Analysing the Latest Mitre Engenuity EDR/MDR Evaluations: MDR Vendors Compared


<< Back to Blogs

The latest Mitre Engenuity ATT&CK® Evaluations for EDR (Endpoint Detection and Response) and MDR (Managed Detection and Response) services have provided critical insights into how well various vendors security offerings compare including the softwares prevention and detection capability, but more crucial how the vendors MDR Team react to the attack scenarios, and whether they provide actionable insight back to your organisation.

Overview of the Evaluation
Mitre Engenuity’s evaluations are designed to emulate real-world attack scenarios, allowing organisations to understand the effectiveness of their security solutions. In this evaluation, the performance of several EDR and MDR providers was tested against techniques employed by Menupass (APT41) and BlackCat (ALPHV). These threat groups are known for their advanced tactics, techniques, and procedures (TTPs), making the evaluation results particularly relevant for organisations seeking robust defence mechanisms.

Menupass (APT41) Scenario:
Menupass is known for its cyber-espionage activities and use of sophisticated malware. The evaluation tested how well security solutions could detect and respond to these advanced threats. High-performing solutions were able to detect lateral movement, privilege escalation, and data exfiltration attempts typical of Menupass attacks.

BlackCat (ALPHV) Scenario:
BlackCat is associated with ransomware operations, using advanced techniques to encrypt and exfiltrate data.
The best solutions identified initial access vectors, command and control communications, and encryption activities, showcasing their ability to thwart ransomware attacks.

Our Key Findings

Detection Capabilities:
The evaluation highlighted significant differences in detection capabilities among the EDR/MDR providers. Some solutions were able to detect the majority of attack techniques, while others struggled with certain stages of the attack lifecycle with the highest vendor detecting 42/43 techniques lowest only detecting 25/43.

Solutions that provided comprehensive visibility into system activities and covered a broad range of TTPs performed better. Effective solutions offered detailed telemetry and context, enabling quicker and more accurate threat identification.

Response Effectiveness:
Mean Time to Detect (MTTD) is the average time between when an attack is run and when the managed service provider triggers an alert on this attack. The timestamp on the first email relevant to the step in question was used. The average across the group was 41 minutes, with the best responding in as little as 4 minutes, and the worst at 93 minutes. As you can imagine time is critical in advanced attacks as they aim move laterally and spread persistence throughout their victims environment.

Alert Email Fatigue:
As any IT/Security professional will know being able to understand and interpret events both in the platform, via email/ticket and direct guidance provided by the managed service team is important. Having your service desk light up with 100’s of emails is going to be a real burden on the security team so being able to aggregate and prioritise alerts with meaningful insights is critical. If your utilising an MDR service you really want them to deal with the noise, and then report on positive mitigations that need to be implemented.

Actionability:
Actionability is a measurement of whether a SOC analyst is provided with enough information in the alert about What, Where, When, Who, and Why to take action on it. This is very important for Vendors providing an MDR Service as they need to be able to give a clear picture of why an event is being alerted, what the impact is and how teams can mitigate the issue.

Detailed Performance Analysis

In the table below we list out these key areas by vendor:

Vendor Emails
Alerts
Console
Alerts
Total
Alerts
Actionable
Detections
Total
Detection
Missed
Techniques
Detection Score
(Actionable+Detected %)
MTTD (Minutes)
Mean-Time-To-Detect
Crowdstrike 266 190 456 40 42 1 95% 4 Mins
Bitdefender 24 11 35 40 41 2 94% 24 Mins
Palo Alto 28 364 392 34 38 5 84% 24 Mins
SentinelOne 22 143 165 31 38 5 80% 47 Mins
Blackberry 199 63 262 30 35 7 76% 48 Mins
Microsoft 65 65 130 27 37 6 74% 24 Mins
Sophos 24 252 276 27 36 7 73% 72 Mins
Trend Micro 59 37 96 22 36 7 67% 65 Mins
SecurityHQ 75 32 107 24 33 10 66% 93 Mins
SecureWorx 51 543 594 23 25 18 56% 33 Mins
FieldEffect 60 60 120 20 25 16 52% 11 Mins

*alerts count are those of Critical & High… Med, Info and Other are ommited)

Conclusion

Looking at the results above there are key differentiators between the solution providers, in an ideal world we would like a combination of High Detection & Actionability coverage, mixed with low response times; the number of alerts is not directly measurable however lower numbers high value, correlated and actionable alerts would be far preferable to a flood of low value alerts, especially when it comes to speed of recovery.

The Mitre Engenuity ATT&CK® Evaluations are an invaluable resource for organisations looking to enhance their security posture. By understanding the strengths and weaknesses of various EDR and MDR solutions, organisations can make informed decisions to better protect against sophisticated threat actors like Menupass and BlackCat. For more detailed results and analysis, visit the official evaluation page:
https://attackevals.mitre-engenuity.org/managed-services/menupass-blackcat/.

When working with our customers needs and challenges, ITB provide agnostic market analysis to ensure you are investing in the right technology for your organisation, we always review independent analysis from the likes of Mitre, Forrester, Gartner, SE Labs to ensure our advice is current and relevant.

We can also provide security control validation services to test your technology and security controls against emerging threats to ensure your getting the most out of your investments.

Speak to one of our Cyber Advisors today regarding your cyber projects.