top of page

Initial Access Tactics in the ATT&CK Matrix for Enterprise

ATT&CK Matrix for Enterprise's 'Initial Access' stage encompasses the tactics and techniques employed by adversaries to establish the initial entry into a target network. This stage reveals the methods used by attackers to infiltrate a target organization's network, providing details about these methods.

Objective: The primary purpose of the Initial Access stage is to facilitate adversaries in taking the first step towards gaining entry to the target network. During this stage, attackers use various techniques to discover vulnerabilities, bypass security measures, and often clandestinely infiltrate the network to gain control.

Intial Access Attack Techniques and Example Scenarios

Content Injection

"Content Injection" within the MITRE ATT&CK Matrix refers to the tactic where adversaries manipulate or insert malicious content into legitimate files, data, or communication channels. This technique allows attackers to alter the intended content, potentially causing misinformation, unauthorized access, or the execution of malicious actions.

Example Scenario:

Let's consider a scenario involving a web application that allows users to submit comments on articles. The application stores these comments in a database and displays them on the corresponding article pages. An attacker identifies this functionality and exploits a vulnerability that enables them to inject malicious content into the comments.

  1. Identifying the Target: The attacker first identifies the target web application and its comment submission functionality.

  2. Exploiting Vulnerability: Upon identifying a vulnerability, such as inadequate input validation, the attacker exploits it to inject malicious content into the comment field.

  3. Impact:

  • When other users view the article, the injected script executes in their browsers, potentially leading to unauthorized actions, such as stealing user cookies or performing actions on behalf of the user.

  • The attacker could further manipulate the content to spread misinformation, deface the website, or perform actions that compromise the integrity of the platform.

This example illustrates how content injection can be used in a web application context. It highlights the importance of input validation and secure coding practices to prevent such attacks.

Drive-by Compromise

"Drive-by Compromise" within the MITRE ATT&CK Matrix is a tactic where adversaries exploit vulnerabilities in a system or application when a user visits a website, typically without any interaction or additional action from the user. This technique aims to compromise the user's system silently and often involves the use of malicious content on websites.

Example Scenario:

Let's consider a scenario involving a drive-by compromise on a popular news website:

  1. Malicious Website Setup: The attacker sets up a seemingly legitimate website, possibly a compromised news site or a fake site designed to appear trustworthy.

  2. Exploiting Browser Vulnerabilities: The attacker embeds malicious code, often in the form of an exploit kit, within the website. This code specifically targets vulnerabilities in the user's web browser or associated plugins.

  3. User Visits the Compromised Site: A user, unaware of the malicious nature of the website, visits it to read an article or access information.

  4. Silent Exploitation: As the user browses the content, the embedded malicious code takes advantage of vulnerabilities in the browser or plugins. This could include exploiting unpatched software or using known vulnerabilities for which security patches are available but not applied.

  5. Payload Delivery: Once the exploitation is successful, the attacker delivers a payload to the user's system. This payload could be malware, ransomware, or any other form of malicious software.

  6. Compromised System: The user's system is now compromised, and the attacker may have unauthorized access or control over the device. This can lead to various malicious activities, such as data theft, system monitoring, or further exploitation within the network.

The key characteristic of drive-by compromise is its ability to infect systems without the need for active user engagement beyond visiting a compromised website. Users can fall victim to this tactic simply by navigating to a site that contains the exploit.

It's crucial for users to keep their software up-to-date with the latest security patches and for organizations to implement web filtering and other security measures to detect and prevent such drive-by compromise attempts.

Exploit Public-Facing Application

"Exploit Public-Facing Application" in the MITRE ATT&CK Matrix refers to the tactic where adversaries target and take advantage of vulnerabilities in applications or services that are accessible from the public internet. Attackers exploit weaknesses in these public-facing applications to compromise systems and gain unauthorized access.

Example Scenario:

Let's consider a scenario involving the exploitation of a public-facing web application:

  1. Identification of a Public-Facing Application: The attacker identifies a web application that is accessible from the public internet. This could be a company's website, an online service, or any application that interacts with users over the web.

  2. Vulnerability Assessment: The attacker performs a thorough assessment to identify vulnerabilities in the web application. This assessment may include scanning for known vulnerabilities, analyzing the application's source code, or using automated tools to find weaknesses.

  3. Discovery of an Unpatched Vulnerability: During the assessment, the attacker discovers an unpatched vulnerability in the web application. This could be a flaw in the application's code, misconfigurations, or a known software vulnerability for which a security patch is available but has not been applied.

  4. Exploitation Attempt: Armed with knowledge about the vulnerability, the attacker attempts to exploit it. This may involve crafting malicious input, injecting code, or leveraging specific attack techniques to compromise the application.

  5. Unauthorized Access: If successful, the attacker gains unauthorized access to the public-facing application. This could mean obtaining sensitive information, manipulating data, or potentially gaining a foothold within the organization's internal network if the application has such connectivity.

  6. Post-Exploitation Activities: With access to the compromised application, the attacker may conduct further post-exploitation activities, such as lateral movement within the network, data exfiltration, or planting additional backdoors for persistence.

It's important for organizations to regularly conduct security assessments and apply patches promptly to mitigate the risk of exploitation. Additionally, web application firewalls, intrusion detection systems, and other security measures can help detect and prevent exploitation attempts against public-facing applications.

External Remote Services

"External Remote Services" in the MITRE ATT&CK Matrix refers to the tactic where adversaries leverage external services or infrastructure to maintain communication and control over compromised systems. Attackers use these external remote services to evade detection, exfiltrate data, or maintain persistence in a target environment.

Example Scenario:

Let's explore a scenario involving the use of external remote services:

  1. Initial Compromise: The attacker successfully compromises a system within the target organization. This could occur through various means, such as phishing, exploiting vulnerabilities, or other initial access techniques.

  2. Communication with External Service: Rather than establishing direct communication with a command and control (C2) server hosted within the target environment (which might be more easily detected), the attacker configures the compromised system to communicate with an external remote service. This external service could be a legitimate online platform or a server controlled by the attacker outside the organization's network.

  3. Data Exfiltration: The compromised system, under the control of the attacker, communicates with the external remote service to exfiltrate sensitive data. This could include intellectual property, credentials, or other valuable information.

  4. Command and Control: The external remote service serves as a command and control infrastructure for the attacker. The attacker can send commands, receive stolen data, and maintain control over the compromised system without directly connecting to the organization's internal network.

  5. Evasion of Detection: By using an external remote service, the attacker attempts to evade traditional network security controls and detection mechanisms. This tactic makes it challenging for defenders to identify malicious activities since the communication occurs outside the organization's typical network traffic.

  6. Persistence: The attacker ensures persistence by configuring the compromised system to regularly reach out to the external remote service for further instructions. This helps maintain a lasting presence in the compromised environment.

Organizations can enhance their security posture by monitoring network traffic for unusual patterns, employing threat intelligence feeds, and implementing controls to detect and block communication with known malicious external services. Regular security awareness training for employees can also help prevent initial compromises that lead to the use of external remote services by adversaries.

Hardware Additions

"Hardware Additions" in the MITRE ATT&CK Matrix refers to the tactic where adversaries introduce new physical devices or modify existing hardware to facilitate their objectives. This tactic involves manipulating or adding hardware components as part of the attack lifecycle.

Example Scenario:

Objective: The attacker aims to gain unauthorized access to a secure facility by manipulating hardware components to compromise the physical security measures.


  1. Initial Reconnaissance: The attacker conducts initial reconnaissance to identify the target facility's security systems, such as electronic access control systems, surveillance cameras, and alarm systems.

  2. Identification of Weaknesses: During the reconnaissance phase, the attacker identifies vulnerabilities or weaknesses in the existing security infrastructure. For example, they may discover a vulnerability in the electronic card reader system that controls access to the facility.

  3. Development of Hardware-Based Exploit: The attacker develops or acquires a hardware-based exploit to manipulate the identified weakness. This could involve creating a fake access card, tampering with surveillance cameras, or introducing a rogue hardware device that mimics legitimate access control signals.

  4. Physical Introduction of Manipulated Hardware: The attacker physically infiltrates the target facility and introduces the manipulated hardware. For instance, they may install a device that overrides the electronic card reader or connect a rogue device to the surveillance camera system.

  5. Exploitation and Access: The introduced hardware is used to exploit the identified weaknesses, granting the attacker unauthorized access to the facility. This could involve bypassing access controls, disabling alarms, or manipulating surveillance systems to avoid detection.

  6. Persistence and Concealment: The attacker may leave the manipulated hardware in place to maintain persistent access or introduce additional hardware to ensure continued access to the facility. They take steps to conceal their activities, making it difficult for security personnel to detect the compromise.

Detection and Mitigation:

  • Implementation of physical security measures, such as surveillance cameras and access logs, to monitor and record any suspicious hardware additions.

  • Regular physical security audits to identify and remove unauthorized hardware.

  • Employee training and awareness programs to recognize and report unusual hardware installations or modifications.

The "Hardware Additions" tactic highlights the importance of securing physical assets and maintaining vigilance against adversaries who may exploit weaknesses in hardware components to achieve their objectives.


"Phishing" in the MITRE ATT&CK Matrix refers to the tactic where adversaries use deceptive emails or messages to manipulate individuals into taking actions that benefit the attacker. This tactic involves social engineering techniques to trick users into divulging sensitive information, clicking on malicious links, or executing malicious attachments.

Example Scenario:

Objective: The attacker's goal is to gain unauthorized access to an organization's internal network by tricking an employee into revealing their login credentials.


  1. Research and Target Selection:

  • The attacker selects a target organization and conducts research to identify employees with access to sensitive information or valuable systems.

  1. Email Spoofing:

  • The attacker spoofs a legitimate-looking email, making it appear as if it's coming from a trusted source within the organization. They may use a forged sender address and craft the email to mimic official communications.

  1. Deceptive Content:

  • The email contains content designed to create a sense of urgency, curiosity, or fear. For example, it might claim that the recipient's account is compromised and immediate action is required to prevent data loss.

  1. Malicious Link or Attachment:

  • The email includes a link to a phishing website that imitates a legitimate login page. Alternatively, it may have a malicious attachment, such as a document with embedded malware.

  1. Employee Interaction:

  • The targeted employee receives the phishing email and, without verifying its legitimacy, clicks on the provided link or opens the malicious attachment.

  1. Credential Harvesting:

  • If a fake login page is used, the attacker captures the victim's credentials when they attempt to log in. If malware is delivered via the attachment, it might silently harvest login credentials from the victim's system.

  1. Unauthorized Access:

  • With the stolen credentials, the attacker gains unauthorized access to the organization's internal network or specific systems.

  1. Persistence and Data Exfiltration:

  • The attacker explores the compromised network, maintains persistence, and may exfiltrate sensitive data for further exploitation or sale on the black market.

Detection and Mitigation:

  • Employee training programs to educate users about phishing techniques and the importance of verifying unexpected emails.

  • Email filtering solutions to detect and block phishing emails before they reach users' inboxes.

  • Multi-factor authentication (MFA) to add an extra layer of security, even if credentials are compromised.

This scenario illustrates the social engineering aspect of phishing attacks, where attackers exploit human psychology to achieve their malicious objectives.

Replication Through Removable Media

In the MITRE ATT&CK Matrix, "Replication Through Removable Media" is a technique employed by adversaries to propagate or move laterally within a network by utilizing removable media, such as USB drives or external hard drives, to transfer malicious payloads.

Example Scenario:

Objective: The attacker aims to spread malware across a target network by using removable media to infect systems that are connected to the media device.


  1. Malicious Payload Preparation:

  • The attacker prepares a malicious payload, such as malware or a backdoor, that is designed to execute upon connecting the removable media to a system.

  1. Removable Media Introduction:

  • The attacker inserts a USB drive containing the malicious payload into a computer within the target network. The removable media acts as a carrier for the malware.

  1. AutoRun or Social Engineering:

  • The attacker leverages AutoRun capabilities or employs social engineering techniques to trick the user into executing the malicious payload from the removable media. AutoRun might automatically execute the payload when the media is inserted.

  1. Infection of Connected Systems:

  • The malicious payload runs on the compromised system and may attempt to spread itself to other systems connected to the network. This can occur through various means, such as exploiting vulnerabilities or utilizing shared drives.

  1. Propagation Across the Network:

  • The malware replicates and propagates across the network, moving laterally to other systems that the compromised system has access to. The goal is to infect as many systems as possible, expanding the attacker's foothold within the network.

  1. Persistence and Command Execution:

  • Once replicated on other systems, the malware establishes persistence mechanisms to ensure it survives system reboots. It may connect to a command and control (C2) server to await further instructions from the attacker.

Detection and Mitigation:

  • Endpoint Protection:

  • Use endpoint protection solutions that can detect and block known malware and suspicious behavior related to removable media.

  • User Education:

  • Train users to avoid using untrusted or unknown removable media and to report any suspicious devices or activities.

  • Device Control Policies:

  • Implement device control policies to restrict or monitor the use of removable media within the network.

  • Regular Audits:

  • Conduct regular audits and scans of systems to identify unauthorized or suspicious applications and activities.

This scenario highlights the risk associated with the use of removable media as a vector for spreading malware within an organization's network.

Supply Chain Compromise

In the MITRE ATT&CK Matrix, "Supply Chain Compromise" refers to the tactics and techniques adversaries employ to manipulate or exploit the processes and systems associated with the production and distribution of software and hardware. This technique involves compromising the integrity of products or components during their lifecycle, often with the intention of delivering malicious payloads to end users.

Example Scenario:

Objective: The attacker aims to compromise a software supply chain to introduce a backdoor into a widely-used application, enabling them to gain unauthorized access to systems that install or update the compromised software.


  1. Target Identification:

  • The attacker identifies a popular software application that is widely used across various organizations and industries. They choose this target to maximize the impact of their supply chain compromise.

  1. Compromising the Build Environment:

  • The attacker gains unauthorized access to the build environment of the software vendor. This may involve exploiting vulnerabilities in the vendor's infrastructure or using stolen credentials to access development systems.

  1. Introduction of Malicious Code:

  • Once inside the build environment, the attacker introduces malicious code or a backdoor into the source code of the software. This can be a subtle modification that doesn't raise suspicion during the build process.

  1. Compromised Software Build:

  • The compromised code is integrated into the software build process, leading to the creation of a tainted version of the software. The build process may proceed as usual, making it challenging to detect the presence of malicious components.

  1. Distribution of Compromised Software:

  • The compromised software is distributed through the legitimate software distribution channels. Users unknowingly download and install the compromised version, as it appears to be a valid update or release from the trusted vendor.

  1. Exploitation of Compromised Systems:

  • Systems that install or update the compromised software are now under the control of the attacker. The introduced backdoor may enable unauthorized access, data exfiltration, or further exploitation within the victim's environment.

  1. Persistence and Command Execution:

  • The attacker establishes persistence on compromised systems and communicates with a command and control (C2) server. This allows them to maintain control, exfiltrate sensitive information, or deliver additional payloads.

Detection and Mitigation:

  • Code Integrity Checks:

  • Implement mechanisms to verify the integrity of source code and software builds, ensuring that any unauthorized changes are detected.

  • Secure Build Environments:

  • Secure and monitor build environments to prevent unauthorized access and modifications. Use multi-factor authentication and regularly update credentials.

  • Software Signing:

  • Employ code signing to verify the authenticity of software updates and releases. Users can check digital signatures to ensure that the software has not been tampered with.

  • Vendor Security Assessments:

  • Conduct thorough security assessments of software vendors, especially those providing critical applications. Assess their security practices and measures to protect the software supply chain.

This scenario underscores the risk of attackers compromising the supply chain to distribute malicious software to a wide user base, emphasizing the importance of securing the software development and distribution lifecycle.

Trusted Relationship

In the MITRE ATT&CK Matrix, "Trusted Relationship" refers to the tactic where adversaries exploit established trust between entities to gain unauthorized access or manipulate the interactions for malicious purposes. This tactic involves taking advantage of the trust that may exist between systems, services, or users.

Example Scenario:

Objective: The attacker aims to leverage a trusted relationship between two entities to gain unauthorized access to a target system and exfiltrate sensitive information.


  1. Identifying Trusted Entities:

  • The attacker identifies a trusted relationship between two entities within the target organization. This could involve exploiting trust between user accounts, systems, or services that regularly interact with each other.

  1. Compromising Trusted Credentials:

  • The attacker employs various techniques to compromise the credentials associated with one of the trusted entities. This could include phishing attacks, credential stuffing, or exploiting weak password policies.

  1. Leveraging Trust for Access:

  • Using the compromised credentials, the attacker gains unauthorized access to one of the trusted entities. For example, they may compromise a user account that has established trust relationships with other systems or services.

  1. Exploiting Trusted Communication:

  • The attacker takes advantage of the established trust to move laterally within the network or escalate privileges. This may involve exploiting the trust relationship to access sensitive information, modify configurations, or execute malicious commands.

  1. Data Exfiltration:

  • Once the attacker has exploited the trust relationship and gained access to the target system, they exfiltrate sensitive data. This could include intellectual property, customer information, or other valuable assets.

  1. Maintaining Persistence:

  • The attacker implements measures to maintain persistence within the compromised system. This could involve creating backdoors, establishing new trust relationships, or manipulating existing trust configurations.

Detection and Mitigation:

  • Behavioral Analysis:

  • Implement behavioral analysis tools to detect unusual patterns of activity, especially those involving trusted entities. Anomalous behavior may indicate unauthorized access.

  • Multi-Factor Authentication (MFA):

  • Enforce the use of multi-factor authentication to add an extra layer of security, making it more challenging for attackers to compromise credentials.

  • Regular Credential Audits:

  • Conduct regular audits of user and system credentials to identify and revoke access for compromised accounts. This includes monitoring and managing trust relationships.

  • Least Privilege Principle:

  • Follow the principle of least privilege to restrict the permissions granted to entities, even if they are in a trusted relationship. Limiting access reduces the potential impact of a compromise.

  • Network Segmentation:

  • Implement network segmentation to isolate critical systems and services, reducing the lateral movement opportunities for attackers who gain unauthorized access.

This scenario highlights the risk associated with adversaries exploiting trust relationships within an organization to facilitate unauthorized access and conduct malicious activities. Implementing robust security measures and regularly auditing trust configurations are essential for mitigating such threats.

Valid Accounts

In the MITRE ATT&CK Matrix, "Valid Accounts" refer to adversaries using existing accounts, often obtained through various means, to facilitate unauthorized access and conduct malicious activities within a target environment. This tactic involves exploiting legitimate user accounts to blend in and evade detection.

Example Scenario:

Objective: The attacker's goal is to leverage valid accounts within the target organization to gain unauthorized access, move laterally, and potentially exfiltrate sensitive information.


  1. Enumeration of Valid Accounts:

  • The attacker begins by enumerating valid accounts within the target organization. This could involve scraping publicly available information, purchasing stolen account credentials from the dark web, or using techniques like credential stuffing to identify accounts with known passwords.

  1. Credential Stuffing Attack:

  • The attacker employs a credential stuffing attack by using previously leaked or commonly used passwords to attempt unauthorized access to various user accounts. They leverage automated tools to systematically test username-password combinations.

  1. Phishing for Credentials:

  • The attacker launches phishing campaigns to trick users into revealing their credentials. This could involve sending deceptive emails, often disguised as legitimate communication, prompting users to enter their usernames and passwords on fake login pages.

  1. Compromising Employee Devices:

  • The attacker gains physical or remote access to devices used by employees within the organization. They extract stored credentials from browsers, email clients, or other applications where passwords might be saved.

  1. Brute Force Attacks:

  • Using automated tools, the attacker conducts brute force attacks against login interfaces, attempting to guess passwords through a systematic trial-and-error approach.

  1. Valid Account Usage:

  • Once the attacker successfully obtains valid credentials, they use these accounts to log into systems, applications, or services within the target environment. This allows them to blend in with legitimate user activity, making detection more challenging.

  1. Lateral Movement:

  • The attacker uses the compromised account to move laterally within the network, exploring and accessing different systems and resources. This may involve escalating privileges to gain additional access.

  1. Data Exfiltration:

  • After establishing a foothold and moving laterally, the attacker exfiltrates sensitive data from the organization. This could include intellectual property, customer information, or other valuable assets.

Detection and Mitigation:

  • User Training and Awareness:

  • Educate users about the risks of phishing attacks and the importance of using strong, unique passwords.

  • Multi-Factor Authentication (MFA):

  • Implement multi-factor authentication to add an extra layer of security, requiring additional verification even if valid credentials are compromised.

  • Credential Monitoring:

  • Regularly monitor and audit user account activities, looking for unusual login patterns, multiple failed login attempts, or concurrent logins from different locations.

  • Endpoint Protection:

  • Employ endpoint protection solutions to detect and prevent malicious activities on employee devices, especially those that involve the extraction of stored credentials.

  • Regular Password Changes:

  • Enforce regular password changes and encourage the use of complex passwords to reduce the effectiveness of credential stuffing attacks.

By understanding and addressing the risks associated with adversaries using valid accounts, organizations can implement proactive measures to detect and mitigate unauthorized access attempts, reducing the likelihood of successful compromise.

15 views0 comments


bottom of page