Cohesity REDLabs collects malicious files from multiple sources like CISA, Google Threat Intelligence, Ransomware.live and various open source projects. During the last 4 months, REDLab conducted analysis of MITRE TTPs associated with newly identified Indicators of Compromise (IoCs) in the wild. This threat intelligence report reveals critical shifts in adversary behavior, with December 2025 showing a dramatic escalation in automated collection, input capture, and process injection techniques.
MITRE Tactics, Techniques, and Procedures (TTPs) describe how adversaries behave during cyber attacks - what they aim to do and how they do it. Maintained by MITRE, an industry and government-backed non-profit organization, these behaviors are documented in the MITRE ATT&CK® framework (https://attack.mitre.org). TTPs are important because while tools and malware constantly change, attacker behaviors are more consistent, making TTPs a durable foundation for detection, threat hunting, and defense.
We identified persistent attack patterns that remained consistent throughout the quarter, as well as emerging techniques that appeared suddenly in December, signaling potential shifts in attacker toolkits and operational priorities.
Percentage of files in which these top TTPs were observed in the period Oct’25 - Jan’26:
Cohesity REDLab receives malware files from a variety of sources including CISA, Google Threat Intelligence, Ransomware.live and a variety of open source repositories. TTPs are extracted by a combination of custom yara like programs and tags received from our partners like Google Threat Intelligence. In this exercise we started with about 77.5 million files. After filtering the initial set we were able to successfully extract and correlate TTPs from about 28,497 files. A total of 1306 instances of Mitre ATT&CK Tactics and 15,202 instances of Techniques were identified. In 1964 of these files, we found high severity TTP signatures signifying high-risk malicious behavior like the malware writing into another process’s memory or input capture behaviours like taking screenshots and potential exfiltration of data.
Top TTPs tend to change over time as attackers change their Techniques and Tactics. Customers are advised to use Cohesity Threat Scanning to scan for malware deploying the latest techniques and tactics. The Rapid Scanning feature can also be used to identify high profile malware from backups. Customers can also bring their own YARA rules for any custom requirements.
With these features, Cohesity DataHawk provides continuous malware scanning and behavioral analytics to detect process injection artifacts, keyloggers, and automated collection patterns within backup data. Our immutable snapshots via DataLock protect against T1562.001 defense evasion and T1119 automated collection attempts, preventing attackers from deleting or corrupting locked backups. Air-gapped FortKnox storage isolates critical data from network-based C2 protocols (T1071) and lateral movement attempts.
The backup infrastructure is not merely a recovery mechanism but an active target. It often harbors dormant malware ready to attack with new techniques. Organizations must treat backup environments with the same security rigor as production systems, implementing continuous monitoring, malware scanning, and integrity verification.
As we enter 2026, the lessons of Q4 2025 underscore the critical importance of threat-informed defense, continuous adaptation, and clean recovery capabilities validated against current threats. Cohesity REDLab will continue monitoring TTP trends and publishing actionable intelligence to help organizations maintain resilience as adversary techniques evolve.
For the latest TTP trends and advisories, please visit Cohesity REDLabs.
Start your 30-day free trial or view one of our demos.