Threat Analytics
MITRE ATT&CK framework-based threat detection and analysis
1211 Total Detections
5 Critical Techniques
7 Trending Up
11 Active Tactics
MITRE ATT&CK Tactics Overview
Detected Techniques
| ID | Technique | Tactic | Detections | Severity | Trend | Last Detected |
|---|---|---|---|---|---|---|
| T1566 | Phishing | Initial Access | 89 | HIGH | 2 hours ago | |
| T1059 | Command and Scripting Interpreter | Execution | 234 | CRITICAL | 15 minutes ago | |
| T1078 | Valid Accounts | Persistence | 156 | HIGH | 1 hour ago | |
| T1068 | Exploitation for Privilege Escalation | Privilege Escalation | 34 | CRITICAL | 30 minutes ago | |
| T1027 | Obfuscated Files or Information | Defense Evasion | 178 | MEDIUM | 3 hours ago | |
| T1003 | OS Credential Dumping | Credential Access | 67 | CRITICAL | 45 minutes ago | |
| T1083 | File and Directory Discovery | Discovery | 245 | LOW | 5 hours ago | |
| T1021 | Remote Services | Lateral Movement | 123 | HIGH | 1 hour ago | |
| T1119 | Automated Collection | Collection | 45 | MEDIUM | 4 hours ago | |
| T1048 | Exfiltration Over Alternative Protocol | Exfiltration | 28 | CRITICAL | 20 minutes ago | |
| T1486 | Data Encrypted for Impact | Impact | 12 | CRITICAL | 10 minutes ago |
Top Techniques
T1083 - File and Directory Discovery
T1059 - Command and Scripting Interpreter
T1027 - Obfuscated Files or Information
T1078 - Valid Accounts
T1021 - Remote Services
Tactic Distribution
Discovery245
Execution234
Defense Evasion178
Persistence156
Lateral Movement123