AhnLab announced on the 20th that it demonstrated its global-level threat detection and analysis capabilities by participating in the 'MITRE Attack Evaluation Institutional Sector Round 6' conducted by the U.S. nonprofit research and development organization MITRE.
AhnLab participated in the 'Detection' institutional sector of this evaluation with its ▲next-generation endpoint detection and response solution 'AhnLab EDR', ▲endpoint security platform 'AhnLab EPP', and ▲SaaS-based security threat analysis platform 'AhnLab XDR'. In this evaluation, AhnLab detected 56 out of 59 attack stages (Substep), achieving a detection rate of 94.9% and provided detailed evidence and attack analysis information.
In particular, AhnLab recorded a higher detection rate compared to last year, even in an environment where the difficulty of the test and evaluation criteria have increased. This year's MITRE Attack evaluation, in which AhnLab participated in the 'Detection' institutional sector, was based on a threat scenario of 'Ransomware-as-a-Service model-based attacks' actually carried out by the LockBit and Clop attack groups across Windows and Linux operating systems, unlike the previous test (Round 5), which was based on a specific attack group scenario. Furthermore, from this year’s evaluation onward, the evaluation criteria were raised, excluding cases without detailed analysis information upon attack detection from receiving evaluation grades. In this context, AhnLab achieved a detection rate of 94.9%, an increase from last year’s 82.1%.
Jun-Seong Hak, head of AhnLab's research lab, said, 'AhnLab showed meaningful results, including an increase in detection rate in this MITRE Attack evaluation, which demanded a higher level of threat detection and analysis capabilities compared to the last test.' He added, 'AhnLab will continue to strive for research and development to provide solutions with world-class performance.'
Meanwhile, the MITRE Attack evaluation is a test that multidimensionally assesses the detection status and level of detailed analysis information by reconstructing the actual attack processes of specific attack groups and breaking them down into detailed attack stages. A total of 19 global security corporations participated in this year's Round 6 evaluation.