{"id":19746,"date":"2022-06-10T17:40:17","date_gmt":"2022-06-10T13:40:17","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/mdr-report-contribution\/19746\/"},"modified":"2022-06-10T17:40:17","modified_gmt":"2022-06-10T13:40:17","slug":"mdr-report-contribution","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/mdr-report-contribution\/19746\/","title":{"rendered":"Most prevalent adversarial techniques applied in 2021 incidents"},"content":{"rendered":"<p>The Kaspersky Managed Detection and Response (MDR) service allows companies to strengthen their security teams by externally monitoring corporate infrastructure around the clock. According to a recently published <a href=\"https:\/\/securelist.com\/managed-detection-and-response-in-2021\/106540\/\" target=\"_blank\" rel=\"noopener\">MDR analyst report<\/a>, in 2021 the service processed about 414,000 security alerts, resulting in 8479 incidents reported to customers. While analyzing those incidents, our SOC experts identified the most common attack techniques under the MITRE ATT&amp;CK classification; they calculated the ratio of incidents based on those techniques to the total number of incidents and named the three most popular.<\/p>\n<h2>User Execution<\/h2>\n<p>This category includes all incidents in which the attacker relies on the actions of a user inside the infrastructure. That is, these are the cases when attackers force an employee to click on a malicious link or open an e-mail attachment. This group also includes incidents in which a deceived user gives an attacker remote access to corporate resources.<\/p>\n<h2>Spearphishing Attachment<\/h2>\n<p>According to the MITRE ATT&amp;CK classification, the Spearphishing Attachment tactic involves sending e-mails with a malicious file attached. Most commonly, attackers also rely on social engineering and user execution to carry such out an attack. Typical payload includes executable files, MS Office documents, PDFs and archive files.<\/p>\n<h2>Exploitation of Remote Services<\/h2>\n<p>The Exploitation of Remote Services category includes incidents in which attackers use vulnerable services to access internal systems within a corporate network. Typically, this is used for lateral movement within the infrastructure. Attackers often target servers, but sometimes they also exploit vulnerabilities on other endpoints, including workstations.<\/p>\n<h2>How to protect your infrastructure from the most common techniques of the attackers<\/h2>\n<p>The <a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noopener nofollow\">MITRE ATT&amp;CK website<\/a> lists the most effective methods that can be used to mitigate each adversarial technique.<\/p>\n<ul>\n<li>To automatically prevent the unwitting participation of an employee in attack on your company\u2019s infrastructure, it\u2019s recommended to use <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">security solutions<\/a> with application control capabilities, which can also block network attacks, check the reputation of websites, and scan downloaded files. It\u2019s also useful to raise employees\u2019 <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">security awareness<\/a>, explaining to them modern adversarial tactics and techniques.<\/li>\n<li>The same protection mechanisms are effective against malicious attachments in targeted e-mails. As an additional level of protection for your corporate e-mail system, it\u2019s also recommended to use <a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-cure-dmarc\/36787\/\" target=\"_blank\" rel=\"noopener nofollow\">SPF, DKIM and DMARC technologies<\/a>.<\/li>\n<li>Application isolation technologies work well against Exploitation of Remote Services. However, there are certain steps that should be even higher on your priority list: it\u2019s recommended to remove or disable all unused remote services, segment networks and systems, and minimize the level of access and permissions of service accounts. It\u2019s also necessary to timely install security updates for critical systems, and use security solutions with behavioral detection capabilities. Additionally, it doesn\u2019t hurt to periodically scan the network for potentially vulnerable services and use up-to-date <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/threat-intelligence?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Threat Intelligence data<\/a>.<\/li>\n<\/ul>\n<p>In general, to protect your corporate infrastructure from complex attacks, you should rely on the <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/managed-detection-and-response?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">help of external experts<\/a>, who can protect your infrastructure, investigate security alerts, and notify you about dangerous activity and provide response actions and recommendations.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"mdr\">\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Managed Detection and Response experts identified the adversarial techniques that were most prevalent cybersecurity incidents in 2021.<\/p>\n","protected":false},"author":2581,"featured_media":19747,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916],"tags":[2373,2295,2291],"class_list":{"0":"post-19746","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"tag-incidents","10":"tag-mdr","11":"tag-reports"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/mdr-report-contribution\/19746\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/mdr-report-contribution\/24263\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/mdr-report-contribution\/26599\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/mdr-report-contribution\/24556\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/mdr-report-contribution\/24920\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/mdr-report-contribution\/27271\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mdr-report-contribution\/33328\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/mdr-report-contribution\/10773\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mdr-report-contribution\/44584\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/mdr-report-contribution\/19027\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/mdr-report-contribution\/19588\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/mdr-report-contribution\/28904\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/mdr-report-contribution\/25110\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mdr-report-contribution\/30625\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mdr-report-contribution\/30374\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/mdr\/","name":"MDR"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2581"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=19746"}],"version-history":[{"count":0,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/19746\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/19747"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=19746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=19746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=19746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}