fbpx

Our offices: 

Order a call back

Picus Red Report 2023: The Top 10 Most Prevalent MITRE ATT&CK Techniques Used by Attackers News

Picus Red Report 2023: The Top 10 Most Prevalent MITRE ATT&CK Techniques Used by Attackers

Keeping pace with the threat landscape is tough. With so much intelligence to collect and analyze, it can be challenging to know what action to take to best impact your organization’s security posture.

For the past three years, Picus Security has sought to help security professionals better understand and prioritize their defense against cyberattacks by studying the behavior of malware and by publishing our annual ‘The Red Report’ to share the findings.

To compile "The Red Report 2023" , Picus Labs researchers collected over half a million malware samples- their biggest research project to date. From these samples, over five million malicious actions were extracted and mapped to The MITRE ATT&CK Framework.

The team also analyzed the threat landscape to uncover key trends, including:

  • Attackers are using new and proven techniques to increase Lateral Movement tactics.
  • Ransomware continues to be a threat, and Data Encrypted for Impact is once again a top adversarial technique.
  • Credential Dumping is the second most prevalent technique observed.


The rise of ‘Swiss Army knife’ malware

One of the most notable trends highlighted by this year’s Red Report is the extent to which the techniques used by attackers continue to change year-on-year. Three of the techniques in The Red Report Top Ten 2023 are first-time entries. Compared to the 2020 version of the report, the latest list paints a very different picture.

The increasing sophistication of the techniques observed is also a concerning trend, highlighted by the rise of ‘Swiss Army knife’ malware - multi-purpose malware capable of performing actions across the cyber-kill chain and evading security controls.

More than one-third of malware samples analyzed by Picus Labs can exhibit more than 20 individual Tactics, Techniques and Procedures (TTPs). 10% of malware is capable of more than 30 TTPs.

The ATT&CK techniques listed in this year’s Red Report Top Ten also highlight how the latest malware is equipped to abuse legitimate software, perform lateral movement and encrypt files. A quarter of malware analyzed is capable of performing ransomware attacks.

Download the full report to learn more about the key findings and recommendations for strengthening protection


Picus Red Report 2023


The report is a must-read for all security professionals seeking to implement a threat-centric approach. With up-to-date information, you can focus your efforts on strengthening your threat defenses and significantly reduce cyber risks.


iIT Distribution is a provider of the latest solutions and tools that allow corporate clients to use advanced technologies in the field of building and maintaining IT infrastructure and ensuring cyber security. We work closely with our partners and provide a full range of project support services.

Back

ru_RURussian