A threat intelligence challenge focused on operationalizing the MITRE ATT&CK framework. Rather than log analysis or malware triage, this lab tests your ability to navigate the ATT&CK matrix and extract actionable intelligence — mapping techniques, identifying threat actors, and understanding detection strategies.
When an attacker obtains valid credentials to a cloud environment like Azure AD or Office 365, they can perform Discovery without touching any API. The relevant technique is T1538 — Cloud Service Dashboard, which covers adversaries using the cloud service’s web GUI directly to enumerate the environment. Since the hint specifies no API interaction, this rules out techniques like T1526 (Cloud Service Discovery via API calls) and points squarely at the browser-based dashboard approach.
Mitigation: enforce MFA, restrict access to administrative portals, and implement Conditional Access policies to detect anomalous login locations or devices.
Observing unusual C2 traffic on port 4050 is a fingerprint for G0099 — APT-C-36 (also known as Blind Eagle), a suspected South American espionage group primarily targeting Colombian government institutions and financial sector corporations. This group is documented under T1571 — Non-Standard Port, using port 4050 for C2 communications to blend into legitimate traffic and evade port-based filtering.
The tactic covering methods an attacker uses to get into your network is TA0001 — Initial Access. The framework documents exactly 9 techniques under this tactic:
The software documented by the framework that prohibits users from accessing their accounts via deletion, lockout, or password changes is S0372 — LockerGoga. This ransomware strain is documented under T1531 (Account Access Removal) for its behavior of changing account passwords and forcibly logging off users prior to encryption — preventing incident responders from accessing systems during the attack.
Pass the Hash (T1550.002) allows attackers to authenticate using captured NTLM hashes without knowing the plaintext password, enabling lateral movement across a network. Per the MITRE ATT&CK framework’s detection guidance, the recommended approach is to monitor newly created logons and credentials used in events and review for discrepancies — specifically looking for NTLM Type 3 network logons that don’t align with expected user behaviour or authentication patterns.
Key Windows Event IDs to monitor: