SamSam and Mitre ATT&CK

February 26, 2019

The Photon Research Team have used the MITRE ATT&CK™ framework to map the tactics, techniques, and procedures detailed in the indictment and provide key lessons for organizations to take away. Additional on the tooling used for the SamSam ransomware attacks are available in the Avoiding the Shakedown section of our “A Tale of Epic Extortions” research report.The Photon Research Team have used the MITRE ATT&CK™ framework to map the tactics, techniques, and procedures detailed in the indictment and provide key lessons for organizations to take away. Additional on the tooling used for the SamSam ransomware attacks are available in the Avoiding the Shakedown section of our “A Tale of Epic Extortions” research report

Previous Post
Blog | The Intelligence Cycle – What Is It Good For?
Blog | The Intelligence Cycle – What Is It Good For?

A walk through the five steps of the intelligence cycle according to Digital Shadows.

Next Post
Understanding Threat Modelling
Understanding Threat Modelling

What is a threat model? Threat modelling, as defined by OWASP, “works to identify, communicate, and underst...