Tactics, Techniques and Procedures Used to Target Australian Networks. By the ACSC.

https://www.cyber.gov.au/sites/default/files/2020-05/Summary%20of%20Tradecraft%20Trends%20for%202019-20%20%E2%80%93%20Tactics%2C%20Techniques%20and%20Procedures%20Used%20to%20Target%20Australian%20Networks%20%28May%202020%29.pdf

Overview
The Australian Cyber Security Centre (ACSC) investigated and responded to numerous cyber security incidents during 2019 and 2020 so far. This advisory provides a summary of notable tactics, techniques and procedures (TTPs) exploited by Advanced Persistent Threats (APT) and cybercriminals identified during the ACSC’s investigations. These TTPs are summarised practically in the framework of tactics and techniques provided by MITRE ATT&CK1 . This technical guidance is provided for IT security professionals at public and private sector organisations.


Recommended mitigations
Partners are strongly encouraged to review their environments for the presence of the exploited vulnerabilities and provided TTPs. Detection of related findings should be reported to the ACSC.
The ACSC strongly recommends implementing ASD’s Essential Eight. A review of investigations performed by the ACSC has shown that implementation of ASD’s Essential Eight on victim networks would substantially reduce the risk of compromise by the adversary TTPs identified in this advisory.

Contact us

Partner with Us for Comprehensive IT

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.

Your benefits:
What happens next?
1

We Schedule a call at your convenience 

2

We do a discovery and consulting meting 

3

We prepare a proposal 

Schedule a Consultation