Destructive Malwares on MITRE ATT&CK Tactics for Cyber Warfare: A Brief Survey and Analysis

被引:1
|
作者
Park, Seongmin [1 ]
Lee, Myeongsu [2 ]
Na, Sarang [1 ]
Lim, Joonhyung [1 ]
机构
[1] Korea Internet & Secur Agcy, Naju Si, South Korea
[2] AhnLab, Seongnam Si, South Korea
来源
关键词
Destructive Malware; Cyber Warfare; MITRE ATT&CK; TTPs;
D O I
10.1007/978-981-97-4465-7_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most types of malware are spy-on that seek to collect and steal sensitive information by infecting target systems. However, some malware, such as Stuxnet that was the alleged creation of a state-level sponsored attack in 2010, has been used for cyber warfare. Particularly, malware taking aim at an opposing nation does not just serve for espionage, but actually shuts up and sabotages an enemy's critical infrastructure, the real-world examples of which are Saudi Aramco hacking in 2012 and Ukraine's power outage in 2015. Critical infrastructure of a nation, which is vital as it provides crucial services, requires a set of robust security measures in place, but is often left lacking security in terms of equipment deployed, workforce and expertise. To protect critical infrastructure from malicious actors during times of conflict, there must be manpower capable of monitoring, analyzing and responding to internal and external threats, with consistent security posture against ever-changing cyber threats. As a means of ensuring staying cyber-secure, the MITRE ATT&CK framework is a best-practice tool to understand techniques and trends used in previous cyberattacks. This paper takes a look into the framework, to investigate and categorize what tactics and techniques have been used by key types of malware amidst cyber warfare.
引用
收藏
页码:260 / 270
页数:11
相关论文
共 50 条
  • [41] Mapping the Security Events to the MITRE ATT&CK Attack Patterns to Forecast Attack Propagation (Extended Abstract)
    Kryukov, Roman
    Zima, Vladimir
    Fedorchenko, Elena
    Novikova, Evgenia
    Kotenko, Igor
    ATTACKS AND DEFENSES FOR THE INTERNET OF THINGS, ADIOT, 2022, 13745 : 165 - 176
  • [42] An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix
    Zhang, Shuqin
    Chen, Peng
    Bai, Guangyao
    Wang, Shijie
    Zhang, Minzhi
    Li, Shuhan
    Zhao, Chunxia
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [43] MITRE ATT&CK Based Evaluation on In-Network Deception Technology for Modernized Electrical Substation Systems
    Mashima, Daisuke
    SUSTAINABILITY, 2022, 14 (03)
  • [44] Threat modeling in smart firefighting systems: Aligning MITRE ATT&CK matrix and NIST security controls
    Zahid, Shahzaib
    Mazhar, Muhammad Shoaib
    Abbas, Syed Ghazanfar
    Hanif, Zahid
    Hina, Sadaf
    Shah, Ghalib A.
    INTERNET OF THINGS, 2023, 22
  • [45] Camp2Vec: Embedding cyber campaign with ATT&CK framework for attack group analysis
    Lee, Insup
    Choi, Changhee
    ICT EXPRESS, 2023, 9 (06): : 1065 - 1070
  • [46] Detecting Reconnaissance and Discovery Tactics from the MITRE ATT&CK Framework in Zeek Conn Logs Using Spark's Machine Learning in the Big Data Framework
    Bagui, Sikha
    Mink, Dustin
    Bagui, Subhash
    Ghosh, Tirthankar
    McElroy, Tom
    Paredes, Esteban
    Khasnavis, Nithisha
    Plenkers, Russell
    SENSORS, 2022, 22 (20)
  • [47] A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection
    Munoz-Calle, Javier
    Alonso, Rafael Estepa
    Alonso, Antonio Estepa
    Diaz-Verdejo, Jesus E.
    Fernandez, Elvira Castillo
    Madinabeitia, German
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2024, 30 (09) : 1184 - 1204
  • [48] Introducing UWF-ZeekData22: A Comprehensive Network Traffic Dataset Based on the MITRE ATT&CK Framework
    Bagui, Sikha S.
    Mink, Dustin
    Bagui, Subhash C.
    Ghosh, Tirthankar
    Plenkers, Russel
    McElroy, Tom
    Dulaney, Stephan
    Shabanali, Sajida
    DATA, 2023, 8 (01)
  • [49] Evaluation of matrix MITRE ATT&CK applicability for simulation of threats to information security of ICS of pipeline transportation facilities
    Kuzmin, Vyacheslav V.
    Kobzev, Dmitry A.
    Knysh, Alexander, V
    Davidenko, Oksana N.
    NAUKA I TEHNOLOGII TRUBOPROVODNOGO TRANSPORTA NEFTI I NEFTEPRODUKTOV-SCIENCE & TECHNOLOGIES-OIL AND OIL PRODUCTS PIPELINE TRANSPORTATION, 2022, 12 (02): : 189 - 197
  • [50] Exploiting TTP Co-Occurrence via GloVe-Based Embedding With MITRE ATT&CK Framework
    Shin, Chanho
    Lee, Insup
    Choi, Changhee
    IEEE ACCESS, 2023, 11 : 100823 - 100831