Uncategorized

Sophos XDR Excels in MITRE ATT&CK® Evaluations: Enterprise

100% of Sophos XDR Detections for Adversary Activities Targeting Windows and Linux Devices Provide Rich Analytic Coverage and Achieve the Highest Possible Ratings

Sophos, a global leader of innovative security solutions for defeating cyberattacks, announced its strong results in the 2024 MITRE ATT&CK®Evaluations: EnterpriseSophos XDR detected 100% of the adversary behaviors in attack scenarios targeting Windows and Linux platforms, mimicking malware strains from ruthless ransomware-as-a-service gangs LockBit and CL0P.

Further, all of Sophos’ responses to these ransomware attack scenarios were marked “technique”—the highest possible rating that denotes who, what, when, where, why, and how attacks were carried out.

What Sophos XDR Achieved in MITRE ATT&CK Evaluations

Sophos XDR achieved:

  • ‘Analytic coverage’ ratings for 99% of sub-steps (79 out of 80) across three comprehensive attack scenarios
  • Highest possible (‘Technique’) ratings for 98% of sub-steps (78 out of 80)
  • Highest possible (‘Technique’) ratings for 100% of sub-steps in the Windows and Linux ransomware attack scenarios

“Attackers are relentless to innovate techniques to bypass trusted security defences. This assessment from MITRE helps security buyers evaluate the effectiveness against today’s threats,” said Simon Reed, Chief Research and Scientific Officer at Sophos. “Sophos is committed to transparency and conducting third-party measurement to help security buyers make informed decisions to strengthen their security posture. We’re proud of Sophos XDR’s ongoing excellence both in industry testing and real-world frontline defences. We’re consistently evolving our solutions, just like attackers are constantly evolving their tactics, so our customers can stop known and unknown threats before they escalate into destructive attacks.”

MITRE ATT&CK Evaluations are among the world’s most respected independent security tests. This round of MITRE ATT&CK Evaluations: Enterprise evaluated the abilities of 19 vendors in detecting and analysing attack tactics, techniques, and procedures (TTPs) leveraged by real-world adversarial groups. In this cycle, MITRE also expanded ATT&CK Evaluations to include macOS attacks emulating tactics from the Democratic People’s Republic of Korea—where 19 out of 21 Sophos XDR detections were also categorised as “technique”—the highest possible rating.

What Sophos XDR Provides

Sophos XDR combines the following:

  • Active adversary mitigations—including industry-first Adaptive Attack Protection that immediately activates heightened defences when a hands-on-keyboard attack is detected, stopping the attack and providing defenders valuable additional time to respond.
  • Anti-ransomware technology
  • Deep Learning Artificial Intelligence
  • Exploit prevention to prevent and stop attacks

Sophos XDR

Sophos XDR is powered by Sophos X-Ops threat intelligence, a cross-operational task force of more than 500 security experts within SophosLabs, Sophos SecOps, and SophosAI.

Learn more about Sophos’ evaluation results at https://sophos.com/mitre.

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *