Cyber CitadelCyber Citadel
Resources

MITRE ATT&CK Framework: 2024 Updates and Enhancements

Exploring the latest updates to the MITRE ATT&CK knowledge base and their practical implications for threat detection and response.

Back to Resources

Watch: MITRE ATT&CK Updates

The MITRE ATT&CK framework has become the de facto standard for understanding adversary behaviour, mapping threat intelligence, and evaluating the effectiveness of security controls. The 2024 releases, versions 14 and 15, have introduced substantial updates that reflect the rapidly evolving tactics, techniques, and procedures used by threat actors worldwide. This article provides a comprehensive overview of these changes and practical guidance for leveraging them in your security operations.

Overview of ATT&CK v14 and v15

MITRE ATT&CK v14, released in late 2023, brought significant expansions to the Enterprise, Mobile, and ICS matrices. The update added new techniques reflecting the increased sophistication of cloud-native attacks, refined sub-techniques for existing categories, and improved data source mappings that help defenders connect detection strategies to observable telemetry. Version 15, which followed in mid-2024, continued this trajectory with particular attention to emerging threats in identity-based attacks and adversary abuse of legitimate tools.

Together, these updates represent the ATT&CK knowledge base's ongoing maturation as both a threat intelligence repository and a practical operational tool. The additions are not merely academic; they reflect real-world attack campaigns observed by MITRE's extensive research network and contributions from the global security community.

New Techniques and Sub-Techniques

Among the most notable additions are techniques addressing adversary exploitation of cloud identity providers, abuse of platform-specific features in containerized environments, and sophisticated methods for evading modern endpoint detection and response solutions. The sub-technique structure, first introduced in ATT&CK v7, has been further refined to provide greater specificity without sacrificing the framework's usability.

Key new areas of coverage include:

  • Cloud Identity Attacks: Techniques for abusing single sign-on tokens, exploiting misconfigured OAuth applications, and leveraging federated identity providers for lateral movement across cloud environments.
  • Container Escape and Exploitation: New sub-techniques detailing how attackers break out of containerized workloads to access underlying host systems and orchestration platforms.
  • Defensive Evasion Enhancements: Updated techniques covering the abuse of legitimate system utilities, timestamp manipulation, and novel methods for disabling or circumventing security monitoring tools.
  • Data Source Refinements: Improved mappings between techniques and observable data sources, enabling more precise detection rule authoring.

The strength of ATT&CK lies not in its completeness as a catalogue of every possible attack, but in its utility as a common language that bridges the gap between threat intelligence, detection engineering, and incident response.

Practical Applications for Threat Detection

Organizations using ATT&CK for threat detection should treat each framework update as an opportunity to review and enhance their detection coverage. The updated data source mappings in v14 and v15 are particularly valuable for this exercise. By mapping your current detection rules against the framework, you can identify coverage gaps and prioritise new detections based on the techniques most relevant to your threat landscape.

Security operations centres (SOCs) can leverage the framework to structure their detection engineering efforts around specific adversary profiles. By identifying which threat groups are most likely to target your industry and understanding their preferred techniques, you can build targeted detection playbooks that maximise the effectiveness of your monitoring investment. The framework's group profiles, which map known adversary groups to their observed techniques, provide a ready-made starting point for this threat-informed defence approach.

The MITRE ATT&CK Navigator

The MITRE ATT&CK Navigator is a web tool that provides basic navigation and annotation of ATT&CK matrices. It can be used to visualize defensive coverage, plan attack simulations for red-team exercises, develop defensive strategies for blue-team operations, and monitor the frequency of detected techniques. Security analysts, incident responders, and threat intelligence researchers can filter by Enterprise, Mobile, or ICS domains, and by platform, OS, and threat actors.

Using ATT&CK in Your Organization

To get the most value from the MITRE ATT&CK framework, organizations should use it as a lens for evaluating their current security posture. Start by asking these critical questions:

  • What methods are threat actors using for initial access, lateral movement, and exfiltration?
  • Which attack TTPs is your organization robustly defended against?
  • Where are the gaps in defenses?
  • Are these gaps in prevention, detection, or mitigation?

Answering these questions using the ATT&CK framework as a reference provides a structured, evidence-based approach to identifying and prioritising security improvements across your organization.

Integrating ATT&CK into Security Operations

Beyond detection, ATT&CK serves as a valuable tool for red team planning, security assessment scoping, and incident response. Red teams can use the framework to design realistic attack simulations that test specific defensive capabilities. During incident response, ATT&CK provides a structured approach for mapping observed attacker behaviour, predicting likely next steps, and ensuring comprehensive containment and eradication.

Many security platforms and SIEM solutions now provide native ATT&CK integration, allowing analysts to tag detections and incidents with framework references automatically. This integration enables powerful analytics, such as heatmaps showing your detection coverage across the ATT&CK matrix, trend analysis of the techniques most commonly seen in your environment, and gap analysis reports that feed directly into security improvement plans.

At Cyber Citadel, our threat intelligence and SOC-as-a-Service offerings are built on ATT&CK-aligned methodologies. We help organizations map their existing controls to the framework, identify critical detection gaps, and implement targeted improvements that address the most relevant threats to their specific environment and industry.

Contact Cyber Citadel for a free consultation on how your business can best implement the MITRE ATT&CK framework. Cyber Citadel can also provide red-teaming exercises to simulate a cyber attack using the MITRE ATT&CK framework to test your organization's defenses.

Ready to protect your company and launch your SOC-as-a-Service?