www.extrahop.com Open in urlscan Pro
44.228.179.34  Public Scan

Submitted URL: https://app.wiredata.extrahop.com/e/er?utm_campaign=2023-nurture-crowdstrike-customer-touch-1-0523&utm_medium=email&utm_source=Elo...
Effective URL: https://www.extrahop.com/company/blog/2020/better-mitre-coverage-using-ndr-and-edr/?utm_campaign=2023-nurture-crowdstrike...
Submission: On June 18 via manual from QA — Scanned from CA

Form analysis 2 forms found in the DOM

Name: untitledForm-1367515949663POST https://s1701.t.eloqua.com/e/f2

<form method="POST" id="form107" name="untitledForm-1367515949663" role="form" action="https://s1701.t.eloqua.com/e/f2" class="reset-disabled" data-parsley-validate="" data-parsley-trigger="focusout" data-onload="extrahop.undisableForm"
  novalidate="">
  <input type="hidden" name="elqFormName" value="untitledForm-1367515949663">
  <input type="hidden" name="elqSiteId" value="1701">
  <input type="hidden" name="elqCampaignId">
  <input type="hidden" name="campaignId" value="70180000001EqjnAAC">
  <input type="hidden" name="elqCustomerGUID">
  <input type="hidden" name="elqCookieWrite" value="0">
  <input type="hidden" name="GA_Medium" value="">
  <input type="hidden" name="GA_Source" value="">
  <input type="hidden" name="GA_Campaign" value="">
  <input type="hidden" name="GA_Content" value="">
  <input type="hidden" name="GA_Term" value="">
  <input type="hidden" name="GA_Product" value="">
  <input type="hidden" name="GA_Region" value="">
  <input type="hidden" name="GA_Funnelstage" value="">
  <input type="hidden" name="GA_Version" value="">
  <input type="hidden" name="gclid" value="">
  <input type="hidden" name="FormURL" value="">
  <input type="hidden" name="uniqueid" value="">
  <input type="hidden" name="GA_Adgroup" value="">
  <input type="hidden" name="redirectUrl" value="https://www.extrahop.com/company/newsletter-signup-success/" data-sync-host="www">
  <div class="inline-input">
    <div class="form-group email">
      <input id="email" class="form-control garlic-auto-save" name="email" type="email" required="" placeholder="Email Address">
    </div>
    <div class="form-group">
      <input type="submit" class="btn btn-basic btn-green" value="Subscribe" data-track-newsletter-subscribe="">
    </div>
  </div>
</form>

<form>
  <input class="st-default-search-input st-search-set-focus" type="text" value="" placeholder="Search this site" aria-label="Search this site" id="st-overlay-search-input" autocomplete="off" autocorrect="off" autocapitalize="off">
</form>

Text Content

 * The Platform
   
   
   EXTRAHOP
   REVEAL(X) 360
   
   CLOUD-NATIVE VISIBILITY, DETECTION, AND RESPONSE
   FOR THE HYBRID ENTERPRISE.
   
   Learn More
   
   Explore Reveal(x)
   
   How It Works
   
   Why Decryption Matters
   
   Integrations and Automations
   
   Cybersecurity Services
   
   AWS Cloud Security
   
   What is Network Detection & Response (NDR)?
   
   Reveal(x) Enterprise: Self-Managed NDR
   
   TRY IT FOR FREE
   
   
   REVEAL(X) 360
   
   
   LIGHT UP YOUR AWS
   ENVIRONMENT.
   
   No friction.
   No credit card required.
   
   Start Free Trial
 * Solutions
   
   --------------------------------------------------------------------------------
   
   
   SOLUTIONS
   
   With the power of machine learning, gain the insight you need to solve
   pressing challenges.
   
   FOR SECURITY
   
   Stand up to threats with real-time detection and fast response.
   
   Learn More >
   
   FOR CLOUD
   
   Gain complete visibility for cloud, multi-cloud, or hybrid environments.
   
   Learn More >
   
   FOR IT OPS
   
   Share information, boost collaboration without sacrificing security.
   
   Learn More >
   
   BY INITIATIVE
   
    * ExtraHop IDS
    * XDR
    * Advanced Threats
    * Ransomware Mitigation
    * Multicloud & Hybrid Cloud Security
    * Implement Zero Trust
   
   BY VERTICAL
   
    * Financial Services
    * Healthcare
    * e-Commerce and Retail
    * Education
    * U.S. Public Sector
   
   
   
   
   
   
   
   THREAT BRIEFING
   
   
   GENERATIVE AI TOOLS
   
   Detect data leaks from employee use of ChatGPT in Reveal(x)
   
   Watch a Demo
   
   

 * Customers
   
   --------------------------------------------------------------------------------
   
   
   CUSTOMERS
   
   Our customers stop cybercriminals in their tracks while streamlining
   workflows. Learn how or get support.
   
   COMMUNITY
   
    * Customer Portal Login
    * Bundle Gallery
    * Community Forums
    * Customer Stories
   
   SERVICES
   
    * Services Overview
    * Reveal(x) Advisor
    * Incident Response
    * Deployment
   
   TRAINING
   
    * Training Overview
    * Training Sessions
   
   SUPPORT
   
    * Support Overview
    * Documentation
    * Appliance Policies
    * Knowledge Base
   
   Featured Customer Story
   
   
   SEATTLE CHILDREN'S HOSPITAL
   
   Seattle Children's and ExtraHop Reveal(x)—Protecting More Than Data
   
   Read More
   
   See All Customer Stories >

 * Partners
   
   --------------------------------------------------------------------------------
   
   
   PARTNERS
   
   Our partners help extend the upper hand to more teams, across more platforms.
   
   CHANNEL PARTNERS
   
    * Channel Overview
    * Managed Services Providers
    * Shields Up Solution Brief
   
   INTEGRATION PARTNERS
   
    * CrowdStrike
    * Splunk
    * Amazon Web Services
    * Google Cloud Security
    * All Technology Partners
   
   PANORAMA PROGRAM
   
    * Partner Program Information
    * Partner Portal Login
    * Become a Partner
   
   Featured Integration Partner
   
   
   CROWDSTRIKE
   
   * Detect network attacks. * Correlate threat intelligence and forensics. *
   Auto-contain impacted endpoints. * Inventory unmanaged devices and IoT.
   
   Read More
   
   See All Integration Partners >

 * Blog
 * More
    * About Us
    * Newsroom
    * Events
    * Careers
    * Resources
   
    * About Us
    * What Is Cloud-Native?
    * Leadership
    * Board of Directors
    * Contact Us
   
    * Explore the Interactive Online Demo
    * Sign Up for a Live Attack Simulation
    * Upcoming Webinars and Events
    * Newsroom
    * ExtraHop Media Kit and Brand Guidelines
   
   
   
   
   
   
   
   
   HUNTER CHALLENGE
   
   Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag
   style event.
   
   Read More
   
   
   
    * Explore the Interactive Online Demo
    * Sign Up for a Live Attack Simulation
    * Upcoming Webinars and Events
    * Newsroom
    * ExtraHop Media Kit and Brand Guidelines
   
   
   
   
   
   
   
   
   HUNTER CHALLENGE
   
   Get hands-on with ExtraHop's cloud-native NDR platform in a capture the flag
   style event.
   
   Read More
   
   
   
    * Careers at ExtraHop
    * Search Openings
    * Connect on LinkedIn
   
    * All Resources
    * Customer Stories
    * Shields Up Resources
    * Ransomware Attacks in 2021: A Retrospective
    * White Papers
    * Datasheets
    * Industry Reports
    * Webinars
   
    * Cyberattack Glossary
    * Network Protocols Glossary
    * Documentation
    * Firmware
    * Training Videos


Login
Logout
Start Demo





THE PLATFORM


SOLUTIONS


CUSTOMERS


PARTNERS


BLOG


MORE

START THE DEMO

CONTACT US

Back


EXTRAHOP
REVEAL(X) 360

Cloud-native visibility, detection, and response
for the hybrid enterprise.

Learn More

HOW IT WORKS



WHY DECRYPTION MATTERS

INTEGRATIONS AND AUTOMATIONS

CYBERSECURITY SERVICES

AWS CLOUD SECURITY

WHAT IS NETWORK DETECTION & RESPONSE (NDR)?

REVEAL(X) ENTERPRISE: SELF-MANAGED NDR

Back


SOLUTIONS



Learn More

SECURITY

CLOUD

IT OPS

USE CASES

EXPLORE BY INDUSTRY VERTICAL

Back


CUSTOMERS

Customer resources, training,
case studies, and more.

Learn More

CUSTOMER PORTAL LOGIN

CYBERSECURITY SERVICES

TRAINING

EXTRAHOP SUPPORT

Back


PARTNERS

Partner resources and information about our channel and technology partners.

Learn More

CHANNEL PARTNERS

INTEGRATIONS AND AUTOMATIONS

PARTNERS

Back


BLOG



Learn More
Back


ABOUT US


NEWSROOM


EVENTS


CAREERS


RESOURCES

Back


ABOUT US

See what sets ExtraHop apart, from our innovative approach to our corporate
culture.

Learn More



WHAT IS CLOUD-NATIVE?

CONTACT US

Back


NEWSROOM

Get the latest news and information.

Learn More

SIGN UP FOR A LIVE ATTACK SIMULATION

UPCOMING WEBINARS AND EVENTS

Back


EVENTS

Upcoming events and conferences.

Learn More

SIGN UP FOR A LIVE ATTACK SIMULATION

UPCOMING WEBINARS AND EVENTS

Back


CAREERS

We believe in what we're doing. Are you ready to join us?

Learn More

CAREERS AT EXTRAHOP

SEARCH OPENINGS

CONNECT ON LINKEDIN

Back


RESOURCES

Find white papers, reports, datasheets, and more by exploring our full resource
archive.

All Resources

CUSTOMER STORIES

SHIELDS UP RESOURCES

RANSOMWARE ATTACKS IN 2021: A RETROSPECTIVE

CYBERATTACK GLOSSARY

NETWORK PROTOCOLS GLOSSARY

DOCUMENTATION

FIRMWARE

TRAINING VIDEOS


BLOG


INTEGRATE EDR AND NDR FOR COMPREHENSIVE MITRE ATT&CK COVERAGE


NETWORK TTPS ARE CRITICAL FOR POST-COMPROMISE, PRE-BREACH DETECTION & RESPONSE

Chase Snyder

July 28, 2022




The MITRE ATT&CK framework has rapidly become the go-to lens through which
security operations teams view their ability to detect attacker tactics,
techniques, and procedures (TTPs). The ATT&CK framework comprises 191
techniques, and 385 sub techniques (and counting) across fourteen tactic
categories—starting with reconnaissance and proceeding through initial
compromise, maintaining persistence, defense evasion, and finally
impact—spanning the course of a full cyberattack campaign.

When enterprise SecOps teams use MITRE ATT&CK to understand the behavior they
observe in their own environment, they gain a clearer view of which attack
tactics they're able to detect and which might fly under the radar or evade
their defenses and eventually lead to a breach. Understanding these gaps in
their defenses makes it easier to decide where to invest security budgets, and
how to update policies and procedures to assure strong, effective defenses.

Currently, the MITRE ATT&CK framework is heavily weighted towards
endpoint-centric attack tactics. Detection and investigation of a large
percentage of the TTPs cataloged in the framework require visibility into files
and processes on individual endpoints. Endpoint detection and response (EDR) is
an area of heavy investment for security teams, and it makes sense that they
want industry standards and frameworks to both scrutinize and validate the
effectiveness of their programs. However, many crucial TTPs, especially in the
later stages of an attack campaign, are easier to detect on the network.
Automatically analyzing and correlating both data sources makes it easier for
analysts to make fast, informed decisions and respond precisely to urgent
threats.

Learn How Integrated EDR and NDR Stop Breaches Faster


NETWORK-CENTRIC TTPS CAN MAKE THE DIFFERENCE BETWEEN A COMPROMISE AND A DATA
BREACH

When an attacker has compromised your network and begins to move laterally,
hopping from endpoint to endpoint, you need to move quickly to prevent them from
maintaining a foothold, staging, and eventually exfiltrating critical data in a
way that represents a potentially irreversible data breach. Many enterprises
have less visibility into internal lateral movement than they do ingress and
egress. Attackers that get past the perimeter have an easier time staying
stealthy and meeting high-impact attack objectives.

DEFENSE EVASION

If an attacker is inside the environment, that means they've likely already
circumvented some defenses. A few common ways to do this would be:

 * Assessing which endpoints are monitored by agents or antivirus, and avoiding
   them
 * Deleting or altering activity logs to mask suspicious behavior
 * Hijacking or injecting attack behavior into unmonitored processes to evade
   endpoint security
 * Stealing valid credentials and using them for unauthorized purposes

Many times, endpoint security, next-gen antivirus, or firewalls will catch these
tactics if they affect perimeter-based or internet-facing devices. But attackers
know it only has to work once for them to get the toehold they need, so they
keep trying and keep developing new tactics for bypassing these security
mechanisms. Software supply chain attacks, such as the SolarWinds SUNBURST
attack, or the abuse of a vulnerability in the Kaseya VSA management software,
are an increasingly popular method to evade perimeter security altogether.

In all of these cases, the attacker buys themself time to expand their footprint
in the target environment. Security teams that have the ability to detect what
happens after these behaviors are in a much better position to reduce dwell time
(the amount of time the attacker has before being detected) to achieve their
goals of stealing or destroying data, or distributing and detonating ransomware.

This is where network detection and response (NDR) comes in.

THE ASYMMETRIC BATTLE AND HOW COVERT DEFENSES CAN HELP

Why are attackers able to circumvent established security mechanisms so
effectively, and what can a savvy security team do next? There are two issues
that security teams should be aware of:

One is the asymmetry inherent in the relationship between attackers and
defenders. An attacker only has to get past the perimeter once to make their job
much, much easier. Few, if any, companies have the same level of security
visibility inside their environment as they do at the edge—although that's
changing.

The second is that perimeter and endpoint security mechanisms are visible to the
attacker. A quick scan of a compromised laptop can reveal whether or not that
laptop has an endpoint protection agent on it, and whether its activity is being
logged. If an attacker knows which defenses lie in wait for them, they can plan
ahead and disable those defenses, or just target unmanaged and unsecured devices
exclusively.

Network detection and response addresses both of these challenges. Because NDR
platforms observe all communications across the inside of a network, in the
east-west corridor, they are able to detect unusual lateral movement, suspicious
behavior by users, and new, unauthorized devices as soon as they connect.
Because NDR platforms ingest data passively, an attacker has no way of knowing
whether their behavior is being watched, nor any mechanism for altering the
configuration of the observation. They may attempt to evade detection by
encrypting their traffic, but that traffic can be decrypted for analysis, or
simply blocked if unauthorized, out-of-policy encryption schemes are detected.

These characteristics make NDR a fantastic mechanism for detecting and
investigating the kinds of behaviors that attackers do after they bypass
perimeter-focused defenses.

Webinar: How XDR Gets Real: Stop Advanced Threats with ExtraHop and Crowdstrike

WHAT MAKES SOME MITRE ATT&CK TTPS NETWORK-CENTRIC?



Each MITRE ATT&CK tactic listing includes a list of data sources that are useful
for determining the best way to detect and investigate that particular tactic.
Looking for TTPs that list network traffic content, network traffic flow, or
network connection creation is a good way to identify which TTPs are better to
detect and investigate using network traffic. Examples include:

 * Remote Access Tools (T1219)
 * Remote File Copy (T1105)
 * DCShadow (T1207)
 * And dozens more

While network-centric TTPs appear in all 12 of the main Technique Categories in
the MITRE ATT&CK Framework, they are more heavily concentrated in certain
categories, including:

 * Lateral Movement
 * Credential Access
 * Command & Control
 * Data Exfiltration

The reason for this is, once an attacker has compromised an environment, they
have likely already evaded other safeguards in place to prevent them from doing
so. At this point, the attacker still has a long way to go before completing
their objective. Well-equipped defenders can still stop the breach, as long as
they have the right tools!

Because network detection and response consumes data passively and is not
visible to the attacker, they cannot evade or disable it in the same way.
Security teams can rely on NDR as a covert line of defense that will continue to
be effective even when an attacker believes that they're in the clear.

EDR and activity logging from a SIEM solution are both vital tools for any
security operations team. Both can catch many of the TTPs attackers attempt in
the early stages of an attack campaign or behaviors that manifest on-host
without generating network activity. This includes common malware behaviors such
as process spawning, directory traversal, and on-host privilege escalation. For
the latter stages of an attack, NDR is the best approach to ensure that a
compromise doesn't progress into a full-on data breach. Using an integrated set
of best-of-breed NDR, EDR, and SIEM solutions is the best approach to having the
complete data set needed for thorough detection and response.

White Paper Download: NDR for the MITRE ATT&CK Framework

 * Posted in Cybersecurity, Reveal(x), Security Frameworks, NDR
 * See other posts by Chase Snyder


STOP BREACHES 87% FASTER

Investigate a live attack in the full product demo of ExtraHop Reveal(x),
network detection and response, to see how it accelerates workflows.

Start Demo


RELATED BLOGS

5.19.20


ANNOUNCING REVEAL(X) 360

See how SaaS-based network detection and response (NDR) eliminates cloud
security friction and delivers immediate value with a low management burden,
360-degree visibility, and situational intelligence at scale.

Sri Sundaralingam



6.17.20


EXTRAHOP NAMED A REPRESENTATIVE VENDOR IN THE 2020 GARTNER MARKET GUIDE FOR NDR

Get the top takeaways from the 2020 Gartner Market Guide for Network Detection
and Response and see ExtraHop as a Representative Vendor.

Sri Sundaralingam


SIGN UP TO STAY INFORMED

Javascript is required to submit this form


+

ExtraHop uses cookies to improve your online experience. By using this website,
you consent to the use of cookies. Learn More

Global Headquarters
520 Pike St
Suite 1600
Seattle, WA 98101
United States

EMEA Headquarters
WeWork 8
Devonshire Square
London EC2M 4PL
United Kingdom

APAC Headquarters
3 Temasek Avenue
Centennial Tower
Level 18
Singapore 039190

PLATFORM

 * Reveal(x) 360
 * How It Works
 * Why Decryption Matters
 * Integrations and Automations
 * Cybersecurity Services
 * AWS Cloud Security
 * What is Network Detection & Response (NDR)?
 * Reveal(x) Enterprise: Self-Managed NDR

SOLUTIONS

 * Security
 * Cloud
 * IT Ops
 * Use Cases
 * Industries

CUSTOMERS

 * Customer Portal Login
 * Services Overview
 * Training Overview
 * Support Overview

PARTNERS

 * Channel Overview
 * Technology Integration Partners
 * Partner Program Information

BLOG

MORE

 * About Us
 * Contact Us
 * Newsroom
 * Events
 * Careers
 * Resources

 * Copyright ExtraHop Networks 2023
 * Terms of Use
 * Privacy Policy

 * Facebook
 * Twitter
 * LinkedIn
 * Instagram
 * YouTube







Close


suggested results