By Brent Zelinski, Standards Senior Manager, HITRUST
Trending highlights
New technique in MITRE ATT&CK
After analyzing second-quarter cyber threat data, we’ve put our i1 assessment controls to the test. Our i1 controls are selected to ensure coverage against tried and true and emerging cyber threats alike. The Q2 threat data and corresponding analysis confirm the relevance of previously trending threats, as well as highlighting the continuing need for baseline security controls.
Based on the top techniques and associated mitigations identified and addressed in the most recent version of the MITRE ATT&CK Framework (v15.1), the control requirements in the i1 assessment continue to address the top 20 cyber threats by volume identified during the second quarter of 2024 and address all techniques with associated MITRE mitigations including 99% of all cyber threats seen.
HITRUST noted the following MITRE ATT&CK techniques shown below had the largest increase in occurrence during Q2 2024, compared to the same data from Q1 2024.
T1586 |
T1053 |
T1070 |
T1110 |
T1046 |
T1528 |
T1553 |
Compromise Accounts |
Scheduled Task/Job |
Indicator Removal |
Brute Force |
Network Service Discovery |
Steal Application Access Token |
Subvert Trust Controls |
For each of the threat techniques identified above, HITRUST explored in depth the existing i1 assessment control set and found that the requirement statements currently included provided significant coverage against each of these techniques.
The T1586 attack technique was the top growing threat technique in Q2 of 2024.
For the T1586: Compromise Accounts attack technique, MITRE associates a mitigation named Pre-compromise (M1056). The description of this mitigation states that “[t]his technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. Efforts should focus on minimizing the amount and sensitivity of data available to external parties.” [emphasis added by HITRUST]
The following HITRUST CSF requirements contained in the i1 provide coverage for this technique.
The expansive attack technique of compromising accounts will always be a popular primary step to gain a foothold in an environment. As MITRE suggests, it is nearly impossible to completely eradicate the possibility of compromised social media, email, cloud, or other account types. The above requirement statements from the HITRUST CSF framework provide sensible preventive controls to reduce attack surfaces and reduce the organization’s exposure to a potential cybersecurity incident.
The T1070 attack technique showed significant growth in Q2 of 2024.
For the T1070: Indicator Removal attack technique, the existing coverage is currently addressed in the i1 through four HITRUST CSF requirements.
When an adversary executes action against a target, it is common practice to attempt to cover their trails and remove indications of their presence. Without adequate coverage to prevent and/or detect such actions, compromised targets can remain in an environment without detection and can continue to be used by attackers.
In addition to detecting ongoing and emerging trends of attacker techniques, it is also good practice to study new technique methods. In MITRE’s latest version release ATT&CK v15.1, the technique to Hide Infrastructure was added to the robust list of Enterprise Techniques. While similar methods such as the aforementioned T1070: Indicator Removal already existed for individual actions, T1665 expands on this line of malicious thinking. When utilizing this technique, adversaries manipulate network traffic in order to hide and evade detection of their command and control (C2) infrastructure. C2 infrastructure is a set of tools and protocols an attacker uses to maintain communication and manage their compromised machines. Since this infrastructure must live on the machine, common attempts to hide can include setting hostnames and domains to match the names of legitimate hostnames and/or services in the environment and using IP addresses within the victim’s correct address range as proxies or VPN to hide the true source of the attack.
While we have not yet seen significant activity with this technique since its introduction to the ATT&CK framework, it is important to stay informed and up-to-date with detection methods. This technique is also of note as it cannot easily be mitigated with mitigating controls due to its simple nature of abusing legitimate system features.
For a full breakdown of the new technique, refer to MITRE: T665: Hide Infrastructure.
As we continue to gather emerging cyber threat data and learn from real-world attack techniques, we will continue to update the HITRUST CSF framework and the preset controls in the i1 assessment. By committing to a dynamic and threat-adaptive control library, we can remain vigilant in a constantly evolving realm of cyber threats. This unique functionality sets the HITRUST i1 apart from other assessments.