Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Threat Intelligence

10/27/2020
02:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail vvv
50%
50%

MITRE Shield Matrix Highlights Deception & Concealment Technology

The role that these technologies play in the MITRE Shield matrix is a clear indicator that they are an essential part of today's security landscape.

It's an age-old question: How do you know if you need more security? MITRE has been diligently working to document tactics and techniques to assess security readiness and answer this very challenging question. In late August, MITRE, a nonprofit organization, released a new knowledge matrix, called MITRE Shield, to complement the ATT&CK matrix.

Related Content:

Simplifying Defense Across the MITRE ATT&CK Matrix

2020 State of Cybersecurity Operations and Incident Response

New on The Edge: Emotet 101: How the Ransomware Works -- and Why It's So Darn Effective

The organization called it "an active defense knowledge base MITRE is developing to capture and organize what we are learning about active defense and adversary engagement." With its focus on active defense measures, MITRE designed Shield to help defenders understand their cybersecurity options and take proactive steps to defend their assets. Among the most common active defense techniques are cyber-deception and concealment technologies, which are featured heavily in the new Shield matrix.

What Is MITRE Shield, Exactly?
At its core, MITRE Shield is a freely available knowledge base containing information on common techniques and tactics that helps defenders better understand the adversaries they face to protect their networks. More specifically, it is a guide to creating an Active Defense based on adversary engagement and lessons about:

  • How adversaries attack us
  • What tools they use
  • What they do after they establish a beachhead
  • What they are ultimately seeking

Like the organization's well-known ATT&CK matrix, Shield is presented in a tabular format, featuring eight tactics and a wide range of techniques mapped onto more specific use cases. The matrix helps counter known attack patterns and help defenders learn about the adversaries targeting them to better prepare for attacks in the future. In total, Shield covers 33 techniques and 190 use cases informed by over 10 years of MITRE's work defending its network from adversaries.

Rather than simply detecting and removing attackers from the network, Shield focuses on active defense. The matrix points out that there is much to learn from attackers, and that actively engaging them within the network can create valuable learning opportunities. Since deception technology is an active defense technology known for its efficacy in engaging attackers and generating adversary intelligence for defenders, Shield spends a considerable amount of time and effort on deception tactics and principles.

Aligning Deception and Concealment Technology with Shield
Deception and concealment technologies distinguish themselves from other active defense measures in that they go beyond using decoy techniques to achieve attack prevention and detection. Deception proactively diverts attackers away from their targets using lures and other false information, guiding them toward decoys and ultimately into a deception environment that can safely isolate them and gather adversary intelligence. Concealment, on the other hand, performs the complementary task of hiding real objects so that an attacker cannot even see the data, much less delete, alter, or tamper with it. 

These align well with the specific tactics outlined within the MITRE Shield matrix. Shield breaks these tactics into eight buckets: Channel, Collect, Contain, Detect, Disrupt, Facilitate, Legitimize, and Test, and within each of those categories, there are specific ways one can utilize deception technology:

  • Channel: Deception can channel adversaries away from important systems and toward decoy systems, wasting the adversary's time and resources, derailing the attack and raising its cost.

  • Collect: Defenders can use deceptive techniques to study the attacker in action, gathering intelligence on their behaviors and tactics.

  • Contain: When engaging with a deception environment, attacker activities remain contained within the specific bounds of the environment and away from production assets.

  • Detect: Unlike perimeter defenses, deception technology detects intruders inside the network, capturing adversary tactics, techniques, and procedures (TTPs) both on the endpoint and the decoy.

  • Disrupt: Feeding deceptive content to attackers will disrupt their ability to accomplish their goals, whatever they may be.

  • Facilitate: Deception helps facilitate the attack along certain lines, leading the attackers to believe that they have accomplished a part of their mission by creating a "vulnerable" decoy system for the attacker to target.

  • Legitimize: Deception makes attackers believe that the decoys, lures, and misdirections are real. Adding authenticity to deceptive components is an essential element of being attractive targets.

  • Test: Engaging with attackers means testing them to determine their interests, capabilities, and behaviors to stop current and future attacks.

Of the 33 defense techniques covered within these eight tactics categories, deception and concealment technology can implement 27 of them, while deception alone covers around 10. This difference underscores the importance of concealment technology — of not just deceiving intruders but denying them access to the data and assets they seek. Terms like decoy networks, decoy personas, decoy systems, decoy accounts, decoy credentials, and others feature prominently throughout the MITRE Shield matrix, again highlighting the vital role that deception and concealment technologies play in identifying and stopping today's cybercriminals.

The matrix highlights several specific use cases for the technology, noting that by creating a decoy account, defenders can entice adversaries to interact with that account in a way that reveals information about their tactics, goals, and even the tools they are using. Likewise, seeding a potentially high-value target system with decoy credentials such as fake usernames, passwords, and tokens, can enable defenders essentially to lie in wait for attackers. They stand ready to receive an alert when an intruder attempts to access a specific resource or use a set of dummy credentials. By laying decoys throughout the network, defenders can actively engage with attackers in new and significant ways.

Deception and Concealment Are No Longer "Nice to Haves" — They're Essential
The prominent role that deception and concealment technologies play in the MITRE Shield matrix is the clearest indicator yet that these technologies are an essential part of today's security landscape. Defenders seeking to bolster their in-network protections and improve their ability to gather valuable adversary intelligence should examine how their current approach to security aligns or does not align with the Shield matrix. While the value of deception and concealment is well known to security professionals, MITRE's decision to highlight so many specific techniques and use cases for the technology underscores the central role it plays in today's security world and the added value it can provide to any comprehensive security stack.

Carolyn Crandall is the Chief Deception Officer and CMO at Attivo Networks, the leader in deception for cybersecurity threat detection. She is a high-impact technology executive with over 30 years of experience in building new markets and successful enterprise infrastructure ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
screwbird
50%
50%
screwbird,
User Rank: Strategist
11/6/2020 | 7:51:06 AM
How many tools in the shed?
Another framework. Another effort, in its essence, aimed at manipulating the infosphere? What's the end state? Another AI environment?

Has to be managed. Has to be tracked. As it scales it becomes its own dedicated time management problem. Like just about 90% of CND/Cyber Defense certainly great for jobs!

As we slip into Active Dense - an old concept - where is the golden grail of attribution?

Will it lead to self-DOS opportunities of a more sophisticated stripe?  

 

 

 

 
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-23727
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in the Antiy Zhijia Terminal Defense System 5.0.2.10121559 and an attacker can cause a computer crash (BSOD).
CVE-2020-28175
PUBLISHED: 2020-12-03
There is a local privilege escalation vulnerability in Alfredo Milani Comparetti SpeedFan 4.52. Attackers can use constructed programs to increase user privileges
CVE-2020-13524
PUBLISHED: 2020-12-03
An out-of-bounds memory corruption vulnerability exists in the way Pixar OpenUSD 20.05 uses SPECS data from binary USD files. A specially crafted malformed file can trigger an out-of-bounds memory access and modification which results in memory corruption. To trigger this vulnerability, the victim n...
CVE-2020-13525
PUBLISHED: 2020-12-03
The sort parameter in the download page /sysworkflow/en/neoclassic/reportTables/reportTables_Ajax is vulnerable to SQL injection in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2020-23726
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in Wise Care 365 5.5.4, attackers can cause computer crash (BSOD).