attackevals.mitre-engenuity.org
Open in
urlscan Pro
20.81.111.111
Public Scan
Submitted URL: http://attackevals.mitre-engenuity.org/
Effective URL: https://attackevals.mitre-engenuity.org/
Submission: On December 12 via manual from US — Scanned from US
Effective URL: https://attackevals.mitre-engenuity.org/
Submission: On December 12 via manual from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
Results About Resources Now accepting participant applications for our MSR3 evaluation. Enterprise 2024 Cohort Results Publication MITRE is excited to publish Enterprise 2024 cohort results. Our sixth evaluation examines common behaviors that are prevalent across prolific ransomware campaigns. This evaluation features an introduction into macOS, delving into adversary behavior inspired by the Democratic People's Republic of Korea’s (DPRK) targeting of macOS. This evaluation also incorporates multiple smaller emulations, introducing a more nuanced and targeted evaluation of defensive capabilities. View Results Learn More Make informed security decisions MITRE ATT&CK® Evaluations is your resource for understanding how security solution providers might protect your organization's unique needs against known adversaries See latest evaluations Enterprise 2024 (2024) NEW Enterprise Managed Services Evaluation (2024) Managed Services menuPass + ALPHV BlackCat (2024) Managed Services Enterprise 2024 (2024) NEW Enterprise Our sixth evaluation examines common behaviors that are prevalent across prolific ransomware campaigns. This evaluation features an introduction into macOS, delving into adversary behavior inspired by the Democratic People's Republic of Korea’s (DPRK) targeting of macOS. This evaluation also incorporates multiple smaller emulations, introducing a more nuanced and targeted evaluation of defensive capabilities. Show results Learn more -------------------------------------------------------------------------------- Our ATT&CK® Evaluations methodology ATT&CK® Evaluations' mission is to bridge the gap between the security solution providers and their users/customers by enabling users to better understand and defend against known adversary behaviors through a transparent evaluation process and publicly available results - leading to a more informed community and safer world for all. We use adversary emulation to scope evaluations in context of the MITRE ATT&CK® framework. The evaluations address today's threats by using tactics, tools, methods, and goals inspired by that of known attacks. Techniques are executed in a logical step-by-step ordering to explore the breadth of ATT&CK coverage. And because adversaries may execute the same technique, but in very different ways, our evaluations use procedural variation to capture the same behavior via different methods to explore the depth of ATT&CK coverage. -------------------------------------------------------------------------------- Develop -------------------------------------------------------------------------------- Execute -------------------------------------------------------------------------------- Publish Questions? Our team is ready to help you Contact Get updates Enterprise Enterprise (2024) Turla (2023) Wizard Spider & Sandworm (2022) Carbanak & FIN7 (2021) APT 29 (2019) APT 3 (2018) Managed Services menuPass & ALPHV BlackCat (2024) OilRig (2022) Industrial Control Systems Triton (2021) Trials APT 29 Deceptions (2022) Resources About Methodology Blog FAQ Emulation plan library MITRE MITRE ATT&CK® Terms & Conditions Privacy Policy Citation Policy Cookie Preferences