Updates - April 2026
The April 2026 (v19) ATT&CK release updates Techniques, Groups, Campaigns and Software for Enterprise, Mobile, and ICS.
The biggest changes in ATT&CK v19 are the split of the Defense Evasion Tactic in Enterprise ATT&CK into the Stealth and Defense Impairment Tactics, the addition of Sub-Techniques to ICS ATT&CK, and the beginnings of Detection Strategies in Mobile ATT&CK. A post describing the rationale behind the Defense Evasion split was published to ATT&CK's Blog in March, and an accompanying blog post describes final details of the split, contains guidance for transitioning to the new Tactics, and details changes across the entire ATT&CK release.
This release also includes a human-readable detailed changelog showing more specifically what changed in updated ATT&CK objects, and a machine-readable JSON changelog, whose format is described in ATT&CK's Github.
This version of ATT&CK contains 949 Pieces of Software, 178 Groups, and 59 Campaigns.
Broken out by domain:
- Enterprise: 15 Tactics, 222 Techniques, 475 Sub-Techniques, 174 Groups, 821 Pieces of Software, 56 Campaigns, 44 Mitigations, 697 Detection Strategies, 1758 Analytics, and 106 Data Components
- Mobile: 12 Tactics, 77 Techniques, 47 Sub-Techniques, 20 Groups, 126 Pieces of Software, 3 Campaigns, 13 Mitigations, 124 Detection Strategies, 211 Analytics, and 29 Data Components
- ICS: 12 Tactics, 79 Techniques, 18 Sub-Techniques, 14 Groups, 23 Pieces of Software, 8 Campaigns, 52 Mitigations, 18 Assets, 97 Detection Strategies, 96 Analytics, and 36 Data Components
- New objects: ATT&CK objects which are only present in the new release.
- Major version changes: ATT&CK objects that have a major version change. (e.g. 1.0 → 2.0)
- Minor version changes: ATT&CK objects that have a minor version change. (e.g. 1.0 → 1.1)
- Other version changes: ATT&CK objects that have a version change of any other kind. (e.g. 1.0 → 1.2)
- Patches: ATT&CK objects that have been patched while keeping the version the same. (e.g., 1.0 → 1.0 but something like a typo, a URL, or some metadata was fixed)
- Object revocations: ATT&CK objects which are revoked by a different object.
- Object deprecations: ATT&CK objects which are deprecated and no longer in use, and not replaced.
- Object deletions: ATT&CK objects which are no longer found in the STIX data.
- Block Command Message (revoked by Block Operational Technology Message: Command Message) (v1.1)
- Block Reporting Message (revoked by Block Operational Technology Message: Reporting Message) (v1.0)
- Block Serial COM (revoked by Block Communications: Serial COM) (v1.1)
- Default Credentials (revoked by Insecure Credentials: Default Credentials) (v1.0)
- Hardcoded Credentials (revoked by Insecure Credentials: Hardcoded Credentials) (v1.0)
- Module Firmware (revoked by Modify Firmware: Module Firmware) (v1.1)
- Spoof Reporting Message (revoked by Unauthorized Message: Reporting Message) (v1.2)
- System Firmware (revoked by Modify Firmware: System Firmware) (v1.1)
- Unauthorized Command Message (revoked by Unauthorized Message: Command Message) (v1.2)
- Application Log Content (v2.0→v3.0)
- Cloud Service Enumeration (v2.0→v3.0)
- File Access (v2.0→v3.0)
- File Creation (v2.0→v3.0)
- File Deletion (v2.0→v3.0)
- File Modification (v2.0→v3.0)
- Module Load (v2.0→v3.0)
- Process Access (v2.0→v3.0)
- Scheduled Job Creation (v2.0→v3.0)
- User Account Authentication (v2.0→v3.0)
- Command Execution (v2.0→v2.1)
- Driver Metadata (v2.0→v2.1)
- File Metadata (v2.0→v2.1)
- Group Enumeration (v2.0→v2.1)
- Host Status (v2.0→v2.1)
- Instance Modification (v2.0→v2.1)
- Network Connection Creation (v2.0→v2.1)
- Network Traffic Content (v2.0→v2.1)
- Network Traffic Flow (v2.0→v2.1)
- OS API Execution (v2.0→v2.1)
- Process Creation (v2.0→v2.1)
- Process Metadata (v2.0→v2.1)
- Service Modification (v2.0→v2.1)
- User Account Metadata (v2.0→v2.1)
- Service Metadata (v2.0)
- Windows Registry Key Modification (v2.0)
- Application Log Content (v3.0)
- Application State (v1.0)
- Cloud Service Enumeration (v3.0)
- File Access (v3.0)
- File Creation (v3.0)
- File Deletion (v3.0)
- File Metadata (v2.1)
- File Modification (v3.0)
- Module Load (v3.0)
- Process Access (v3.0)
- Scheduled Job Creation (v3.0)
- User Account Authentication (v3.0)
- API Calls (v2.0→v2.1)
- Application Assets (v2.0→v2.1)
- Application Permission (v2.0→v2.1)
- Command Execution (v2.0→v2.1)
- Host Status (v2.0→v2.1)
- Network Communication (v2.0→v2.1)
- Network Connection Creation (v2.0→v2.1)
- Network Traffic Content (v2.0→v2.1)
- Network Traffic Flow (v2.0→v2.1)
- OS API Execution (v2.0→v2.1)
- Process Creation (v2.0→v2.1)
- Process Metadata (v2.0→v2.1)
- Protected Configuration (v2.0→v2.1)
- System Notifications (v2.0→v2.1)
- System Settings (v2.0→v2.1)
- Application Log Content (v2.0→v3.0)
- File Access (v2.0→v3.0)
- File Creation (v2.0→v3.0)
- File Deletion (v2.0→v3.0)
- File Modification (v2.0→v3.0)
- Module Load (v2.0→v3.0)
- Scheduled Job Creation (v2.0→v3.0)
- User Account Authentication (v2.0→v3.0)
- Command Execution (v2.0→v2.1)
- File Metadata (v2.0→v2.1)
- Network Connection Creation (v2.0→v2.1)
- Network Traffic Content (v2.0→v2.1)
- Network Traffic Flow (v2.0→v2.1)
- OS API Execution (v2.0→v2.1)
- Process Creation (v2.0→v2.1)
- Process History/Live Data (v2.0→v2.1)
- Process Metadata (v2.0→v2.1)
- Process/Event Alarm (v2.0→v2.1)
- Service Modification (v2.0→v2.1)
- Service Metadata (v2.0)
- Windows Registry Key Modification (v2.0)
- Alberto Garcia
- Alex Soler, AttackIQ
- Alex Wong
- Arad Inbar, Fidelis Security
- Arun Seelagan, CISA
- Austin Clark, @c2defense
- Blake Strom, Microsoft Threat Intelligence
- Caio Silva
- Cian Heasley
- Contributor: Dominik Breitenbacher, ESET
- Daniel Feichter, @VirtualAllocEx, Infosec Tirol
- Dominik Breitenbacher, ESET
- Dongwook Kim, KISA
- Dragos Threat Intelligence
- Emile Kenning, Sophos
- Expel
- Gal Singer, @galsinger29, Team Nautilus Aqua Security
- Gilberto Pérez
- Gordon Long, LegioX/Zoom, asaurusrex
- Ibrahim Ali Khan
- Jaesang Oh, KC7 Foundation
- Janantha Marasinghe
- Joe Gumke, U.S. Bank
- Jorell Magtibay, National Australia Bank Limited
- Kiyohito Yamamoto, RedLark, NTT Communications
- Kyaw Pyiyt Htet (@KyawPyiytHtet)
- Lab52 by S2 Grupo
- Liran Ravich, CardinalOps
- Lucas Heiligenstein
- Manikantan Srinivasan, NEC Corporation India
- Marco Pedrinazzi, @pedrinazziM, InTheCyber
- Matt Snyder, VMware
- Mayuresh Dani, Qualys
- Menachem Goldstein
- Nathaniel Quist, Palo Alto Networks
- Nay Myo Hlaing (Ethan), DBS Bank
- Patrick Mkhael (aka Pinguino)
- Pawel Partyka, Microsoft Threat Intelligence
- Pedro Rodriguez
- Pooja Natarajan, NEC Corporation India
- Prasad Somasamudram, McAfee
- Prasanth Sadanala, Cigna Information Protection (CIP) - Threat Response Engineering Team
- Rich Rafferty (NR Labs)
- Rob Smith
- Sarathkumar Rajendran, Microsoft Defender365
- Sekhar Sarukkai, McAfee
- Serhii Melnyk
- SeungYoul Yoo, AhnLab
- Stijn Geerts
- Syed Ummar Farooqh, McAfee
- Taewoo Lee, KISA
- Takemasa Kamatani , NEC Corporation
- Tim (Wadhwa-)Brown
- Tommaso Tosi, @tosto92, InTheCyber
- Uriel Kosayev
- Vikas Singh, Sophos
- Víctor Alba
- Wai Linn Oo, Kernellix Co.,Ltd.
- Wietze Beukema @Wietze
- Yusuke Kubo, RedLark, NTT Communications
- Ziv Karliner, @ziv_kr, Team Nautilus Aqua Security