SamSam and Mitre ATT&CK

The Photon Research Team have used the MITRE ATT&CK™ framework to map the tactics, techniques, and procedures detailed in the indictment and provide key lessons for organizations to take away. Additional on the tooling used for the SamSam ransomware attacks are available in the Avoiding the Shakedown section of our “A Tale of Epic Extortions” research report.The Photon Research Team have used the MITRE ATT&CK™ framework to map the tactics, techniques, and procedures detailed in the indictment and provide key lessons for organizations to take away. Additional on the tooling used for the SamSam ransomware attacks are available in the Avoiding the Shakedown section of our “A Tale of Epic Extortions” research report

Previous Report
NIST Cybersecurity Framework - Mapping Digital Shadows
NIST Cybersecurity Framework - Mapping Digital Shadows

CISO Rick Holland shares how we have mapped SearchLight to the NIST Cybersecurity Framework.

Next Report
Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework
Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and na...

Your Practical Guide to Reducing Digital Risk

Get Your Copy!