Updates - October 2025

Version Start Date End Date Data Changelogs
ATT&CK v18 October 28, 2025 Current version of ATT&CK v18.0 on MITRE/CTI 17.1 - 18.0 Details (JSON)

The October 2025 (v18) ATT&CK release updates Techniques, Groups, Campaigns and Software for Enterprise, Mobile, and ICS.

The biggest changes in ATT&CK are related to the defensive portion of the framework. Detections in techniques have been replaced with Detection Strategies resulting in the addition of Detection Strategies and Analytics, major updates to Data Components, as well as the deprecation of Data Sources. ATT&CK's STIX representation, including these new objects, is described in detail in ATT&CK Data Model. A post describing the defensive changes to the ATT&CK website and the rationalle behind them was published to ATT&CK's Blog in July 2025, and an accompanying blog post describes changes across the release.

In this release the Mobile Technique Abuse Accessibility Features has been un-deprecated (last seen in ATT&CK v6).

This release also includes a human-readable detailed changelog showing more specifically what changed in updated ATT&CK objects, and a machine-readable JSON changelog, whose format is described in ATT&CK's Github.

Statistics

This version of ATT&CK contains 910 Software, 176 Groups, and 55 Campaigns.

Broken out by domain:

  • Enterprise: 14 Tactics, 216 Techniques, 475 Sub-Techniques, 172 Groups, 784 Software, 52 Campaigns, 44 Mitigations, 691 Detection Strategies, 1739 Analytics, and 106 Data Components
  • Mobile: 12 Tactics, 77 Techniques, 47 Sub-Techniques, 17 Groups, 122 Software, 3 Campaigns, 13 Mitigations, 124 Detection Strategies, 211 Analytics, and 17 Data Components
  • ICS: 12 Tactics, 83 Techniques, 14 Groups, 23 Software, 7 Campaigns, 52 Mitigations, 18 Assets, 83 Detection Strategies, 82 Analytics, and 36 Data Components

Release Notes Terminology

  • New objects: ATT&CK objects which are only present in the new release.
  • Major version changes: ATT&CK objects that have a major version change. (e.g. 1.0 → 2.0)
  • Minor version changes: ATT&CK objects that have a minor version change. (e.g. 1.0 → 1.1)
  • Other version changes: ATT&CK objects that have a version change of any other kind. (e.g. 1.0 → 1.2)
  • Patches: ATT&CK objects that have been patched while keeping the version the same. (e.g., 1.0 → 1.0 but something like a typo, a URL, or some metadata was fixed)
  • Object revocations: ATT&CK objects which are revoked by a different object.
  • Object deprecations: ATT&CK objects which are deprecated and no longer in use, and not replaced.
  • Object deletions: ATT&CK objects which are no longer found in the STIX data.

Table of Contents

Techniques

Enterprise

New Techniques

Major Version Changes

Minor Version Changes

Patches

Mobile

New Techniques

Major Version Changes

Minor Version Changes

Patches

ICS

Patches

Software

Enterprise

New Software

Major Version Changes

Minor Version Changes

Patches

Mobile

New Software

Major Version Changes

ICS

Minor Version Changes

Groups

Enterprise

New Groups

Major Version Changes

Minor Version Changes

Patches

Mobile

New Groups

Major Version Changes

Minor Version Changes

ICS

Major Version Changes

Minor Version Changes

  • FIN7 (v4.0→v4.1)

Campaigns

Enterprise

New Campaigns

Minor Version Changes

Patches

Assets

ICS

New Assets

Major Version Changes

Mitigations

Enterprise

Minor Version Changes

Patches

Data Sources

Enterprise

Deprecations

Mobile

Deprecations

ICS

Deprecations

Data Components

Enterprise

Major Version Changes

  • Active DNS (v1.1→v2.0)
  • Active Directory Credential Request (v1.1→v2.0)
  • Active Directory Object Access (v1.1→v2.0)
  • Active Directory Object Creation (v1.1→v2.0)
  • Active Directory Object Deletion (v1.1→v2.0)
  • Active Directory Object Modification (v1.1→v2.0)
  • Application Log Content (v1.1→v2.0)
  • Certificate Registration (v1.1→v2.0)
  • Cloud Service Disable (v1.1→v2.0)
  • Cloud Service Enumeration (v1.1→v2.0)
  • Cloud Service Metadata (v1.1→v2.0)
  • Cloud Service Modification (v1.1→v2.0)
  • Cloud Storage Access (v1.1→v2.0)
  • Cloud Storage Creation (v1.1→v2.0)
  • Cloud Storage Deletion (v1.1→v2.0)
  • Cloud Storage Enumeration (v1.1→v2.0)
  • Cloud Storage Metadata (v1.1→v2.0)
  • Cloud Storage Modification (v1.1→v2.0)
  • Command Execution (v1.2→v2.0)
  • Container Creation (v1.1→v2.0)
  • Container Enumeration (v1.1→v2.0)
  • Container Start (v1.1→v2.0)
  • Domain Registration (v1.1→v2.0)
  • Drive Access (v1.1→v2.0)
  • Drive Creation (v1.1→v2.0)
  • Drive Modification (v1.1→v2.0)
  • Driver Load (v1.1→v2.0)
  • Driver Metadata (v1.1→v2.0)
  • File Access (v1.1→v2.0)
  • File Creation (v1.1→v2.0)
  • File Deletion (v1.1→v2.0)
  • File Metadata (v1.1→v2.0)
  • File Modification (v1.1→v2.0)
  • Firewall Disable (v1.1→v2.0)
  • Firewall Enumeration (v1.1→v2.0)
  • Firewall Metadata (v1.1→v2.0)
  • Firewall Rule Modification (v1.1→v2.0)
  • Firmware Modification (v1.1→v2.0)
  • Group Enumeration (v1.1→v2.0)
  • Group Metadata (v1.1→v2.0)
  • Group Modification (v1.1→v2.0)
  • Host Status (v1.1→v2.0)
  • Image Creation (v1.1→v2.0)
  • Image Deletion (v1.1→v2.0)
  • Image Metadata (v1.1→v2.0)
  • Image Modification (v1.0→v2.0)
  • Instance Creation (v1.1→v2.0)
  • Instance Deletion (v1.1→v2.0)
  • Instance Enumeration (v1.1→v2.0)
  • Instance Metadata (v1.0→v2.0)
  • Instance Modification (v1.1→v2.0)
  • Instance Start (v1.1→v2.0)
  • Instance Stop (v1.1→v2.0)
  • Kernel Module Load (v1.1→v2.0)
  • Logon Session Creation (v1.2→v2.0)
  • Logon Session Metadata (v1.0→v2.0)
  • Malware Content (v1.2→v2.0)
  • Malware Metadata (v1.1→v2.0)
  • Module Load (v1.1→v2.0)
  • Named Pipe Metadata (v1.1→v2.0)
  • Network Connection Creation (v1.2→v2.0)
  • Network Share Access (v1.1→v2.0)
  • Network Traffic Content (v1.1→v2.0)
  • Network Traffic Flow (v1.1→v2.0)
  • OS API Execution (v1.1→v2.0)
  • Passive DNS (v1.1→v2.0)
  • Pod Creation (v1.1→v2.0)
  • Pod Enumeration (v1.1→v2.0)
  • Pod Modification (v1.1→v2.0)
  • Process Access (v1.1→v2.0)
  • Process Creation (v1.2→v2.0)
  • Process Metadata (v1.0→v2.0)
  • Process Modification (v1.1→v2.0)
  • Process Termination (v1.1→v2.0)
  • Response Content (v1.1→v2.0)
  • Response Metadata (v1.1→v2.0)
  • Scheduled Job Creation (v1.1→v2.0)
  • Scheduled Job Metadata (v1.0→v2.0)
  • Scheduled Job Modification (v1.0→v2.0)
  • Script Execution (v1.2→v2.0)
  • Service Creation (v1.1→v2.0)
  • Service Metadata (v1.0→v2.0)
  • Service Modification (v1.1→v2.0)
  • Snapshot Creation (v1.1→v2.0)
  • Snapshot Deletion (v1.1→v2.0)
  • Snapshot Enumeration (v1.1→v2.0)
  • Snapshot Metadata (v1.0→v2.0)
  • Snapshot Modification (v1.1→v2.0)
  • Social Media (v1.1→v2.0)
  • User Account Authentication (v1.2→v2.0)
  • User Account Creation (v1.1→v2.0)
  • User Account Deletion (v1.1→v2.0)
  • User Account Metadata (v1.0→v2.0)
  • User Account Modification (v1.1→v2.0)
  • Volume Creation (v1.1→v2.0)
  • Volume Deletion (v1.1→v2.0)
  • Volume Enumeration (v1.0→v2.0)
  • Volume Metadata (v1.0→v2.0)
  • Volume Modification (v1.0→v2.0)
  • WMI Creation (v1.1→v2.0)
  • Web Credential Creation (v1.0→v2.0)
  • Web Credential Usage (v1.0→v2.0)
  • Windows Registry Key Access (v1.1→v2.0)
  • Windows Registry Key Creation (v1.1→v2.0)
  • Windows Registry Key Deletion (v1.1→v2.0)
  • Windows Registry Key Modification (v1.1→v2.0)

Mobile

Major Version Changes

  • API Calls (v1.0→v2.0)
  • Application Assets (v1.0→v2.0)
  • Command Execution (v1.2→v2.0)
  • Host Status (v1.1→v2.0)
  • Network Communication (v1.0→v2.0)
  • Network Connection Creation (v1.2→v2.0)
  • Network Traffic Content (v1.1→v2.0)
  • Network Traffic Flow (v1.1→v2.0)
  • OS API Execution (v1.1→v2.0)
  • Permissions Request (v1.0→v2.0)
  • Permissions Requests (v1.0→v2.0)
  • Process Creation (v1.2→v2.0)
  • Process Metadata (v1.0→v2.0)
  • Process Termination (v1.1→v2.0)
  • Protected Configuration (v1.0→v2.0)
  • System Notifications (v1.0→v2.0)
  • System Settings (v1.0→v2.0)

ICS

Major Version Changes

  • Application Log Content (v1.1→v2.0)
  • Asset Inventory (v1.0→v2.0)
  • Command Execution (v1.2→v2.0)
  • Device Alarm (v1.0→v2.0)
  • Drive Creation (v1.1→v2.0)
  • Drive Modification (v1.1→v2.0)
  • File Access (v1.1→v2.0)
  • File Creation (v1.1→v2.0)
  • File Deletion (v1.1→v2.0)
  • File Metadata (v1.1→v2.0)
  • File Modification (v1.1→v2.0)
  • Firmware Modification (v1.1→v2.0)
  • Logon Session Creation (v1.2→v2.0)
  • Logon Session Metadata (v1.0→v2.0)
  • Module Load (v1.1→v2.0)
  • Network Connection Creation (v1.2→v2.0)
  • Network Share Access (v1.1→v2.0)
  • Network Traffic Content (v1.1→v2.0)
  • Network Traffic Flow (v1.1→v2.0)
  • OS API Execution (v1.1→v2.0)
  • Process Creation (v1.2→v2.0)
  • Process History/Live Data (v1.0→v2.0)
  • Process Metadata (v1.0→v2.0)
  • Process Termination (v1.1→v2.0)
  • Process/Event Alarm (v1.0→v2.0)
  • Scheduled Job Creation (v1.1→v2.0)
  • Scheduled Job Metadata (v1.0→v2.0)
  • Scheduled Job Modification (v1.0→v2.0)
  • Script Execution (v1.2→v2.0)
  • Service Creation (v1.1→v2.0)
  • Service Metadata (v1.0→v2.0)
  • Service Modification (v1.1→v2.0)
  • Software (v1.0→v2.0)
  • User Account Authentication (v1.2→v2.0)
  • Windows Registry Key Deletion (v1.1→v2.0)
  • Windows Registry Key Modification (v1.1→v2.0)

Detection Strategies

Enterprise

New Detection Strategies

Mobile

New Detection Strategies

ICS

New Detection Strategies

Analytics

Enterprise

New Analytics

Mobile

New Analytics

ICS

New Analytics

Contributors to this release

  • Adam Hunt
  • Amir Hossein Vafifar
  • Arun Seelagan, CISA
  • Aung Kyaw Min Naing, @Nolan
  • Austin Larsen and the Google Threat Intelligence Group
  • Avioo360
  • Ben Smith
  • Christopher Peacock
  • Damien Miller-McAndrews
  • Daniyal Naeem, BT Security
  • Deloitte Threat Library Team
  • Don Le, Stifel Financial
  • Enis Aksu
  • Eric Loui, CrowdStrike Intelligence
  • Florian Heigl
  • Giorgi Gurgenidze, GITAC
  • Google's Android Security team
  • Gordon Long, LegioX/Zoom, asaurusrex
  • Gr@ve_Rose (tcpdump101.com on bsky)
  • Gregory Frey
  • Jeff Felling, Red Canary
  • Jiraput Thamsongkrah
  • Joe Gumke, U.S. Bank
  • Jorge Orchilles, SCYTHE
  • Kaung Khant Ko
  • Liran Ravich, CardinalOps
  • Lookout
  • Marco Pedrinazzi, @pedrinazziM, InTheCyber
  • Matt Brenton
  • Menachem Goldstein
  • Michael “Barni” Barnhart, DTEX
  • Michal Biesiada
  • Natthawut Saexu
  • Nay Myo Hlaing (Ethan), DBS Bank
  • Ozer Sarilar, @ozersarilar, STM
  • Purinut Wongwaiwuttiguldej
  • Pyae Heinn Kyaw, CSIRT @ Salesforce
  • Raja Singh (raja-singh-r3v-sh3ll)
  • Ray Jasinski
  • ReliaQuest
  • Ruben Dodge, @shotgunner101
  • Ruben Groenewoud (@RFGroenewoud)
  • Satoshi Kamekawa, ITOCHU Cyber & Intelligence Inc.
  • Serhii Melnyk, Trustwave SpiderLabs
  • Shuhei Sasada, ITOCHU Cyber & Intelligence Inc.
  • Simon Williams
  • Tommaso Tosi, @tosto92, InTheCyber
  • Tony Mau (CyberCX)
  • YH Chang, ZScaler ThreatLabz
  • Yusuke Niwa, ITOCHU Cyber & Intelligence Inc.
  • ZScaler