{"id":4824,"date":"2026-04-15T11:18:08","date_gmt":"2026-04-15T09:18:08","guid":{"rendered":"https:\/\/cybernemo.eu\/?p=4824"},"modified":"2026-03-31T11:22:14","modified_gmt":"2026-03-31T09:22:14","slug":"the-mitre-attck-framework-for-attacks","status":"publish","type":"post","link":"https:\/\/cybernemo.eu\/index.php\/2026\/04\/15\/the-mitre-attck-framework-for-attacks\/","title":{"rendered":"The MITRE ATT&amp;CK framework for attacks"},"content":{"rendered":"\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Understanding the MITRE ATT&amp;CK Framework<\/strong><\/p>\n\n\n\n<p>In the world of cybersecurity, defenders and hackers are locked in a constant game of cat and mouse. For a long time, defenders focused on who was attacking them (attribution). However, names and locations change. The MITRE ATT&amp;CK\u00ae framework shifted the focus to something more permanent: how they attack. ATT&amp;CK stands for Adversarial Tactics, Techniques, and Common Knowledge. Think of it as a comprehensive, living encyclopedia of &#8220;bad guy&#8221; behavior. It is a globally accessible knowledge base that tracks the specific actions cybercriminals take from the moment they start scouting a target to the moment they steal data or cause damage.<\/p>\n\n\n\n<p><strong>The Anatomy of an Attack<\/strong><\/p>\n\n\n\n<p>The framework is organized into a matrix that reads like a story of a digital break-in. It breaks down an attack into two main components: (a) Tactics (The &#8220;Why&#8221;): These are the attacker\u2019s technical goals. For example, a tactic might be &#8220;Initial Access&#8221; (getting into the network) or &#8220;Exfiltration&#8221; (taking the data out). (b) Techniques (The &#8220;How&#8221;): these are the specific methods used to achieve a tactic. If the goal is &#8220;Initial Access,&#8221; the technique might be a &#8220;Phishing&#8221; email. By using this common language, security teams across different companies can share information instantly. If a bank in London discovers a new way hackers are bypassing passwords, they can label it with an ATT&amp;CK ID (like T1078), and a hospital in New York will immediately know exactly what to look for.<\/p>\n\n\n\n<p><strong>Mitigations: Building the Shield<\/strong><\/p>\n\n\n\n<p>The framework isn&#8217;t just a list of threats; it\u2019s a roadmap for defense. For every technique listed in the matrix, MITRE provides mitigations, i.e., specific actions organizations can take to prevent a technique from working.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Tactic<\/strong><\/td><td><strong>Technique (Example)<\/strong><\/td><td><strong>Mitigation (Defense action)<\/strong><\/td><\/tr><tr><td>Initial Access<\/td><td>Phishing<\/td><td>Security awareness training and email filtering.<\/td><\/tr><tr><td>Persistence<\/td><td>Create Account<\/td><td>Use Multi-Factor Authentication (MFA) and monitor new user creation.<\/td><\/tr><tr><td>Exfiltration<\/td><td>Transfer Data to Cloud<\/td><td>Block unauthorized cloud storage sites on the company network.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"846\" src=\"https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Mitre-Framework-1024x846.jpg\" alt=\"\" class=\"wp-image-4825\" style=\"width:438px;height:auto\" srcset=\"https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Mitre-Framework-1024x846.jpg 1024w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Mitre-Framework-300x248.jpg 300w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Mitre-Framework-768x634.jpg 768w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Mitre-Framework-600x495.jpg 600w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Mitre-Framework.jpg 1240w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<div style=\"height:12px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Why It Matters<\/strong><\/p>\n\n\n\n<p>While ATT&amp;CK is a technical tool, its impact reaches everyone. When organizations use this framework, they move away from &#8220;guessing&#8221; what might happen and start &#8220;knowing&#8221; what to defend against. It allows companies to test their security systems against real-world scenarios, ensuring that your personal data and the services you rely on\u2014like banking, healthcare, and power\u2014are protected by more than just a firewall and a prayer. MITRE ATT&amp;CK is a resource that has turned cybersecurity from a dark art into a measurable science by documenting the &#8220;playbook&#8221; of the adversary.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"816\" height=\"1024\" src=\"https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Your-101-guide-to-MITRE-ATTCK-Enterprise-Matrix-.jpg\" alt=\"\" class=\"wp-image-4826\" style=\"width:353px;height:auto\" srcset=\"https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Your-101-guide-to-MITRE-ATTCK-Enterprise-Matrix-.jpg 816w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Your-101-guide-to-MITRE-ATTCK-Enterprise-Matrix--239x300.jpg 239w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Your-101-guide-to-MITRE-ATTCK-Enterprise-Matrix--768x964.jpg 768w, https:\/\/cybernemo.eu\/wp-content\/uploads\/2026\/03\/Your-101-guide-to-MITRE-ATTCK-Enterprise-Matrix--600x753.jpg 600w\" sizes=\"(max-width: 816px) 100vw, 816px\" \/><\/figure><\/div>\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Understanding the MITRE ATT&amp;CK Framework In the world of cybersecurity, defenders and hackers are locked in a constant game of cat and mouse. For a long time, defenders focused on who was attacking them (attribution). However, names and locations change. &hellip;<\/p>\n","protected":false},"author":4,"featured_media":4826,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"_mi_skip_tracking":false,"footnotes":""},"categories":[17],"tags":[],"cc_featured_image_caption":{"caption_text":"","source_text":"","source_url":""},"_links":{"self":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4824"}],"collection":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/comments?post=4824"}],"version-history":[{"count":1,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4824\/revisions"}],"predecessor-version":[{"id":4827,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/posts\/4824\/revisions\/4827"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/media\/4826"}],"wp:attachment":[{"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/media?parent=4824"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/categories?post=4824"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybernemo.eu\/index.php\/wp-json\/wp\/v2\/tags?post=4824"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}