TechCentralTechCentral
    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      DStv makes RWC final stream available for R19.95

      27 October 2023

      Dimension Data to be renamed NTT Data

      27 October 2023

      Karpowership gets green light for Richards Bay plant

      27 October 2023

      Why people wave on Zoom

      27 October 2023

      Microsoft gaining ground in cloud race with AWS, Google

      27 October 2023
    • World

      Huawei sees growth in cloud, digital power segments

      27 October 2023

      Intel beats expectations; manufacturing momentum builds

      27 October 2023

      Google CEO to testify on Monday in antitrust trial

      27 October 2023

      China rushes to swap Western tech for domestic options

      26 October 2023

      Alphabet, Meta deliver solid financial performances

      26 October 2023
    • In-depth

      Quantum computers in 2023: what they do and where they’re heading

      22 October 2023

      How did Stephen van Coller really do as EOH CEO?

      19 October 2023

      Risc-V emerges as new front in US-China tech war

      6 October 2023

      Get ready for a tidal wave of software M&A

      26 September 2023

      Watch | A tour of Vumatel’s Alexandra fibre roll-out

      19 September 2023
    • TCS

      TCS | Mesh.trade’s Connie Bloem on the future of finance

      26 October 2023

      TCS | Rahul Jain on Peach Payments’ big funding round

      23 October 2023

      TCS+ | How MiWay uses conversation analytics

      16 October 2023

      TCS+ | The story behind MTN SuperFlex

      13 October 2023

      TCS | The Information Regulator bares its teeth – an interview with Pansy Tlakula

      6 October 2023
    • Opinion

      Big banks, take note: PayShap should be free

      20 October 2023

      Eskom rolling out virtual wheeling – here’s how it works

      4 October 2023

      How blockchain can help defeat the scourge of counterfeit goods

      29 September 2023

      There’s more to the skills crisis than emigration

      29 September 2023

      The role of banks in Africa’s digital future

      22 August 2023
    • Company Hubs
      • 4IRI
      • Africa Data Centres
      • Altron Document Solutions
      • Altron Systems Integration
      • Arctic Wolf
      • AvertITD
      • CoCre8
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • E4
      • Entelect
      • ESET
      • Euphoria Telecom
      • iKhokha
      • Incredible Business
      • iONLINE
      • LSD Open
      • Maxtec
      • MiRO
      • NEC XON
      • Next DLP
      • Ricoh
      • Skybox Security
      • SkyWire
      • Velocity Group
      • Videri Digital
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • E-commerce
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Metaverse and gaming
      • Motoring and transport
      • Open-source software
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Tactics, techniques, procedures: the cybercrime inside track

    Tactics, techniques, procedures: the cybercrime inside track

    Promoted | Rather than only focusing on the latest security tech, enterprise teams should take advantage of shared intelligence and understand TTPs, or tactics, techniques and procedures.
    By Digital Resilience Insight21 February 2023
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    Cybercrime numbers are alarming. According to data management firm Splunk, 65% of organisations reported an increase in cyberattack attempts during 2022, and 49% have suffered a data breach since 2020 — a 10% leap. Though it can seem as if we’re losing the war against online criminals, this isn’t a one-sided confrontation.

    Several reports note a reduction in successful breaches, and ransomware gangs took in less money during 2022 because companies are more reluctant to pay. It’s not enough to declare victory, but cybercrime stats no longer go in one direction, thanks to the industry educating people and businesses and adopting more sophisticated cybersecurity technologies.

    Yet if security, data and risk teams are not careful, they might lose this advantage. A new analysis by Splunk, delving into the findings of several respected threat reports, reveals that the most popular attacks are often still among the simplest. Rather than only focusing on the latest security tech, enterprise teams should take advantage of shared intelligence and understand TTPs, or tactics, techniques and procedures.

    This approach will help them thwart the most obvious attacks that tend to go under the radar, even in sophisticated cybersecurity estates, says Alan Browning, GM at Digital Resilience Insight, a Splunk partner:

    “The Splunk report is an opportune reminder that only a small group of cybercriminals use the latest and most sophisticated techniques. Most will go for tested techniques, especially when those might be ignored by security teams looking at newer threats. But the real benefit of using this information and the ATT&CK knowledge base is that teams can predict and preempt these attacks and put proactive safeguards in place.”

    Means of ATT&CK

    Browning refers to MITRE ATT&CK, a knowledge base of adversary tactics and techniques. Splunk used ATT&CK data as part of its analysis, identifying the most common attack types based on real-world observations.

    In Splunk’s analysis, four activities bubbled up as the most common:

    • PowerShell command and scripting interpreter: Criminals abuse the powerful Microsoft PowerShell command-line system for various tasks, such as discovery and executing code.
    • Obfuscated files or information: Criminals hide executables and other files from discovery by using encryption, compression and other methods.
    • Ingress tool transfer: Once they gain a foothold, criminals transfer tools and files from an external system into a compromised system.
    • System service execution: Criminals abuse system services or daemons to launch commands or programs, often at boot but also during other periods.

    These four are the most common, but Splunk lists several more important avenues of attack, including file and directory discovery, exploiting public-facing applications, and external remote services. Yet the overarching point is that these are known and obvious methods used by online criminals, and studying their TTPs will guide security teams to reinforce their environments.

    Know your TTPs

    Tactics, techniques and procedures are very important, not the least because it’s the criminals who tell us about them, says Browning.

    “You’d think the bad guys would be stealthy and the good guys would work together. But it’s almost the opposite. While security people don’t share as much intelligence and knowledge as they could, adversaries love to share new and reliable attack methods with others on forums and such places. Between collecting attack data and reading what those guys post, we have access to excellent shared intelligence on what attacks to look for.”

    The anatomy of an attack can split into TTPs:

    • Tactics are how online criminals carry out an attack, such as accessing data or moving around a network.
    • Techniques are their general methods, such as installing malware or running unauthorised database commands — tactics usually consist of several techniques.
    • Procedures are the granular steps of techniques. For example, crafting and deploying a phishing e-mail to deliver malicious software.

    Security teams gain a significant advantage when they focus on popular attack methods and study their TTPs. While adopting the latest security measures is imperative, the fundamentals of comprehensive security come from understanding and preempting common attacks.

    “Good security is about risk management,” says Browning. “Where are your risks and how do you mitigate against them? The downside is that the people who create those risks are very adversarial and constantly changing. But the upside is that they also want low risk and high reward, so they often go for proven tactics. Splunk’s analysis clearly shows this effect. I think it’s very important that security teams make TTP studies a part of their strategy, and that they use security providers that take the concept seriously.”

    For more information, connect with Digital Resilience Insight on LinkedIn, or contact GM Alan Browning.

    About Digital Resilience Insight
    Digital Resilience Insight is a leading provider of data security solutions for businesses and organisations of all sizes. With its cutting-edge technology and knowledgeable team, the company is committed to helping its customers protect their sensitive information.

    • This promoted content was paid for by the party concerned
    Alan Browning Atvance Atvance Intellect Digital Relience Insight Splunk
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleRicoh SA completes sustainable solar roll-out at new premises
    Next Article Tether tightens its grip on the wobbling world of stablecoins

    Related Posts

    DStv makes RWC final stream available for R19.95

    27 October 2023

    Acsa aims for carbon neutrality by 2050

    27 October 2023

    Huawei sees growth in cloud, digital power segments

    27 October 2023
    Add A Comment

    Comments are closed.

    Promoted

    Acsa aims for carbon neutrality by 2050

    27 October 2023

    Flutter vs React Native: a comprehensive comparison

    27 October 2023

    iKhokha, Shopstar pave the way for simpler e-commerce

    27 October 2023
    Opinion

    Big banks, take note: PayShap should be free

    20 October 2023

    Eskom rolling out virtual wheeling – here’s how it works

    4 October 2023

    How blockchain can help defeat the scourge of counterfeit goods

    29 September 2023

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2023 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.