All Things MITRE
State-Sponsored Threat Actors
Famous Attacks
Attack Types
Threat Actor Motives
100

What does TTP stand for? Bonus points: Explain the difference between them.

Tactics - High level objective or goal

Techniques - specific methods/actions used

Procedures- Detailed step-by-step process

100

What does Microsoft name new Russia Cyber Threat Actors?

Blizzard + "Motive"

100

What cyber threat actor(s) were responsible for the famous MGM breach last year? Hint: We talked about this on the DE podcast.

Scattered Spider & ALPHV/BlackCat

100

In the past 2 years, which cyber attack type has been the most popular?

Ransomware

100

What is the motive behind a cryptojacking attack?

Financial gain

200

What is the difference between a T1592 and a T1592.002?

Technique - sub technique 

200

What are typical motives of China-linked Cyber Threat Actors?

Cyber Espionage and/or Financial gain

200

How many times has AT&T been cyber attacked within the past year?

2 (known) attacks
200

What attack type is related to our ATO services at DE?

Data Breach

200

What motive falls under Data Breach attacks, but not Ransomware attacks?

Information Theft

300

How many tactics are included in the MITRE ATT&CK framework?

14

300

What was the latest cyber attack attributed to APT 29?

TeamViewer

300

How many companies were affected by the recent Snowflake breach?

100+

300

What malware attack recently became popular due to its use of emojis? Bonus points: What were the emojis used for?

Disgomoji

C2 communication in discord

300

What threat actor has been conducting an ongoing Cyber Espionage campaign on the US utilizing living-off-the-land techniques?

Volt Typhoon

400

What MITRE ATT&CK tactic is aligned with scheduled tasks?

Persistence 

400

What Country-linked cyber threat actors employs cryptojacking the most?

North Korea

400

What supermassive breach revealed 26 billion records due to a "firewall misconfiguration" this year?

MOAB (Mother of all Breaches)

400

How much Bitcoin did AT&T pay to ShinyHunters for deleting stolen customer data?

5.7 bitcoin

400

What motivation is it called when threat actors cause the most chaos?

Disruption

500

Why are "phishing" and "phishing for Information" under different tactic types? Bonus: What categories do they fall under?

Phishing for information (Reconnaissance) - Attempt to trick targets into divulging information,  frequently credentials or other actionable information that can be used in more targeted attacks.

Phishing (initial access) - Adversaries may send victims emails (gathered by phishing for information) containing malicious attachments or links, typically to execute malicious code on victim systems. 

500

What Countries have put cyber security sanctions on Iran?

United Kingdom

United States

EU

Canada

500

What attack was dubbed the "largest attack in internet history" and subsequently caused the said company to mitigate 71 million requests-per-second? Hint: this took place in the second half of 2023

HTTP/2 Rapid Reset - Cloudfare

500

List atleast 3 mitigations to DDoS attacks

Traffic filtering / rate limiting

Traffic scrubbing / cleaning centers

Cloud based DDoS protection

Network segmentation and Redundancy

Application layer protection

500

What are 10 different types of hackers? 

White hat

Black hat

Gray hat

Script Kiddies

Green hat

Blue hat

Red hat

Hacktivist

State Hackers

Whistleblowers

M
e
n
u