Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis

被引:1
|
作者
Park, Seongmin [1 ]
Lee, Myeongsu [2 ]
Na, Sarang [1 ]
Lim, Joonhyung [1 ]
机构
[1] Korea Internet & Secur Agcy, Naju Si, South Korea
[2] AhnLab, Seongnam Si, South Korea
来源
关键词
Destructive Malware; Cyber Warfare; MITRE ATT&CK; TTPs;
D O I
10.1007/978-981-97-4465-7_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most types of malware are spy-on that seek to collect and steal sensitive information by infecting target systems. However, some malware, such as Stuxnet that was the alleged creation of a state-level sponsored attack in 2010, has been used for cyber warfare. Particularly, malware taking aim at an opposing nation does not just serve for espionage, but actually shuts up and sabotages an enemy's critical infrastructure, the real-world examples of which are Saudi Aramco hacking in 2012 and Ukraine's power outage in 2015. Critical infrastructure of a nation, which is vital as it provides crucial services, requires a set of robust security measures in place, but is often left lacking security in terms of equipment deployed, workforce and expertise. To protect critical infrastructure from malicious actors during times of conflict, there must be manpower capable of monitoring, analyzing and responding to internal and external threats, with consistent security posture against ever-changing cyber threats. As a means of ensuring staying cyber-secure, the MITRE ATT&CK framework is a best-practice tool to understand techniques and trends used in previous cyberattacks. This paper takes a look into the framework, to investigate and categorize what tactics and techniques have been used by key types of malware amidst cyber warfare.
引用
收藏
页码:260 / 270
页数:11
相关论文
共 50 条
  • [1] Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
    Al-Sada, Bader
    Sadighian, Alireza
    Oligeri, Gabriele
    IEEE ACCESS, 2024, 12 : 1217 - 1234
  • [2] Automated Mapping of Common Vulnerabilities and Exposures to MITRE ATT&CK Tactics
    Branescu, Ioana
    Grigorescu, Octavian
    Dascalu, Mihai
    INFORMATION, 2024, 15 (04)
  • [3] Assessing Cyber Risks of an INS Using the MITRE ATT&CK Framework
    Oruc, Aybars
    Amro, Ahmed
    Gkioulos, Vasileios
    SENSORS, 2022, 22 (22)
  • [4] Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix
    Wenjun Xiong
    Emeline Legrand
    Oscar Åberg
    Robert Lagerström
    Software and Systems Modeling, 2022, 21 : 157 - 177
  • [5] A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK
    Zambianco, Marco
    Facchinetti, Claudio
    Siracusa, Domenico
    COMPUTERS & SECURITY, 2025, 148
  • [6] Cyber security threat modeling based on the MITRE Enterprise ATT&CK Matrix
    Xiong, Wenjun
    Legrand, Emeline
    Aberg, Oscar
    Lagerstrom, Robert
    SOFTWARE AND SYSTEMS MODELING, 2022, 21 (01): : 157 - 177
  • [7] Assessing MITRE ATT&CK Risk Using a Cyber-Security Culture Framework
    Georgiadou, Anna
    Mouzakitis, Spiros
    Askounis, Dimitris
    SENSORS, 2021, 21 (09)
  • [8] Introduction to MITRE ATT&CK: Concepts and Use Cases
    Son, Seok Bin
    Park, Soohyun
    Lee, Haemin
    Kim, Youngkee
    Kim, Dongwan
    Kim, Joongheon
    2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, : 158 - 161
  • [9] Linking CVE's to MITRE ATT&CK Techniques
    Kuppa, Aditya
    Aouad, Lamine
    Nhien-An Le-Khac
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [10] Exploring the MITRE ATT&CK® Matrix in SE Education
    Bleiman, Rachel
    Williams, Jamie
    Rege, Aunshul
    Williams, Katorah
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CYBERSECURITY, SITUATIONAL AWARENESS AND SOCIAL MEDIA, CYBER SCIENCE 2022, 2023, : 133 - 149