CrowdStrike with Maximum Points in the Most Demanding Assessment Yet Conducted by MITRE ATT&CK® Enterprise- image 1

CrowdStrike with Maximum Points in the Most Demanding Assessment Yet Conducted by MITRE ATT&CK® Enterprise

The article is also available at:
Polish, Lithuanian, Latvian, Estonian

MITRE ATT&CK® Enterprise evaluations are one of the key, independent benchmarks for assessing the effectiveness of cybersecurity solutions. Instead of relying on vendors’ declarations, MITRE recreates realistic campaigns conducted by advanced cybercriminal groups, analyzing how the tested platforms detect and block adversary actions at each stage of an attack.

This year’s edition focused particularly on:

  • attacks targeted at cloud environments,
  • identity abuse and hijacked sessions,
  • the use of legitimate administrative tools for offensive purposes,
  • complex cross-domain scenarios, covering endpoint, identity, and cloud simultaneously.
CrowdStrike with Maximum Points in the Most Demanding Assessment Yet Conducted by MITRE ATT&CK® Enterprise - image 1
MITRE ATT&CK® EVALUATION

CrowdStrike results: 100% detection, 100% protection, 0 false positives

In this year’s MITRE ATT&CK® Enterprise evaluation, the CrowdStrike Falcon® platform achieved the following results:

  • 100% detection – all presented attack techniques were identified,
  • 100% protection – every malicious action was effectively blocked,
  • 0 false positives – none of the generated alerts concerned correct, allowed activity,
  • 100% detail at the technique level – each detection included the full context of the event, including “who, what, when, where, how, and why” information.

It is particularly noteworthy that this year’s edition was the first fully platform-oriented MITRE evaluation, encompassing coherent tests in the areas of endpoint, identity, and cloud. CrowdStrike Falcon passed this test without compromise, confirming the maturity of its cloud-based architecture and advanced artificial intelligence.

LIVING-OFF-THE-LAND

Living-off-the-land: legitimate tools as an attack vector

One of the key conclusions of the 2025 evaluation is the growing significance of techniques known as living-off-the-land (LOTL). Instead of using custom malware, attackers increasingly utilize RMM (Remote Monitoring and Management) class solutions, abuse built-in administrative and system tools, or camouflage their activity among the daily operations of IT teams.

In such a scenario, traditional, signature-based protection mechanisms prove insufficient. CrowdStrike responds to this shift with multilayered behavioral analysis:

  • behavioral indicators of attack detect improper use of legitimate tools,
  • CrowdStrike Falcon® Exposure Management provides insight into what applications are installed and how they are used,
  • the APEX (Anomalous Process Execution) feature uses machine learning to identify anomalies in commands, parameters, and relationships between processes.

This allows an organization to effectively differentiate legitimate administrative work from adversary actions attempting to remain unseen.

CLOUD SECURITY

Cloud security: real-time protection of the cloud control plane

Cloud environments have become a natural target for attacks. The results of the MITRE 2025 evaluation demonstrate that adversaries:

  • use legitimate cloud accounts and roles,
  • abuse API interfaces of cloud providers,
  • modify network configurations and permissions,
  • combine multiple tactics, from Initial Access, through Credential Access, to Defense Evasion.

In response to these challenges, CrowdStrike Falcon® Cloud Security provides:

  • real-time event monitoring in the cloud control plane,
  • blocking mechanisms at both workload and cloud configuration levels,
  • analyst support through Charlotte AI™ capabilities, which organize and interpret large volumes of telemetry data.

This effectively allows stopping an attack during its execution, before data breach or further lateral movement within the environment can occur.

IDENTITY

Identity under constant attack: from account takeover to lateral movement

More and more modern attacks start with correct, seemingly reliable logging in. As MITRE results indicate, adversaries capture MFA tokens and active sessions, add alternative authentication methods, set up new accounts with elevated privileges, or move between systems, mimicking regular user behavior.

CrowdStrike Falcon® Next-Gen Identity Security addresses these risks through:

  • continuous monitoring of authentication-related behavior,
  • detecting subtle deviations, such as an unusual login location, change in MFA scheme, or sudden privilege escalation,
  • automatically terminating suspicious sessions, blocking compromised accounts, and isolating threatened hosts.

Tight integration with endpoint protection ensures that any attempt to abuse identity is immediately visible in the broader context of device, user, and network activity.

CROSS-DOMAIN ATTACKS

Cross-domain attacks: one platform, coherent incident picture

Modern cyberattack campaigns rarely limit themselves to a single area. The same incident can start with the exploitation of a cloud configuration error, then involve employee identity takeover, and ultimately end with deploying ransomware on workstations. MITRE 2025 confirms that effective defense against such a complex scenario requires a unified security platform.

CrowdStrike Falcon:

  • consolidates telemetry data from endpoints, identity systems, and cloud environments,
  • correlates seemingly independent events into a single, clear attack chain,
  • presents the analyst with the complete incident history in a single, coherent view.

Additionally, CrowdStrike Falcon® Fusion SOAR allows automated isolation of infected hosts, blocking malicious accounts and connections, and triggering predefined response runbooks simultaneously across multiple domains.

As a result, the time from detection to taking effective action is measured in seconds, not hours, significantly increasing the organization’s chances of limiting the scale of the incident.

CONTACT US

The significance of MITRE results for the organization’s security strategy

The conclusions drawn from the MITRE ATT&CK Enterprise 2025 evaluation are clear and have a direct impact on the way organizations build their cybersecurity strategies:

  • the attack surface is constantly expanding, encompassing both local, cloud, and hybrid environments,
  • the boundaries between endpoints, cloud, and identity are blurring, which favors complex, multi-stage attacks,
  • traditional, point security solutions are no longer sufficient, as they cannot provide coherent, comprehensive protection in such a dynamic environment.

As a distributor of CrowdStrike solutions, we support organizations in transitioning from dispersed, uncoordinated security tools to a unified platform based on CrowdStrike Falcon®, which addresses these challenges in a coherent, scalable manner confirmed by independent MITRE evaluations. Contact us for more information, we are happy to answer all questions!

And if you want to have access to the full content of the e-book “MITRE ATT&CK Evaluations: Enterprise 2025” from CrowdStrike, contact us!

News

Current news on your topic

All news
All news