PRE-ATT&CK describes only the adversarial behavior before an attack, MITRE has recently integrated some PRE-ATT&CK techniques into ATT&CK to let security teams define the potential vectors of attacks on their organizations and improve their security measures accordingly.
Enterprises that integrate PRE-ATT&CK into their security best practices can significantly enhance their protection measures and prevent adversaries long before they actually begin their malicious campaigns.
Conclusion
It’s not a secret that cyber attacks are now more targeted than any time before. Cyber criminals carefully select their next victim and conduct a thorough investigation before penetrating into your corporate network. Using the PRE-ATT&CK matrix from MITRE, security teams can reveal the early signs of adversarial behavior and prevent an attack before hackers compromise your organization.
This article is a contribution from Marcell Gogan. Marcell is a specialist within digital security solutions, business design and development, virtualization and cloud computing, R&D projects, establishment and management of software research direction – working with Ekran System. He also loves writing about data management and cybersecurity.
Industry News
LiveScore Group Announces Internal Restructuring as Part of Sustainable Growth Strategy
LiveScore Group has announced an internal restructuring process, expected to impact more than 100 existing roles across multiple business locations, including London.
The changes are seen as a difficult yet important step for LiveScore Group, streamlining the business to create improved structures and a pathway to long-term sustainable growth. All impacted employees have been informed and are now subject to a confidential consultation process.
Sam Sadi, CEO of LiveScore Group, said: “On behalf of all Directors of LiveScore Group, and the relevant subsidiary companies, we are saddened by the difficult decision to commence an internal restructure of the business, a process which impacts a significant number of our people.
“Whilst we celebrate our recent period of significant and exciting growth, we must now future-proof the organisation and ensure our internal structures allow us to achieve long-term and sustainable success.
“This is a hard time for all our people, as we say goodbye to colleagues who have played an important role in our journey across recent years.”
The announcement follows on from the recent news that LiveScore Malta Limited (part of LiveScore Group) is to withdraw its LiveScore Bet brand from the Netherlands following recent government tax increases in the market. The announcement includes those impacted by this. There will be no other customer impact in respect of any of the remaining LiveScore, LiveScore Bet or Virgin Bet sites globally.
Industry News
Pronet Gaming Appoints Alex Karaoulis as its New Commercial & Product Strategy Lead
Pronet Gaming, an award-winning platform provider of full turnkey solutions, announced the appointment of Alexandros Karaoulis as its new Commercial & Product Strategy Lead.
With over 14 years of experience in the iGaming industry, Karaoulis brings a wealth of knowledge and expertise that will be instrumental in driving the company’s strategic initiatives forward.
Throughout his iGaming career, Karaoulis has held various senior roles with B2B sportsbook and casino providers, as well as with B2C operators. His extensive background in marketing and sales within the iGaming sector positions him as a true industry expert, ensuring that Pronet Gaming remains at the forefront of innovation in a rapidly evolving market.
“I am thrilled to join Pronet Gaming and excited to fulfill my role in developing and executing sales strategies to drive the company’s revenue growth in key markets,” Karaoulis said.
With a track record in commercial strategies and driving product excellence, Karaoulis’ appointment is invaluable as Pronet Gaming now seeks to expand its footprint to Asia. His vision and deep understanding of the iGaming landscape equip him to navigate the unique challenges and opportunities that the dynamic region presents.
“I want Pronet Gaming to lead the iGaming revolution by providing innovative, culturally tailored solutions that cater to the diverse and rapidly growing demands of the region. Through strategic partnerships, cutting-edge technology, and a deep understanding of local markets, we aim to empower operators to offer world-class gaming experiences that engage players and drive sustainable growth,” he added.
According to Karaoulis, Pronet Gaming is poised to make a splash in Asia by leveraging its advanced technology, flexible platform solutions and deep market expertise while adapting to the unique characteristics of the region.
“The key differentiation point of Pronet Gaming is that we have B2C experience, which greatly aids in understanding the needs of operators and helping them to improve and execute their strategy according to the market. I have worked in B2C roles for more than seven years in my iGaming Career and managed campaigns across various channels, optimised conversion funnels, and learned to use data to improve player acquisition and retention,” said Karaoulis.
Karaoulis acknowledges that the marketing skills he has acquired from B2C experience are valuable in every B2B environment. As he dives into his new role at Pronet Gaming, Karaoulis aims to guide his operator clients on how to better market their own sites, including providing them with advice on effective acquisition strategies, content marketing and campaign structures that appeal to iGaming audiences.
“I also focus heavily on engagement strategies, loyalty programs, bonuses, and personalised offers to keep players active and returning. In my new B2B role, I will advise clients on best practices for player engagement, helping them adopt effective loyalty programs, personalised marketing, and retention tactics that drive player lifetime value to improve the end-player experience for our clients’ sites,” Karaoulis added.
Industry News
Vbet Wins Best Online Casino Operator 2024 at SiGMA Europe 2024
Vbet has been crowned the Best Online Casino Operator 2024 at the highly coveted SiGMA Europe event, cementing its position as a leader in the online gaming industry.
This achievement highlights Vbet’s commitment to providing an exceptional user experience by combining cutting-edge technology with a vast range of options and a secure process. The dedication to creating a responsible, enjoyable environment for players was recognised with this award, making this accolade even more significant. As Vbet continue to expand into new markets, the list of strategic partnerships grows alongside our constant drive to expand its offering. This award serves as a stepping stone on its path to reach more players and set new standards in the industry.
Arman Khachatryan, VBET’s Managing Director, said: “We are incredibly proud to receive the Best Online Casino Operator award at SiGMA Europe 2024. This recognition is a testament to the hard work, passion, and effort of our entire team. Our mission has always been to deliver the highest quality experience in the safest environment possible to our users. This award not only recognizes our dedication to this mission but also motivates us to continue expanding into new markets and territories.”
-
Latest News3 days ago
Make every pixel personal: Opera GX facelift lets you match your browser to your setup down to the smallest detail
-
Latest News3 days ago
Casino Management System Market to Reach USD 29.09 Billion by 2032 | Enhanced Security and Operational Efficiency Drive Growth | Research by S&S Insider
-
Africa6 days ago
South Africa: Tribunal Grants Lottoland Interim Relief – Orders Google to Grant Lottoland Access to its Advertising Platform
-
Latest News3 days ago
Fast Track Celebrates Third Year as a Great Place to Work Certified™ Tech Company
-
Latest News4 days ago
IBIA Upgrades Technology Platform to Strengthen Global Betting Integrity Efforts
-
Latest News3 days ago
Crypto Sportsbook, Sportsbet.io’s player wins huge $3.2m jackpot from $5 spin
-
Latest News3 days ago
ACR POKER ADDS BLITZ BONUS BOOST TO NOVEMBER CALENDAR AS $20 MILLION GTD WINTER OSS ENTERS FINAL DAYS
-
Industry News6 days ago
FDJ Announces its First Bond Issue