AttackIQ Blog

    Emulating the Always Persistent Cybercrime Malware Emotet

    February 17, 2023
    AttackIQ has released two new attack graphs emulating recent Emotet campaigns that resulted in data exfiltration and ransomware extortion. This release continues our focused research on shared e-crime malware used in attacks by multiple threat actors.
    Read More

    Democratizing the Practice of Adversary Emulation

    February 14, 2023
    AttackIQ is democratiziing the practice of threat-informed defense and adversary emulation, including by funding research from the Center for Threat-Informed Defense on micro-emulation planning. Learn more out how we put adversary emulation into practice in the AttackIQ Security Optimization Platform.
    Read More
    AttackIQ Research: Emulating the Shared Cybercrime Loader BumbleBee Background

    Emulating the Shared Cybercrime Loader BumbleBee

    February 3, 2023
    AttackIQ has released two attack graphs that emulate the shared cybercrime malware loader known as BumbleBee. This release is a continuation of our cybercrime malware emulation initiative detailing how customers can protect themselves against a wide range of actors who share tooling.
    Read More

    Emulating the Constantly Evolving Cybercrime Malware QakBot

    January 25, 2023
    AttackIQ has released three new attack graphs that emulate multiple infection chain variations involving the widely utilized cybercrime malware known as QakBot.
    Read More

    Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1

    January 5, 2023
    AttackIQ has released a bundle of content consisting of six new attack graphs that seek to emulate the campaigns and operations led by the infamous North Korean-sponsored adversary Lazarus Group against entities worldwide across multiple sectors.
    Read More

    Emulating the Politically Motivated North Korean Adversary Andariel

    December 22, 2022
    AttackIQ has released a bundle of content that includes three new attack graphs that seek to emulate different cyberspace operations led by the North Korean-sponsored threat actor Andariel against multiple entities located in Asia, predominantly in South Korea, through the use of downloaders, backdoors, and custom ransomware.
    Read More

    Attack Graph Response to APT36 Targeted Attacks Against Indian Governmental Organizations

    December 19, 2022
    AttackIQ has released a new attack graph that seeks to emulate the activity carried out by the politically motivated Pakistan-based adversary known as APT36 or Transparent Tribe. This newly released attack graph emulates the behaviors observed in attacks against victims working in Indian government organizations.
    Read More

    Emulating the Financially Motivated North Korean Adversary BlueNoroff

    December 14, 2022
    AttackIQ has released a bundle of content including four new attack graphs that seek to emulate two types of attacks conducted by the North Korean adversary BlueNoroff. The newly released graphs emulate the behaviors used in the attacks against the Society for Worldwide Interbank Financial Telecommunication (SWIFT) software and organizations involved in cryptocurrency.
    Read More

    Limits exist on what ChatGPT will tell you about warfare. And that’s a good thing.

    December 13, 2022
    OpenAI’s ChatGPT can tell you exactly how to use BAS to improve your cyberdefense effectiveness. But it won’t help you with the Russian military specifically, and that’s a very good thing. See below for why OpenAI deserves credit for this algorithmic limit.
    Read More

    A post about BAS, written in the voice of Langston Hughes, by OpenAI’s ChatGPT

    December 12, 2022
    We asked OpenAI’s ChaptGPT to write a 750-800 word blog post about breach and attack simulation (BAS) in the voice of Langston Hughes. It did great; see below. And well-done, team OpenAI. 
    Read More

    Looking Back at 2022: Adoption at Scale, Research, and Validated Industry Analysis 

    December 8, 2022
    A look back at how AttackIQ’s customers and advanced research, as well as key players in the analyst community, helped propel the breach and attack simulation market forward in 2022.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-335A): #StopRansomware: Cuba Ransomware

    December 3, 2022
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) associated to attacks involving Cuba ransomware.This release is a follow-up to an FBI FLASH alert published in December 2021 that first detailed the initial attacks against 49 entities in critical infrastructure sectors. The Cuba ransomware actors have since doubled the number of U.S. victims and compromised over 100 entities worldwide.
    Read More