June 17, 2020 Upcoming WebinarsMITRE ATT&CK
Erika Noerenberg Matt Graeber Adam Pennington

ATT&CK® Deep Dive: Process Injection

In this live webinar, you’ll take a deep dive into Process Injection—the #1 most prevalent ATT&CK technique we observed over two years of investigative threat research.

  • Hear from experts at Red Canary, VMware Carbon Black, and MITRE ATT&CK
  • Learn how adversaries leverage the various forms of Process Injection across operating systems
  • Determine if you have the visibility to observe the technique in your environment
  • Explore analytics that can help your team reliably detect Process Injection

Process Injection encompasses a wide array of malicious behaviors that offer adversaries an inconspicuous method of evading defensive controls, elevating their privilege level, or otherwise executing arbitrary code. It’s so broad that in the next ATT&CK release, MITRE is recategorizing the technique into 11 sub-techniques.

As such, this is the perfect time for an in-depth, technical conversation exploring the ways that adversaries leverage Process Injection, what malicious process injection looks like, and how you can detect it.

Further reading: 

Matt Graeber
DIRECTOR OF RESEARCH, RED CANARY
Adam Pennington
MITRE ATT&CK
Erika Noeremberg
PRINCIPAL THREAT RESEARCHER, CARBON BLACK