ATT&CK Evaluations Library: Adversary Emulation for Cyber Threat Defense
The ATT&CK Evaluations Library provides adversary emulation plans used in ATT&CK Evaluations, replicating real-world breaches by specific threat actors. These plans outline cyber threat intelligence, detailing an adversary's targets, methods, and objectives. Each plan follows an operational flow illustrating how adversaries achieve their goals within victim environments. Execution content is available in both human and machine-readable formats, supporting manual execution or automation with tools like CALDERA. The library includes emulation plans for groups such as ALPHV BlackCat, APT29, Carbanak, CL0P, DPRK, FIN7, LockBit, menuPass (APT10), OilRig, Sandworm, Turla, Wizard Spider, and Blind Eagle. These plans help organizations better understand and prepare for real-world cyber threats.
Comments
Post a Comment