{"id":18644,"date":"2022-03-31T15:21:00","date_gmt":"2022-03-31T23:21:00","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/31\/news-12377\/"},"modified":"2022-03-31T15:21:00","modified_gmt":"2022-03-31T23:21:00","slug":"news-12377","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/03\/31\/news-12377\/","title":{"rendered":"MITRE Engenuity ATT&amp;CK\u00ae Evaluation results showcase Sophos real-world threat prevention and detection"},"content":{"rendered":"<p><strong>Credit to Author: Rich Beckett| Date: Thu, 31 Mar 2022 20:00:26 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignright wp-image-83575 size-thumbnail\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?w=150&amp;h=150&amp;crop=1\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png 1668w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?resize=150,150 150w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?resize=300,300 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?resize=768,768 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?resize=1024,1024 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?resize=1536,1536 1536w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?resize=32,32 32w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?resize=50,50 50w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?resize=64,64 64w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?resize=96,96 96w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/MITRE_Attack-Eval_Enterprise4_Wizard_Spider_Sandworm.png?resize=128,128 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>This round of independent <a href=\"https:\/\/attackevals.mitre-engenuity.org\/\">ATT&amp;CK Evaluations<\/a> for enterprise cybersecurity solutions emulated two sophisticated threat groups, Wizard Spider and Sandworm.<\/p>\n<p><a href=\"https:\/\/attack.mitre.org\/groups\/G0102\/\">Wizard Spider<\/a> is a financially motivated criminal group that has been conducting ransomware campaigns since August 2018 against a variety of organizations, ranging from major corporations to hospitals. <a href=\"https:\/\/attack.mitre.org\/groups\/G0034\/\">Sandworm<\/a> is a destructive Russian threat group that is known for launching the <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/07\/07\/organisations-count-the-cost-of-petya-as-the-storm-abates\/\">NotPetya<\/a> ransomware attacks that wreaked havoc in 2017.<\/p>\n<p>These two threat actors were chosen based on their complexity, relevancy to customer organizations, and how well MITRE Engenuity\u2019s staff can fittingly emulate the adversary for a real-world test that organizations can trust.<\/p>\n<h2>Delivering the highest visibility of threats<\/h2>\n<p>Sophos is proud to share that Intercept X demonstrated a world-class ability to prevent and detect advanced attacks, including Wizard Spider and Sandworm.<\/p>\n<p>\u201cThe challenge of protecting your organization against real-world cyberthreats is a demanding effort in precision and scale. Providing the highest level of context to a defender is key to improving the speed at which you can identify and respond to attacker tactics, techniques, and procedures (TTPs). Adversaries continuously adapt and evolve their toolsets and activity to seize new opportunities, evade detection and try to stay one step ahead of security teams. For that reason, we\u2019re pleased to be recognized in the MITRE Engenuity evaluations, which focus on the actual TTPs of two assertive and modern-day attackers,\u201d said Joe Levy, Sophos Chief Technology and Product Officer.<\/p>\n<p>You can view the in-scope techniques used in the evaluation in the ATT&amp;CK Navigator by checking out the layer file we made available <a href=\"https:\/\/mitre-attack.github.io\/attack-navigator\/#layerURL=https:\/\/raw.githubusercontent.com\/attackevals\/website\/master\/downloadable_JSON\/Wizard_Spider_and_Sandworm_Navigator_layer.json\" target=\"_blank\" rel=\"noopener\">here<\/a>, and Sophos\u2019 results in detecting them <a href=\"https:\/\/attackevals.mitre-engenuity.org\/enterprise\/participants\/sophos?view=overview&amp;adversary=wizard-spider-sandworm\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/Technigues-used.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-83573 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/Technigues-used.png\" alt=\"\" width=\"1886\" height=\"886\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/Technigues-used.png 1886w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/Technigues-used.png?resize=300,141 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/Technigues-used.png?resize=768,361 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/Technigues-used.png?resize=1024,481 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/Technigues-used.png?resize=1536,722 1536w\" sizes=\"auto, (max-width: 1886px) 100vw, 1886px\" \/><\/a><\/p>\n<h2>Stopping threats faster<\/h2>\n<p>\u201cWe\u2019re very pleased with the way MITRE\u2019s evaluation showcases the threat detection strength of Sophos Intercept X. Every day, this enables our customers to deter more active attacks earlier in the attack lifecycle, and to reduce the impact of costly threats like ransomware,\u201d adds Levy. Preventing a single ransomware incident, as simulated in the ATT&amp;CK Evaluations, could result in saving millions of dollars, not to mention the potential collateral damage, simply by stopping attacks before they culminate into something more devious.<\/p>\n<p>As <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/03\/22\/as-russias-ground-advance-stalls-biden-warns-of-an-increase-in-cyberattacks\/\">President Biden releases a statement<\/a> that Russian threat groups, like those responsible for Sandworm, may be shifting towards cyber-offensive action against Western organizations and infrastructure, it\u2019s important for organizations to optimize prevention. An important step is to <strong>reduce the attack surface<\/strong>, removing opportunities for attackers to breach your organization. Some examples of how Sophos achieves this is by:<\/p>\n<ul>\n<li>Blocking potentially unwanted applications<\/li>\n<li>Blocking malicious or suspicious websites based on content or URL rating<\/li>\n<li>Controlling which applications are allowed to run in the organization<\/li>\n<li>Controlling which devices are allowed on the organization\u2019s network or able to access cloud assets<\/li>\n<li>Locking down server configurations in a single click<\/li>\n<\/ul>\n<p>The next step is to\u00a0<strong>prevent attacks from running<\/strong>, using layered protection technologies to stop both the threats and the tactics attackers use, including:<\/p>\n<ul>\n<li>Behavioral detection and prevention based on known-adversarial and anomalous activities<\/li>\n<li>Artificial intelligence (AI) models to assign risk scores to file artifacts, including those never-before-seen<\/li>\n<li>Behavior-based anti-ransomware protection for both local and remote systems<\/li>\n<li>Exploit prevention that stops the techniques attackers use, protecting against a broad set of attacks, including those that leverage previously unknown malware<\/li>\n<\/ul>\n<p>Last year\u2019s Kaseya attack highlights how important the combination of prevention and detection is \u2014 by the time the attack was detected, it was too late, and the files were encrypted. Not a single Sophos customer with our next-gen endpoint protection correctly deployed had their files encrypted in that attack.<\/p>\n<h2>Minimizing the time to detect and respond<\/h2>\n<p>Optimizing prevention like this minimizes time to detect and respond in the face of real-world threats and enables defenders to focus on fewer, more accurate detections.<\/p>\n<p><a href=\"https:\/\/www.sophos.com\/en-us\/products\/endpoint-antivirus\/xdr\">Sophos Intercept X with XDR<\/a>, by achieving the highest context rating for the majority of detections in the evaluation, demonstrated how it enables you to streamline the whole investigation and response process. Our intuitive console makes it easy with a rich set of pre-defined, categorized Threat Hunting and Investigation queries in several categories including MITRE ATT&amp;CK oriented.<a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/InterceptX_Threat-Detections-XDR-Dashbaord.png\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-83574 size-full\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/InterceptX_Threat-Detections-XDR-Dashbaord.png\" alt=\"\" width=\"2048\" height=\"1207\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/InterceptX_Threat-Detections-XDR-Dashbaord.png 2048w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/InterceptX_Threat-Detections-XDR-Dashbaord.png?resize=300,177 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/InterceptX_Threat-Detections-XDR-Dashbaord.png?resize=768,453 768w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/InterceptX_Threat-Detections-XDR-Dashbaord.png?resize=1024,604 1024w, https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/InterceptX_Threat-Detections-XDR-Dashbaord.png?resize=1536,905 1536w\" sizes=\"auto, (max-width: 2048px) 100vw, 2048px\" \/><\/a>To bring this to life, I\u2019d like to share data from\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response\/contact-request\">Sophos Managed Threat Response<\/a>\u00a0(MTR), our 24\/7\/365 managed detection and response (MDR) service which today serves well over 8,500 Sophos Intercept X customers.<\/p>\n<p>Customers enrolled in our service are seeing mean time to detect (MTTD) attacks under one minute. Enriched investigation techniques result in a mean time to investigate (MTTI) of 25 minutes.<\/p>\n<p>Our human-led investigations leverage the superior detection context identified by MITRE, enabling us to achieve quicker and more accurate response. The result is a mean time to resolution (MTTR) of just 12 minutes, or a total time from detecting the threat to resolving it of just under 38 minutes.<\/p>\n<h2>Delivering real-world results<\/h2>\n<p>Our goal at Sophos is to help our customers prevent, detect, and respond to security incidents faster, enabling you to achieve better security outcomes.<\/p>\n<p>We are committed to testing Sophos Intercept X with a wide range of leading testing providers like MITRE Engenuity, as well as soliciting reviews from the organizations we protect every day. The results speak for themselves: Sophos consistently delivers industry-leading protection, was named the highest rated and most reviewed vendor in <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/12\/01\/sophos-named-a-gartner-peer-insights-customers-choice-for-endpoint-protection-platforms\/\">Gartner Peer Insights\u2122 Customer\u2019s Choice for Endpoint Protection Platforms<\/a>, and was named best <a href=\"https:\/\/news.sophos.com\/en-us\/2021\/11\/18\/intercept-x-named-best-enterprise-endpoint-protection-by-se-labs\/\">Enterprise Endpoint Protection by SE Labs<\/a>.<\/p>\n<p>To learn more and discuss how we can help with your security challenges,\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response\/rapid-response\">visit our website<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response\/contact-request\">speak with a member of the team<\/a>.<\/p>\n<p>If you need immediate assistance to contain, neutralize, and investigate an active threat, you can contact <a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-threat-response\/rapid-response.aspx\">Sophos Rapid Response<\/a>\u00a0for support 24\/7.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/03\/31\/mitre-engenuity-attck-evaluation-results-showcase-sophos-real-world-threat-prevention-and-detection\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2022\/03\/endpoint-tile-graphic-e1648477040696.png\"\/><\/p>\n<p><strong>Credit to Author: Rich Beckett| Date: Thu, 31 Mar 2022 20:00:26 +0000<\/strong><\/p>\n<p>The results from the fourth round of MITRE Engenuity ATT&#038;CK\u00ae Enterprise Evaluations are now available, recognizing Sophos Intercept X endpoint protection with XDR for protecting organizations against sophisticated real-world threats.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[11179,10405,25569,24562,22487],"class_list":["post-18644","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-endpoint","tag-intercept-x","tag-mitre-attk","tag-products-services","tag-xdr"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18644","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18644"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18644\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18644"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18644"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18644"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}