MITRE ATT&CK Framework and Attack Stages
12 Questions
9 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the initial entry point for attackers in the described scenario?

  • Privilege escalation after stealing sensitive assets
  • Exploiting vulnerabilities in VPNs (correct)
  • Delivering malware through malicious email attachments
  • Using malvertising to steal credentials
  • Which Zscaler product can help prevent initial compromise by establishing a foothold through phishing?

  • ZIA capabilities (correct)
  • Cloud DLP
  • Deception capabilities
  • Cloud CASB
  • What technique might attackers use to deliver malware in the initial compromise stage?

  • Malvertising
  • Phishing with malicious email links (correct)
  • Using deceptive emails
  • Exploiting vulnerabilities in firewalls
  • What follows privilege escalation in the attack progression described?

    <p>Lateral movement</p> Signup and view all the answers

    Which Zscaler capability helps in stopping data loss in the described scenario?

    <p>Cloud DLP</p> Signup and view all the answers

    What is the last stage in the ransomware attack progression described?

    <p>Demanding payment after installing ransomware</p> Signup and view all the answers

    What are the four high-level stages of an attack described in the text?

    <p>Reconnaissance, Initial Access, Lateral Movement, Data Exfiltration</p> Signup and view all the answers

    What is the purpose of the initial compromise stage in an attack?

    <p>To gain an initial foothold on the target system</p> Signup and view all the answers

    What is the goal of the lateral movement stage in an attack?

    <p>To identify and compromise additional systems within the target network</p> Signup and view all the answers

    What technique do attackers use to find sensitive assets if the target network is not segmented?

    <p>Living off the land</p> Signup and view all the answers

    What is the purpose of the data exfiltration stage in an attack?

    <p>To steal sensitive data from the target system</p> Signup and view all the answers

    What types of attacks can be mapped to the simplified framework described?

    <p>Any attack, including advanced supply chain attacks and ransomware</p> Signup and view all the answers

    Study Notes

    Stages of an Attack

    • Attackers look for exposed endpoints in the attack surface, which can be public servers, VPN users, etc.
    • The attackers execute their initial compromise using techniques like phishing, spear phishing, or malicious files.
    • Once they gain access to a target system, they aim to identify critical and sensitive data and assets.

    Lateral Movement

    • Attackers move laterally to identify sensitive assets by using techniques like "living off the land" or exploiting unsegmented networks or exposed applications.
    • They can use techniques like malvertising or keylogging to steal credentials and figure out what and where other sensitive assets are.

    Data Theft and Ransomware

    • Attackers steal data and may use it in a "double extortion" attack, where they encrypt the data in addition to exfiltrating it, giving them extra leverage.
    • In the case of ransomware, attackers may demand payment after installing the ransomware and stealing data.

    Zscaler Products Against Attacks

    • Zscaler products can stop attacks at different stages, including:
      • ZPA (Zscaler Private Access) for attack surface and lateral movement.
      • ZIA (Zscaler Internet Access) for initial compromise, with capabilities like secure web gateway, IPS, Cloud Sandbox, and Cloud Browser Isolation.
      • Data protection capabilities like cloud DLP, cloud CASB, and Workload protection for stopping data loss.
      • Deception capabilities to eliminate lateral movement.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Learn about the four high-level stages of an attack according to the MITRE ATT&CK framework. Understand how attackers identify the attack surface, execute their initial compromise, escalate privileges, and achieve their objectives.

    More Like This

    MITRE ATT&amp;CK Framework
    3 questions

    MITRE ATT&amp;CK Framework

    PoliteSplendor9142 avatar
    PoliteSplendor9142
    Understanding MITRE ATT&CK
    1 questions
    Bartolomé Mitre and Domingo Sarmiento
    37 questions
    Use Quizgecko on...
    Browser
    Browser