MITRE ATT&CK v18 & v17 Updates: What’s New & Why It Matters in 2025

MITRE ATT&CK update 2025 v17 v18 detection overhaul

The Latest on MITRE ATT&CK in 2025

The MITRE ATT&CK framework continues evolving. Its v17 update (released April 2025) introduced expanded platform coverage, new techniques, and improved guidance for defenders.

Now, attention turns to ATT&CK v18, expected this October 2025, which promises a major shift: a revamp of detection modeling to better align with real-world adversary behavior. Industrial Cyber

This article explores what’s changed, what’s coming, and how security teams must adapt.


What Changed in ATT&CK v17 (April 2025)

Expanded Platform & Technique Coverage

  • ESXi platform added to the Enterprise matrix, with new techniques like “ESXi Administration Control” and “Hypervisor CLI.”
  • Mobile matrix enhancements — some mobile sub-techniques have moved from beta to stable.

More Analytics, Better Guidance

  • Over 140 new analytics were introduced to aid detection across the intrusion lifecycle
  • Data Components got smarter: platform-specific collection guidance helps defenders map telemetry to techniques more clearly.
  • Mitigations were strengthened, with step-by-step guidance and integration examples.

New & Updated Threat Groups

v17 added multiple new groups to its catalog:

  • Salt Typhoon (Chinese state actor) targeting telecom infrastructure.
  • RedEcho, Velvet Ant, APT42, Sea Turtle, BlackByte, Storm-1811 among others.
  • New campaigns leveraging AI, network gear exploits, and supply chain tactics were also included.

What to Expect in ATT&CK v18 (Coming October 2025)

MITRE is preparing a detection modeling overhaul. The goal: make detection guidance more modular, behavior-focused, and aligned with real adversarial tactics. Industrial Cyber

Key enhancements:

  • Detection Strategies: techniques will map to causal behavior chains rather than isolated events.
  • Platform-aware Analytics & Log Sources: detection will be more telemetry-aware, eliminating vague suggestions like “use Sysmon.”
  • Three new STIX objects will improve structure and versioning.

This approach aims to help defenders respond to real-world, multi-step attacks more effectively — not just individual anomalies.


Why These Updates Matter for Security Teams

1. Bridging Detection Gaps

Attackers rarely act in single-step moves. By aligning detection guidance with chained adversary behavior, defenders can detect intrusions earlier and with greater context.

2. Broader Visibility

The inclusion of ESXi, more mobile content, and additional threat groups means organizations using virtualization, cloud, or mobile will have better mapping to adversary activity.

3. Better Telemetry Mapping

When Data Components and log sources are more precisely mapped to techniques, defenders can deploy sensors more effectively and reduce blind spots.

4. Future-Proofing Detection Strategy

With v18’s detection overhaul, security teams will be better equipped to keep pace with how attackers adapt — especially in hybrid and complex environments.


How to Prepare Your Org

  1. Update your ATT&CK mapping Once v17 is live, re-map your detection rules, threat hunting use cases, and SIEM / EDR mappings to the new techniques.
  2. Test against ESXi-related techniques If your environment uses VMware or hypervisors, simulate or monitor for ESXi admin attacks.
  3. Evaluate detection coverage gaps Use tools (or internal audits) to identify which techniques have weak or no coverage in your stack.
  4. Plan for v18’s shift When v18 launches, prioritize migrating to the new detection strategies model.
  5. Train your team Make sure your SOC / hunting / IR teams understand the changes, especially how detection guidance has shifted from static to behavior-based.

Final Thoughts

The MITRE ATT&CK v17 update is a strong step forward — adding new platforms, groups, and refined analytics. But the real change lies ahead: v18’s upcoming detection revamp promises to reshape how defenders think about adversary behavior in real time.

Security teams that adopt these changes early, and adapt their telemetry and detection work accordingly, will be better positioned to stay ahead of evolving threats in late 2025 and beyond.

Scroll to Top