WELCOME
 

Welcome to this month's edition of the Atomic Newsletter, a monthly email with updates and news about Atomic Red Team™ and its related projects such as MITRE ATT&CK®Invoke-AtomicRedTeamAtomicTestHarnesses, and more. Check out the archive for previous editions, visit our website, chat with us on Slack and visit our new subreddit!

 
 
THE LATEST FROM ATOMIC RED TEAM
 
 

Brush up on Atomic Red Team at
WWHF @ Mile High
 
As the new year begins, it's a great time to start planning which cybersecurity conferences you'd like to attend, leveraging this fresh start to map out your professional development for the months ahead. If you’re based in Colorado, there's still time to register for Wild West Hackin' Fest @ Mile High. Looking to brush up on Atomic Red Team? Register for an in-person training class on either February 12 or 13 to get hands-on help building practical threat emulation capabilities.
ATOMIC IN THE WILD
 
 
Discovery vs. persistence
 
A blogger who regularly writes about testing SIEM detection with Atomic Red Team under the handle Raynard Waits had a handful of great blogs over the last month, including a two-part series on hunting for persistence techniques. This blog, about account discovery, walks through a threat hunt for three techniques T1087.001 #9 ,  T1069.001 #3 , and  T1018.001 #1 buried in over 1,200 process events. The big takeaway? Detection maturity varies wildly by technique category.
Automating the hunt
 
Sujal Chauhan, who blogs as CyberFreak on Medium, wrote about building a production-grade detection automation setup leveraging Elastic, Sigma, and Atomic Red Team. In this example,  convert_sigma.py reads Sigma rules, execute_atomic.py executes a LSASS dumping attack while other components verify and handle production.

Atomic Red Team → ELK pipeline
 
In this home detection lab writeup recently published to GitHub, Will Schmidt, a cybersecurity analyst who creates projects under the name MYRMIDON Security, shows how his lab can mirror SIEM triage workflows with a live simulation of attacks from Atomic Red Team and an independent Kali attack box, with telemetry fed into ELK Stack.
Top contributors
 
Congratulations to our top contributor this month, vl43den !
UPCOMING WEBINAR
 
 
Simplify cloud threat detection in complex environments
 
Effective cloud security requires both comprehensive insights into cloud resources and efficient threat detection to respond to risks quickly. Join this upcoming webinar to learn about some of the key challenges in securing dynamic cloud environments.



Atomic Red Team Logo.png
 
 
 
  Twitter   LinkedIn   GitHub   YouTube   Slack