Updates - April 2026

Version Start Date End Date Data Changelogs
ATT&CK v19 April 28, 2026 Current version of ATT&CK v19.0 on MITRE/CTI 18.1 - 19.0 Details (JSON)

The April 2026 (v19) ATT&CK release updates Techniques, Groups, Campaigns and Software for Enterprise, Mobile, and ICS.

The biggest changes in ATT&CK v19 are the split of the Defense Evasion Tactic in Enterprise ATT&CK into the Stealth and Defense Impairment Tactics, the addition of Sub-Techniques to ICS ATT&CK, and the beginnings of Detection Strategies in Mobile ATT&CK. A post describing the rationale behind the Defense Evasion split was published to ATT&CK's Blog in March, and an accompanying blog post describes final details of the split, contains guidance for transitioning to the new Tactics, and details changes across the entire ATT&CK release.

This release also includes a human-readable detailed changelog showing more specifically what changed in updated ATT&CK objects, and a machine-readable JSON changelog, whose format is described in ATT&CK's Github.

This version of ATT&CK contains 949 Pieces of Software, 178 Groups, and 59 Campaigns.

Broken out by domain:

  • Enterprise: 15 Tactics, 222 Techniques, 475 Sub-Techniques, 174 Groups, 821 Pieces of Software, 56 Campaigns, 44 Mitigations, 697 Detection Strategies, 1758 Analytics, and 106 Data Components
  • Mobile: 12 Tactics, 77 Techniques, 47 Sub-Techniques, 20 Groups, 126 Pieces of Software, 3 Campaigns, 13 Mitigations, 124 Detection Strategies, 211 Analytics, and 29 Data Components
  • ICS: 12 Tactics, 79 Techniques, 18 Sub-Techniques, 14 Groups, 23 Pieces of Software, 8 Campaigns, 52 Mitigations, 18 Assets, 97 Detection Strategies, 96 Analytics, and 36 Data Components

Release Notes Terminology

  • New objects: ATT&CK objects which are only present in the new release.
  • Major version changes: ATT&CK objects that have a major version change. (e.g. 1.0 → 2.0)
  • Minor version changes: ATT&CK objects that have a minor version change. (e.g. 1.0 → 1.1)
  • Other version changes: ATT&CK objects that have a version change of any other kind. (e.g. 1.0 → 1.2)
  • Patches: ATT&CK objects that have been patched while keeping the version the same. (e.g., 1.0 → 1.0 but something like a typo, a URL, or some metadata was fixed)
  • Object revocations: ATT&CK objects which are revoked by a different object.
  • Object deprecations: ATT&CK objects which are deprecated and no longer in use, and not replaced.
  • Object deletions: ATT&CK objects which are no longer found in the STIX data.

Table of Contents

Techniques

Enterprise

New Techniques

Major Version Changes

Minor Version Changes

Patches

Revocations

Mobile

Minor Version Changes

ICS

New Techniques

Minor Version Changes

Patches

Revocations

  • Block Command Message (revoked by Block Operational Technology Message: Command Message) (v1.1)
  • Block Reporting Message (revoked by Block Operational Technology Message: Reporting Message) (v1.0)
  • Block Serial COM (revoked by Block Communications: Serial COM) (v1.1)
  • Default Credentials (revoked by Insecure Credentials: Default Credentials) (v1.0)
  • Hardcoded Credentials (revoked by Insecure Credentials: Hardcoded Credentials) (v1.0)
  • Module Firmware (revoked by Modify Firmware: Module Firmware) (v1.1)
  • Spoof Reporting Message (revoked by Unauthorized Message: Reporting Message) (v1.2)
  • System Firmware (revoked by Modify Firmware: System Firmware) (v1.1)
  • Unauthorized Command Message (revoked by Unauthorized Message: Command Message) (v1.2)

Software

Enterprise

New Software

Major Version Changes

Minor Version Changes

Patches

Mobile

New Software

ICS

Minor Version Changes

Groups

Enterprise

New Groups

Major Version Changes

Minor Version Changes

Patches

Mobile

New Groups

Major Version Changes

Minor Version Changes

ICS

Minor Version Changes

Patches

Campaigns

Enterprise

New Campaigns

Minor Version Changes

Patches

ICS

New Campaigns

Minor Version Changes

Assets

ICS

Minor Version Changes

Mitigations

Enterprise

Patches

ICS

Minor Version Changes

Data Components

Enterprise

Major Version Changes

  • Application Log Content (v2.0→v3.0)
  • Cloud Service Enumeration (v2.0→v3.0)
  • File Access (v2.0→v3.0)
  • File Creation (v2.0→v3.0)
  • File Deletion (v2.0→v3.0)
  • File Modification (v2.0→v3.0)
  • Module Load (v2.0→v3.0)
  • Process Access (v2.0→v3.0)
  • Scheduled Job Creation (v2.0→v3.0)
  • User Account Authentication (v2.0→v3.0)

Minor Version Changes

  • Command Execution (v2.0→v2.1)
  • Driver Metadata (v2.0→v2.1)
  • File Metadata (v2.0→v2.1)
  • Group Enumeration (v2.0→v2.1)
  • Host Status (v2.0→v2.1)
  • Instance Modification (v2.0→v2.1)
  • Network Connection Creation (v2.0→v2.1)
  • Network Traffic Content (v2.0→v2.1)
  • Network Traffic Flow (v2.0→v2.1)
  • OS API Execution (v2.0→v2.1)
  • Process Creation (v2.0→v2.1)
  • Process Metadata (v2.0→v2.1)
  • Service Modification (v2.0→v2.1)
  • User Account Metadata (v2.0→v2.1)

Patches

  • Service Metadata (v2.0)
  • Windows Registry Key Modification (v2.0)

Mobile

New Data Components

  • Application Log Content (v3.0)
  • Application State (v1.0)
  • Cloud Service Enumeration (v3.0)
  • File Access (v3.0)
  • File Creation (v3.0)
  • File Deletion (v3.0)
  • File Metadata (v2.1)
  • File Modification (v3.0)
  • Module Load (v3.0)
  • Process Access (v3.0)
  • Scheduled Job Creation (v3.0)
  • User Account Authentication (v3.0)

Minor Version Changes

  • API Calls (v2.0→v2.1)
  • Application Assets (v2.0→v2.1)
  • Application Permission (v2.0→v2.1)
  • Command Execution (v2.0→v2.1)
  • Host Status (v2.0→v2.1)
  • Network Communication (v2.0→v2.1)
  • Network Connection Creation (v2.0→v2.1)
  • Network Traffic Content (v2.0→v2.1)
  • Network Traffic Flow (v2.0→v2.1)
  • OS API Execution (v2.0→v2.1)
  • Process Creation (v2.0→v2.1)
  • Process Metadata (v2.0→v2.1)
  • Protected Configuration (v2.0→v2.1)
  • System Notifications (v2.0→v2.1)
  • System Settings (v2.0→v2.1)

ICS

Major Version Changes

  • Application Log Content (v2.0→v3.0)
  • File Access (v2.0→v3.0)
  • File Creation (v2.0→v3.0)
  • File Deletion (v2.0→v3.0)
  • File Modification (v2.0→v3.0)
  • Module Load (v2.0→v3.0)
  • Scheduled Job Creation (v2.0→v3.0)
  • User Account Authentication (v2.0→v3.0)

Minor Version Changes

  • Command Execution (v2.0→v2.1)
  • File Metadata (v2.0→v2.1)
  • Network Connection Creation (v2.0→v2.1)
  • Network Traffic Content (v2.0→v2.1)
  • Network Traffic Flow (v2.0→v2.1)
  • OS API Execution (v2.0→v2.1)
  • Process Creation (v2.0→v2.1)
  • Process History/Live Data (v2.0→v2.1)
  • Process Metadata (v2.0→v2.1)
  • Process/Event Alarm (v2.0→v2.1)
  • Service Modification (v2.0→v2.1)

Patches

  • Service Metadata (v2.0)
  • Windows Registry Key Modification (v2.0)

Detection Strategies

Enterprise

New Detection Strategies

Minor Version Changes

Patches

Deprecations

ICS

New Detection Strategies

Analytics

Enterprise

New Analytics

Minor Version Changes

Patches

Mobile

Major Version Changes

Minor Version Changes

ICS

New Analytics

Minor Version Changes

Patches

Contributors to this release

  • Alberto Garcia
  • Alex Soler, AttackIQ
  • Alex Wong
  • Arad Inbar, Fidelis Security
  • Arun Seelagan, CISA
  • Austin Clark, @c2defense
  • Blake Strom, Microsoft Threat Intelligence
  • Caio Silva
  • Cian Heasley
  • Contributor: Dominik Breitenbacher, ESET
  • Daniel Feichter, @VirtualAllocEx, Infosec Tirol
  • Dominik Breitenbacher, ESET
  • Dongwook Kim, KISA
  • Dragos Threat Intelligence
  • Emile Kenning, Sophos
  • Expel
  • Gal Singer, @galsinger29, Team Nautilus Aqua Security
  • Gilberto Pérez
  • Gordon Long, LegioX/Zoom, asaurusrex
  • Ibrahim Ali Khan
  • Jaesang Oh, KC7 Foundation
  • Janantha Marasinghe
  • Joe Gumke, U.S. Bank
  • Jorell Magtibay, National Australia Bank Limited
  • Kiyohito Yamamoto, RedLark, NTT Communications
  • Kyaw Pyiyt Htet (@KyawPyiytHtet)
  • Lab52 by S2 Grupo
  • Liran Ravich, CardinalOps
  • Lucas Heiligenstein
  • Manikantan Srinivasan, NEC Corporation India
  • Marco Pedrinazzi, @pedrinazziM, InTheCyber
  • Matt Snyder, VMware
  • Mayuresh Dani, Qualys
  • Menachem Goldstein
  • Nathaniel Quist, Palo Alto Networks
  • Nay Myo Hlaing (Ethan), DBS Bank
  • Patrick Mkhael (aka Pinguino)
  • Pawel Partyka, Microsoft Threat Intelligence
  • Pedro Rodriguez
  • Pooja Natarajan, NEC Corporation India
  • Prasad Somasamudram, McAfee
  • Prasanth Sadanala, Cigna Information Protection (CIP) - Threat Response Engineering Team
  • Rich Rafferty (NR Labs)
  • Rob Smith
  • Sarathkumar Rajendran, Microsoft Defender365
  • Sekhar Sarukkai, McAfee
  • Serhii Melnyk
  • SeungYoul Yoo, AhnLab
  • Stijn Geerts
  • Syed Ummar Farooqh, McAfee
  • Taewoo Lee, KISA
  • Takemasa Kamatani , NEC Corporation
  • Tim (Wadhwa-)Brown
  • Tommaso Tosi, @tosto92, InTheCyber
  • Uriel Kosayev
  • Vikas Singh, Sophos
  • Víctor Alba
  • Wai Linn Oo, Kernellix Co.,Ltd.
  • Wietze Beukema @Wietze
  • Yusuke Kubo, RedLark, NTT Communications
  • Ziv Karliner, @ziv_kr, Team Nautilus Aqua Security