Author: AttackIQ Team

    Attack Graph Response to CISA Advisory (AA23-136A): #StopRansomware: BianLian Ransomware Group

    May 18, 2023
    AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA23-136A) that disseminates known BianLian ransomware group techniques and indicators identified through FBI and ACSC. BianLian is a ransomware developer, deployer, and data extortion cybercriminal group that has targeted organizations in multiple U.S. critical infrastructure sectors since June 2022. They have also targeted Australian critical infrastructure sectors in addition to professional services and property development. Targeted Sectors: Energy, Resources & Utilities, Professional Services, Construction
 Author: Francis Guibernau, Ken Towne
    Read More

    Response to CISA Advisory AA23-131A: Malicious Actors Exploit PaperCut MF and NG

    May 12, 2023
    On May 11, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) released a joint Cybersecurity Advisory (CSA) detailing ongoing exploitation of a vulnerability in PaperCut MF and NG by cyber criminals. AttackIQ has released four new scenarios that emulates the exploitation of CVE-2023-27350 to help customers validate their security controls and their ability to defend against this widely exploited vulnerability.
    Read More
    Flex Package - Turla Background Image

    Attack Graph Response to CISA Advisory AA23-129A: Hunting Russian Intelligence “Snake” Malware

    May 10, 2023
    AttackIQ has released two new attack graphs in response to the recently published CISA Advisory (AA23-129A) that details the efforts taken by U.S. agencies to disrupt the peer-to-peer network infrastructure used by the Russian threat actor Turla and their Snake malware. Turla is the public name given to actors associated with cyberattacks conducted by Center 16 of Russia’s Federal Security Service (FSB).
    Read More
    Nobelium / APT29 Background

    Emulating Recent Activity from the Russian Adversary Nobelium / APT29

    May 4, 2023
    AttackIQ has released a new attack graph that emulates recent activities conducted by the adversary known as Nobelium against European Union (EU) governments. These attacks continue Russia’s efforts to gather intelligence on countries supporting Ukraine in the ongoing Russia-Ukraine war.
    Read More

    Emulating Kimsuky’s Espionage Operations: A Closer Look at North Korea’s Efforts to Infiltrate South Korea

    April 26, 2023
    AttackIQ has released four new attack graphs that emulate the espionage activities led by Kimsuky, a politically motivated North Korean adversary with links to the nation’s intelligence operations.
    Read More

    Emulating Recent Malicious Activity from the Iranian Adversary OilRig

    April 4, 2023
    AttackIQ has released a new full-featured attack graph that emulates recent activity carried out by the politically motivated Iranian-sponsored adversary known as OilRig.
    Read More

    Emulating the Politically Motivated Chinese APT Mustang Panda

    March 23, 2023
    AttackIQ has released two new attack graphs that emulate recent activities conducted by the Chinese adversary known as Mustang Panda. The actor leveraged a historical family of malware known as PlugX, which is shared between multiple groups of Chinese origin known, and a new previously unknown backdoor exclusive to this actor.
    Read More

    Emulating the Infamous Modular Banking Trojan BokBot

    March 23, 2023
    AttackIQ has released two new attack graphs that emulate recent activities involving the banking trojan known as BokBot, which has been primarily focused on exfiltrating data and stealing credentials. This new release continues our focused research on emulating shared e-crime malware used in attacks by multiple adversaries.
    Read More

    Attack Graph Response to CISA Advisory (AA23-075A): #StopRansomware: LockBit 3.0

    March 17, 2023
    AttackIQ has released a new fully featured attack graph that emulates the behaviors demonstrated by the latest version the LockBit ransomware family “LockBit 3.0”, also known as “LockBit Black.”
    Read More

    Attack Graph Response to CISA Advisory (AA23-074A): Threat Actors Exploit Progress Telerik Vulnerability in U.S. Government IIS Server

    March 17, 2023
    AttackIQ has released a new attack graph that emulates the Tactics, Techniques, and Procedures (TTPs) used by a cybercriminal-focused adversary who carried successfully exploited CVE-2019-18935 against an instance of Telerik UI at a federal civilian executive branch (FCEB) agency.
    Read More

    Hiding in Plain Sight: Monitoring and Testing for Living-Off-the-Land Binaries

    March 16, 2023
    For malicious actors, opportunity can be found in the mundane. As adversaries continue to refine their approach with newer and more sophisticated methods to perform malicious activity, it is critical for detection engineers to stay up to date in the latest threat intelligence and adversary behaviors to monitor.
    Read More

    Attack Graph Response to CISA Advisory (AA23-061A): #StopRansomware: Royal Ransomware

    March 3, 2023
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) observed in cyberattacks involving Royal Ransomware.
    Read More