[<prev] [next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.21.1905020557380.1819@ip-172-30-0-239.ec2.internal>
Date: Thu, 2 May 2019 05:57:49 +0000 (UTC)
From: InfoSec News <alerts@...osecnews.org>
To: isn@...ts.infosecnews.org
Subject: [Newsletter/Marketing] [ISN] MITRE asks vendors to do more to
detect stealthy hacks
https://www.cyberscoop.com/mitre-asks-vendors-detect-stealthy-hacks/
By Sean Lyngaas
CYBERSCOOP
MAY 1, 2019
As hackers continue to use native programming tools to blend into target
networks, Mitre Corp. is beginning to test vendors’ ability to detect those
techniques.
The federally-funded, not-for-profit organization announced Wednesday it would
throw the stealthy tactics of an infamous hacking group, the
Russian-government-linked APT29, at several threat-detection products.
But the evaluation is about more than one set of adversaries. The “living off
the land” techniques, such as hiding in PowerShell scripts, that will be tested
are increasingly popular with a variety of hacking groups.
“A lot of these techniques are going to be implemented in similar ways from
different adversaries,” said Frank Duff, Mitre’s lead for evaluations that use
the organization’s ATT&CK framework.
[...]
--
Subscribe to InfoSec News
https://www.infosecnews.org/subscribe-to-infosec-news/
https://twitter.com/infosecnews_
Powered by blists - more mailing lists