ioc.exchange is one of the many independent Mastodon servers you can use to participate in the fediverse.
INDICATORS OF COMPROMISE (IOC) InfoSec Community within the Fediverse. Newbies, experts, gurus - Everyone is Welcome! Instance is supposed to be fast and secure.

Administered by:

Server stats:

1.6K
active users

#att

3 posts3 participants0 posts today
Someone asked me to compare and contrast ATT&CK and FiGHT matrices...
It's probably wise to consider their respective scopes. ATT&CK describes threats that affect typical enterprise networks whereas FiGHT is dedicated to the equipment that can be found in a typical mobile carrier. This results in a disparity in the relative availability and quality of data from which each is sourced. There is a significant amount of knowledge that exists publicly about enterprises being breached whereas, not only are there less organisations in the mobile carrier bracket but there is also less public disclosure when their assets are affected. The result is that whilst ATT&CK demands evidence in the form of public TI, FiGHT necessarily takes a more speculative approach and new threats can be introduced without need for citable examples in the wild.
We tend to start with ATT&CK even when we're mapping SP networks since the reality is that most mobile carriers are also enterprises and most SPs still need to protect their Windows, Linux and Networking assets against known threats (witness the Salt Typhoon reporting etc) even before they worry about the speculative threats in FiGHT. That's not to say we don't consider mobile specific threats but in many cases, ATT&CK does a sufficient job of describing them such that a specialist such as myself can make the link between the generalised case in ATT&CK and what a more specific version of a threat targetting an SP might look like. As an example, the threat models we produced for stc and others are based on ATT&CK but included consideration for threats targetting assets providing/using SS7, GTP, HLR, VLR etc. The fact is that a breach of the packet core of a mobile carrier is likely to stem from things like weak passwords, missing patches or poor configuration etc, threats that ATT&CK is more than capable of describing.
As far as customer adoption, I'd say start with ATT&CK and worry about FiGHT later. If you're building a SOC, you will get high quality signals from things like firewalls/EDR/OS logs etc if you hunt for things in ATT&CK whereas try the same with FiGHT and it may be a time consuming and ultimately unsuccessful endeavour.
#att&ck, #fight, #threatmodelling

"In 2006, a retired AT&T engineer knocked on the door of the EFF's office in a rundown part of San Francisco's Mission district and asked, "Do you folks care about privacy?" With him he carried schematics exposing the largest US government domestic spying operation since Watergate.

That person was Mark Klein, who died on March 8 this year from cancer. He was 79.

After a life working in telecoms, Klein realized he had helped the NSA wire up a listening station in AT&T's San Francisco switching facility - the infamous Room 641A - that was being used to illegally spy on Americans.

The evidence he gathered and shared led to two lawsuits that exposed the extent to which US citizens were being spied on by their own government in the post-9/11 world. Klein faced legal pressure, death threats, and the constant fear of ruin, to get his story out and tell the public what was going on. But Klein regretted nothing."

theregister.com/2025/03/15/rip

The Register · RIP Mark Klein, the engineer who exposed US domestic spying ops after wiring it upBy Iain Thomson

In Memoriam: Mark Klein, AT&T Whistleblower Who Revealed NSA Mass Spying

[W]hat Mark told us changed everything. Through his work, Mark had learned that the National Security Agency (NSA) had installed a secret, secure room at AT&T’s central office in San Francisco, called Room 641A. Mark was assigned to connect circuits carrying Internet data to optical “splitters” that sat just outside of the secret NSA room but were hardwired into it. Those splitters—as well as similar ones in cities around the U.S.—made a copy of all data going through those circuits and delivered it into the secret room.

eff.org/deeplinks/2025/03/memo

Klein provided one of the pre-Snowden disclosures of massive communications surveillance in the United States. I'd included him in an earlier toot from May 2021: toot.cat/@dredmorbius/10625139

His story also demonstrates that "surveillance state" and "surveillance capitalism" aren't separate things, but part of the same larger surveillance octopus.

Electronic Frontier Foundation · In Memoriam: Mark Klein, AT&T Whistleblower Who Revealed NSA Mass SpyingEFF is deeply saddened to learn of the passing of Mark Klein, a bona fide hero who risked civil liability and criminal prosecution to help expose a massive spying program that violated the rights of millions of Americans.Mark didn’t set out to change the world. For 22 years, he was a...

AT&T Reduziert DEI-Programme: Veränderungen und Hintergründe
AT&T hat bedeutende Änderungen an seinen Diversitäts-, Gleichstellungs- und Inklusionsprogrammen (DEI)vorgenommen. Das Unternehmen beendet bestimmte LGBTQ+-freu
apfeltalk.de/magazin/news/att-
#News #Tellerrand #ATT #DEI #Diversitt #FederalCommunicationsCommission #Gleichstellung #Inklusion #LGBTQ #Lieferantenprogramm #Stipendien #Trump #Unternehmensstrategie