Tactics, Techniques and Procedures Used to Target Australian Networks. By the ACSC.

Tactics, Techniques and Procedures Used to Target Australian Networks. By the ACSC.

//www.cyber.gov.au/sites/default/files/2020-05/Summary%20of%20Tradecraft%20Trends%20for%202019-20%20%E2%80%93%20Tactics%2C%20Techniques%20and%20Procedures%20Used%20to%20Target%20Australian%20Networks%20%28May%202020%29.pdf

Overview
The Australian Cyber Security Centre (ACSC) investigated and responded to numerous cyber security incidents during 2019 and 2020 so far. This advisory provides a summary of notable tactics, techniques and procedures (TTPs) exploited by Advanced Persistent Threats (APT) and cybercriminals identified during the ACSC’s investigations. These TTPs are summarised practically in the framework of tactics and techniques provided by MITRE ATT&CK1 . This technical guidance is provided for IT security professionals at public and private sector organisations.

Recommended mitigations
Partners are strongly encouraged to review their environments for the presence of the exploited vulnerabilities and provided TTPs. Detection of related findings should be reported to the ACSC.
The ACSC strongly recommends implementing ASD’s Essential Eight. A review of investigations performed by the ACSC has shown that implementation of ASD’s Essential Eight on victim networks would substantially reduce the risk of compromise by the adversary TTPs identified in this advisory.