Author: Francis Guibernau

Francis Guibernau is an Adversary Research Engineer and member of the Adversary Research Team (ART) at AttackIQ. Francis conducts in-depth threat research and analysis to design and create highly sophisticated and realistic adversary emulations. He also coordinates the Cyber Threat Intelligence (CTI) project which focuses on the research, analysis, tracking and documentation of adversaries, malware families and cybersecurity incidents. Francis has extensive experience in adversary intelligence, encompassing both Nation-State and eCrime threats, as well as in vulnerability assessment and management, having previously worked at Deloitte and BNP Paribas.

    Emulating the Long-Term Extortionist Nefilim Ransomware

    July 11, 2024
    AttackIQ has released a new attack graph that emulates the behaviors exhibited by the extortionist ransomware Nefilim during activities against multiple organizations, primarily based in North or South America, distributed in the financial, manufacturing, or transportation industries since its emergence in March 2020.
    Read More

    Emulating the Sabotage-Focused Russian Adversary Sandworm
    – Part 2

    July 3, 2024
    AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the highly sophisticated Russian adversary Sandworm during various destructive activities against targets in Ukraine and other countries in the region shortly before the launch of the Russian invasion on February 24, 2022.
    Read More

    Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware

    June 5, 2024
    AttackIQ has released a new attack graph in response to the CISA Advisory (AA24-060A) published on February 29, 2024, which disseminates known Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) associated with the Phobos Ransomware variants observed as recently as February 2024.
    Read More

    Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta

    May 17, 2024
    AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA24-131A) which disseminates known Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) associated to Black Basta ransomware, a ransomware variant whose operators have encrypted and stolen data from at least 12 out of 16 critical infrastructure sectors, including the Healthcare and Public Health (HPH) Sector.
    Read More

    Response to ScreenConnect’s Recent Zero-day Vulnerability Exploitation

    March 8, 2024
    AttackIQ has released a new assessment template in response to the recent wave of zero-day vulnerability exploits affecting ConnectWise’s ScreenConnect software. This assessment template comprises the various Tactics, Techniques, and Procedures (TTPs) exhibited by several adversaries observed exploiting these vulnerabilities to deploy different families of Ransomware.
    Read More

    Response to the Revised CISA Advisory (AA23-353A): #StopRansomware: ALPHV BlackCat

    March 7, 2024
    AttackIQ has released an update to the BlackCat ransomware emulation in response to the recent revision of the CISA Advisory (AA23-353A) which disseminates Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) identified through FBI investigations as recently as February 2024.
    Read More

    Emulating the Sabotage-Focused Russian Adversary Sandworm
    -Part 1

    March 6, 2024
    AttackIQ has released a new assessment template that emulates the various Post-Compromise Tactics, Techniques, and Procedures (TTPs) associated with the politically motivated Russian adversary Sandworm.
    Read More

    Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware

    March 1, 2024
    AttackIQ has released a new assessment template in response to the recently published CISA Advisory (AA24-060A) which disseminates known Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) associated with the Phobos Ransomware variants observed as recently as February 2024.
    Read More

    Emulating the Ever-Evolving Loader DarkGate

    February 14, 2024
    AttackIQ has released three new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the infamous loader known as DarkGate during its activities in 2023.
    Read More

    Response to Ivanti’s Recent Zero-day Vulnerability Exploitation

    February 7, 2024
    AttackIQ has released a new assessment template in response to the recent wave of zero-day vulnerability exploits targeting various appliances produced by software company Ivanti. This assessment template emulates the different Tactics, Techniques, and Procedures (TTPs) exhibited by the UNC5221 adversary after successful exploitation of CVE-2023-46805 (authentication bypass) and CVE-2024-21887 (command injection).
    Read More

    Response to CISA Advisory (AA24-016A): Known Indicators of Compromise Associated with Androxgh0st Malware

    January 19, 2024
    AttackIQ has released a new assessment template in response to the recently published CISA Advisory (AA24-016A) which disseminates known Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) associated with threat actors deploying Androxgh0st malware.
    Read More

    Response to CISA Advisory (AA23-353A): #StopRansomware: ALPHV BlackCat

    December 29, 2023
    AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA23-353A) which disseminates Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) associated with the ALPHV BlackCat Ransomware-as-a-Service (RaaS) identified through FBI investigations as recently as December 6, 2023.
    Read More