Python & MITRE ATT&CK: Part 5/15

Python & MITRE ATT&CK: Part 5/15
In the Persistence stage of the MITRE ATT&CK framework, attackers establish footholds within systems to maintain access. They may create scheduled tasks that run malicious scripts and add new accounts to preserve their entry even if passwords change. The article discusses the procedures for identifying these actions through log file analysis and the technical implementations involved. Affected: systems, organizations, cybersecurity sector

Keypoints :

  • The Persistence stage involves maintaining access to a compromised system.
  • Log analysis is crucial to understand the actions taken by attackers.
  • Creating scheduled tasks can automate running malicious files periodically.
  • Adding new user accounts with administrative rights is a common persistence tactic.
  • Example: APT41 is an APT group that has used these techniques in various industries.
  • Organizations should enforce the Principle of Least Privilege to mitigate risks.
  • Auditing tasks may help identify weaknesses and unauthorized activities.

Full Story: https://medium.com/@tentotheminus9/python-mitre-att-ck-part-5-15-66e639a31885?source=rss——cybersecurity-5

Views: 2