Home

Published

- 8 min read

What is new in the MITRE ATT&CK v18 Update

img of What is new in the MITRE ATT&CK v18 Update

The MITRE ATT&CK framework is our universal translator, our common language for understanding the adversary. It’s the bedrock of modern threat-informed defense, and when it evolves, every security professional needs to pay close attention. The release of ATT&CK v18 on October 28, 2025, is not just another incremental update. It’s a shift in how we operationalize threat intelligence, promising to reshape detection engineering and sharpen our focus on the real-world behaviors of attackers. Understanding this framework is essential for anyone implementing modern threat detection and response strategies.

This latest version moves beyond simply cataloging what adversaries do, and drills down into the critical question of how we can detect them. It introduces a transformative overhaul to the defensive side of the framework, retiring familiar concepts and ushering in a more structured, actionable, and behavior-driven model. For Security Operations Centers (SOCs), threat hunters, and intelligence analysts, ATT&CK v18 isn’t just new data—it’s a new and far more powerful lens through which to view and counter cyber threats. The message from MITRE is clear: static defenses are no longer enough; the future is about dynamic, intelligence-driven detection.

What to Remember

  • Detection Overhaul: The most significant change is the replacement of old “Detections” and “Data Sources” with new “Detection Strategies” and “Analytics”. This provides structured, behavior-focused blueprints for threat detection.
  • Actionable Analytics: New platform-specific “Analytics” bridge the gap between high-level threat intelligence and practical, real-world telemetry, telling defenders exactly where to look.
  • Expanded Horizons: The framework broadens its coverage to include new techniques targeting modern infrastructure like Kubernetes, CI/CD pipelines, and cloud databases.
  • Mobile and ICS Get Sharper: Significant updates to the Mobile and Industrial Control Systems (ICS) matrices reflect the growing threat to these critical domains.

MITRE ATT&CK v18 Update

The Revolution in Detection: Introducing Strategies and Analytics

The headline feature of ATT&CK v18 is undoubtedly the complete renovation of its defensive guidance. For years, the “Detection” section for each technique provided valuable but often high-level advice. MITRE has now replaced this with two powerful new STIX objects: Detection Strategies and Analytics. This isn’t just a change in terminology; it’s a fundamental restructuring designed to align directly with the workflow of modern detection engineering.

Detection Strategies serve as the conceptual blueprint. Instead of a simple descriptive paragraph, each strategy outlines the specific adversary behavior to be monitored and maps it to the underlying data sources and components required. It provides a high-level, structured methodology for understanding how to spot a specific malicious action.

The true game-changer, however, is the introduction of Analytics. These are platform-specific, telemetry-aware guides that provide concrete, actionable detection logic. Where guidance was once generic, an Analytic might now provide specific queries or logic for detecting a technique on Windows using Sysmon event logs versus detecting it in a Linux environment via auditd. This crucial link between the what (the adversary’s technique) and the how (the specific data to look for on a given platform) makes the framework immensely more practical for frontline defenders.

This shift from a static catalog to a dynamic, behavior-driven model allows security teams to:

  • Enhance Detection Precision: By correlating specific telemetry with adversary behaviors, SOCs can reduce ambiguity and build more robust detection rules.
  • Improve Cross-Tactic Correlation: The new structure makes it easier to see how adversary movements chain together, especially across tactics like Execution and Persistence where telemetry often overlaps.
  • Streamline Threat Hunting: Hunters can now start with a high-level Detection Strategy and drill down into specific Analytics to build out hypotheses and queries tailored to their environment.

Expanding the Battlefield: New Techniques for Enterprise, Mobile, and ICS

ATT&CK v18 reflects the relentless innovation of our adversaries by significantly expanding its coverage across all domains. The framework now includes 12 new techniques, ensuring it remains current with modern attack vectors.

For the Enterprise, the focus is squarely on the complex, hybrid environments that define modern IT. New techniques have been added to cover attacks against:

  • CI/CD Pipelines and Kubernetes: Acknowledging that the infrastructure of modern development is now a prime target. Securing these systems requires a comprehensive supply chain security approach and understanding modern cloud threats.
  • Cloud Databases and Virtualization: Addressing abuse of cloud identity and attacks on edge and virtualization systems.
  • Ransomware Preparation: The framework now includes behaviors that are precursors to ransomware deployment, allowing for earlier detection.

The Mobile matrix also sees crucial updates. In response to real-world threats, there is now coverage for adversaries abusing the “linked devices” functionality in secure messaging apps like Signal and WhatsApp. Furthermore, the “Abuse Accessibility Features” technique has been reinstated, reflecting its continued relevance in mobile malware campaigns.

In the critical realm of Industrial Control Systems (ICS), v18 introduces new “Assets” to better represent the physical and logical devices in these environments. New definitions for Distributed Control System (DCS) controllers, firewalls, and switches have been added, providing greater clarity and helping to map adversary techniques to the specific equipment being targeted.

Fresh Intelligence: New Threat Groups and Campaigns

A framework is only as good as the intelligence that fuels it. ATT&CK v18 incorporates a wealth of new Cyber Threat Intelligence (CTI), cataloging new adversary groups, software, and campaigns. The update features six new threat groups and 29 new software tools, with a focus on operations tied to:

  • Supply Chain Compromises: Reflecting the systemic risk posed by attacks like SolarWinds. These vulnerabilities highlight the importance of understanding software supply chain security and dependency risk management.
  • Cloud Identity Abuse: Highlighting the shift toward targeting cloud credentials and services.
  • Geopolitical Operations: Including expanded content on campaigns attributed to state-sponsored actors.

This continuous infusion of fresh, real-world intelligence ensures that security teams are not just defending against theoretical threats, but are aligning their controls with the observed actions of the most relevant and active adversaries.

Putting ATT&CK v18 into Practice

The release of v18 is a call to action for security leaders and practitioners. To capitalize on these advancements, organizations should:

  1. Educate and Socialize: Familiarize your security teams, from junior analysts to senior threat hunters, with the new detection model. Understanding the relationship between Techniques, Detection Strategies, and Analytics is crucial.
  2. Update Your Tools: Engage with your security vendors to understand how they are incorporating v18 into their platforms. Tools like SIEMs, SOARs, and Breach and Attack Simulation (BAS) platforms that are mapped to ATT&CK will need to be updated.
  3. Refine Detection and Hunting Playbooks: Use the new Analytics to review and enhance your existing detection rules and threat hunting playbooks. Prioritize gaps in your telemetry based on the newly defined Log Sources and Data Components.
  4. Enhance Adversary Emulation: Update your adversary emulation and purple teaming plans to include the new techniques, especially those relevant to your cloud, mobile, and ICS environments.

Conclusion: The Future of Threat-Informed Defense is Here

MITRE ATT&CK v18 may transform its defensive guidance into a modular, behavior-centric system, MITRE has provided the cybersecurity community with a more powerful and practical tool to counter modern threats. It bridges the gap between intelligence and action, providing a clear path from observing an adversary’s behavior to implementing a specific, platform-aware detection. As adversaries continue to adapt their methods to exploit our expanding digital footprint, the clarity, precision, and actionable intelligence offered by ATT&CK v18 will be indispensable in the fight to stay ahead.

Frequently Asked Questions (FAQ)

What is the biggest change in MITRE ATT&CK v18?

The most significant change is the overhaul of the defensive framework, replacing the old "Detection" fields with two new, more structured objects: "Detection Strategies" and platform-specific "Analytics". This creates a clearer, more actionable path from adversary behavior to the specific telemetry needed for detection.

Why did MITRE make this change to detections?

MITRE evolved the framework to better reflect how defenders actually work. The goal was to create modular, behavior-first blueprints that are less ambiguous and more scalable, directly addressing the diversity of platforms and log sources in modern environments.

How can my security team start using ATT&CK v18?

Begin by training your team on the new Detection Strategy and Analytics model. Then, review your existing detection rules and threat hunting playbooks against the new Analytics to identify gaps. Use the expanded Enterprise, Mobile, and ICS techniques to update your threat models and adversary emulation plans.

When was ATT&CK v18 released?

The MITRE ATT&CK v18 update was officially released in October 2025.

Who benefits from the ATT&CK v18 update?

The entire cybersecurity community benefits, but specifically Security Operations Center SOC analysts, detection engineers, threat hunters, and threat intelligence teams will find the new structured detection guidance immediately valuable for improving the precision and efficacy of their work.

Resources

  • Official MITRE ATT&CK Website
  • ATT&CK v18 Release Blog
  • ATT&CK v18 Changelog
  • ATT&CK Navigator

William OGOU

William OGOU

Need help implementing Zero Trust strategy or securing your cloud infrastructure? I help organizations build resilient, compliance-ready security architectures.