attackevals.mitre-engenuity.org Open in urlscan Pro
20.81.111.111  Public Scan

Submitted URL: http://attackevals.mitre-engenuity.org/
Effective URL: https://attackevals.mitre-engenuity.org/
Submission: On December 12 via manual from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

Results
About
Resources
Now accepting participant applications for our MSR3 evaluation.
Enterprise 2024
Cohort Results Publication

MITRE is excited to publish Enterprise 2024 cohort results.

Our sixth evaluation examines common behaviors that are prevalent across
prolific ransomware campaigns. This evaluation features an introduction into
macOS, delving into adversary behavior inspired by the Democratic People's
Republic of Korea’s (DPRK) targeting of macOS. This evaluation also incorporates
multiple smaller emulations, introducing a more nuanced and targeted evaluation
of defensive capabilities.

View Results Learn More
Make informed security decisions
MITRE ATT&CK® Evaluations is your resource for understanding how security
solution providers might protect your organization's unique needs against known
adversaries
See latest evaluations

Enterprise 2024 (2024) NEW
Enterprise
Managed Services Evaluation (2024)
Managed Services
menuPass + ALPHV BlackCat (2024)
Managed Services
Enterprise 2024 (2024) NEW
Enterprise

Our sixth evaluation examines common behaviors that are prevalent across
prolific ransomware campaigns. This evaluation features an introduction into
macOS, delving into adversary behavior inspired by the Democratic People's
Republic of Korea’s (DPRK) targeting of macOS. This evaluation also incorporates
multiple smaller emulations, introducing a more nuanced and targeted evaluation
of defensive capabilities.

Show results
Learn more


--------------------------------------------------------------------------------


Our ATT&CK® Evaluations methodology
ATT&CK® Evaluations' mission is to bridge the gap between the security solution
providers and their users/customers by enabling users to better understand and
defend against known adversary behaviors through a transparent evaluation
process and publicly available results - leading to a more informed community
and safer world for all. We use adversary emulation to scope evaluations in
context of the MITRE ATT&CK® framework. The evaluations address today's threats
by using tactics, tools, methods, and goals inspired by that of known attacks.
Techniques are executed in a logical step-by-step ordering to explore the
breadth of ATT&CK coverage. And because adversaries may execute the same
technique, but in very different ways, our evaluations use procedural variation
to capture the same behavior via different methods to explore the depth of
ATT&CK coverage.

--------------------------------------------------------------------------------


Develop


--------------------------------------------------------------------------------


Execute


--------------------------------------------------------------------------------


Publish

Questions?
Our team is ready to help you
Contact
Get updates
Enterprise
Enterprise (2024)
Turla (2023)
Wizard Spider & Sandworm (2022)
Carbanak & FIN7 (2021)
APT 29 (2019)
APT 3 (2018)
Managed Services
menuPass & ALPHV BlackCat (2024)
OilRig (2022)
Industrial Control Systems
Triton (2021)
Trials
APT 29 Deceptions (2022)
Resources
About
Methodology
Blog
FAQ
Emulation plan library
MITRE
MITRE ATT&CK®
Terms & Conditions
Privacy Policy
Citation Policy
Cookie Preferences