Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis

被引:1
|
作者
Park, Seongmin [1 ]
Lee, Myeongsu [2 ]
Na, Sarang [1 ]
Lim, Joonhyung [1 ]
机构
[1] Korea Internet & Secur Agcy, Naju Si, South Korea
[2] AhnLab, Seongnam Si, South Korea
来源
关键词
Destructive Malware; Cyber Warfare; MITRE ATT&CK; TTPs;
D O I
10.1007/978-981-97-4465-7_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most types of malware are spy-on that seek to collect and steal sensitive information by infecting target systems. However, some malware, such as Stuxnet that was the alleged creation of a state-level sponsored attack in 2010, has been used for cyber warfare. Particularly, malware taking aim at an opposing nation does not just serve for espionage, but actually shuts up and sabotages an enemy's critical infrastructure, the real-world examples of which are Saudi Aramco hacking in 2012 and Ukraine's power outage in 2015. Critical infrastructure of a nation, which is vital as it provides crucial services, requires a set of robust security measures in place, but is often left lacking security in terms of equipment deployed, workforce and expertise. To protect critical infrastructure from malicious actors during times of conflict, there must be manpower capable of monitoring, analyzing and responding to internal and external threats, with consistent security posture against ever-changing cyber threats. As a means of ensuring staying cyber-secure, the MITRE ATT&CK framework is a best-practice tool to understand techniques and trends used in previous cyberattacks. This paper takes a look into the framework, to investigate and categorize what tactics and techniques have been used by key types of malware amidst cyber warfare.
引用
收藏
页码:260 / 270
页数:11
相关论文
共 50 条
  • [21] Discovering attacker profiles using process mining and the MITRE ATT&CK taxonomy
    Rodriguez, Marcelo
    Betarte, Gustavo
    Calegari, Daniel
    PROCEEDINGS OF12TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE AND SECURE COMPUTING, LADC 2023, 2023, : 146 - 155
  • [22] Defender Policy Evaluation and Resource Allocation With MITRE ATT&CK Evaluations Data
    Outkin, Alexander V.
    Schulz, Patricia V.
    Schulz, Timothy
    Tarman, Thomas D.
    Pinar, Ali
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 1909 - 1926
  • [23] Evolution of IoT Linux Malware: A MITRE ATT&CK TTP Based Approach
    Chierzi, Veronica
    Merces, Fernando
    2021 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 2021,
  • [24] MITRE ATT&CK-driven Cyber Risk Assessment
    Ahmed, Mohamed G.
    Panda, Sakshyam
    Xenakis, Christos
    Panaousis, Emmanouil
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [25] Towards Mitigation of Data Exfiltration Techniques Using the MITRE ATT&CK Framework
    Mundt, Michael
    Baier, Harald
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2021, 2022, 441 : 139 - 158
  • [26] Industrial Cybersecurity Game-scenarios based on the MITRE ATT&CK framework
    Tharot, Kanthanet
    Quoc Bao Duong
    Riel, Andreas
    Thiriet, Jean-Marc
    2023 ASIA MEETING ON ENVIRONMENT AND ELECTRICAL ENGINEERING, EEE-AM, 2023,
  • [27] Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets
    Choi, Seungoh
    Yun, Jeong-Han
    Min, Byung-Gil
    PROCEEDINGS OF 14TH WORKSHOP ON CYBER SECURITY EXPERIMENTATION AND TEST (CSET 2021), 2021, : 41 - 48
  • [28] Improving ML-based Solutions for Linking of CVE to MITRE ATT&CK Techniques
    El Jaouhari, Saad
    Tamani, Nouredine
    Jacob, Rohan Isaac
    2024 IEEE 48TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC 2024, 2024, : 2442 - 2447
  • [29] BAN: Predicting APT Attack Based on Bayesian Network With MITRE ATT&CK Framework
    Kim, Youngjoon
    Lee, Insup
    Kwon, Hyuk
    Lee, Kyeongsik
    Yoon, Jiwon
    IEEE ACCESS, 2023, 11 : 91949 - 91968
  • [30] SOLVE-IT: A proposed digital forensic knowledge base inspired by MITRE ATT&CK
    Hargreaves, Christopher
    van Beek, Harm
    Casey, Eoghan
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2025, 52