Risk and Vulnerability Assessment RVA Mapped To The MITRE ATTampCK
Risk and Vulnerability Assessment RVA Mapped To The MITRE ATTampCK
Risk and Vulnerability Assessment RVA Mapped To The MITRE ATTampCK
MITIGATIONS FOR
RISK VULNERABILITY AND
45.5%
Defense Evasion
MSHTA
4.5%
4.5%
System Time Discovery
System Network Connections
TOP TECHNIQUES
Lateral Movement
M1017 User Training
Train users to be aware of access or
Initial Access » Kerberoasting 43.2% Remote System Discovery 2.3% Remote File Copy M1042 Disable or Remove Feature
Privilege Escalation or Program
Brute Force 40.9% Process Discovery 2.3% Multi-hop Proxy
25.0% Valid Accounts Remove or deny access to unnecessary
Persistence/ » Valid Accounts 31.8% Password Policy Discovery and potentially vulnerable software to
Defense Evasion/ 20.5% Exploitation for Privilege Escalation
27.3% System Owner/User Discovery
Exfiltration prevent abuse by adversaries.
Privilege Escalation
20.5% Access Token Manipulation 18.2% Scheduled Transfer M1047 Audit
27.3% Permission Groups Discovery
15.9% Process Injection 13.6% Exfiltration over Command & Perform audits or scans of systems,
Attack Path 5: Is That a Cleartext Password or SSH Key, I See? 9.1% New Service
18.2% System Service Discovery Control Channel permissions, software, configurations,
18.2% Security Software Discovery etc. to identify potential weaknesses.
Credential Access » Credentials in Files 9.1% Bypass User Account Control 11.4% Data Encrypted
Bash History 13.6% System Information Discovery 4.5% Data Compressed *Top techniques and mitigations vary by sector and
Private Keys 2.3% Sudo environment. Organizations should consider additional
11.4% System Network Configuration 4.5% Automated Exfiltration attack vectors and mitigation strategies based on their
Valid Accounts 2.3% Exploitation of Vulnerability Discovery
Persistence/ » Valid Accounts unique environment.
Defense Evasion/
Privilege Escalation This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) and Pre-ATT&CK frameworks. See the ATT&CK for Enterprise and Pre-ATT&CK frameworks for referenced threat actor techniques.
For more information about CISA assessment services, please visit https://www.cisa.gov/ TLP:WHITE