SamSam and Mitre ATT&CK

February 26, 2019

The Photon Research Team have used the MITRE ATT&CK™ framework to map the tactics, techniques, and procedures detailed in the indictment and provide key lessons for organizations to take away. Additional on the tooling used for the SamSam ransomware attacks are available in the Avoiding the Shakedown section of our “A Tale of Epic Extortions” research report.The Photon Research Team have used the MITRE ATT&CK™ framework to map the tactics, techniques, and procedures detailed in the indictment and provide key lessons for organizations to take away. Additional on the tooling used for the SamSam ransomware attacks are available in the Avoiding the Shakedown section of our “A Tale of Epic Extortions” research report

Previous Post
Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™
Purple Teaming with Vectr, Cobalt Strike, and MITRE ATT&CK™

Authors: Simon Hall, Isidoros Monogioudis   Here at Digital Shadows we perform regular purple team exercise...

Next Post
Understanding Threat Modelling
Understanding Threat Modelling

What is a threat model? Threat modelling, as defined by OWASP, “works to identify, communicate, and underst...