AttackIQ Blog

    Response to CISA Advisory (AA24-060A): #StopRansomware: Phobos Ransomware

    June 5, 2024
    AttackIQ has released a new attack graph in response to the CISA Advisory (AA24-060A) published on February 29, 2024, which disseminates known Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) associated with the Phobos Ransomware variants observed as recently as February 2024.
    Read More

    Defend Your Business: Testing Your Security Against QakBot and Black Basta Ransomware

    May 29, 2024
    Small and medium-sized businesses are increasingly targeted by sophisticated cyberattacks like QakBot and Black Basta ransomware. Discover how AttackIQ Flex’s latest package helps you test your defenses, uncover vulnerabilities, and stay ahead of these advanced threats. Enhance your security posture with real-world attack scenarios and actionable insights. Read on to learn more and register for free today!
    Read More

    Emulating the Open-Source Remote Access Trojan (RAT) AsyncRAT

    May 24, 2024
    AttackIQ has released two new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the open-source Remote Access Trojan AsyncRAT during its activities in 2023.
    Read More

    Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta

    May 17, 2024
    AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA24-131A) which disseminates known Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) associated to Black Basta ransomware, a ransomware variant whose operators have encrypted and stolen data from at least 12 out of 16 critical infrastructure sectors, including the Healthcare and Public Health (HPH) Sector.
    Read More

    Navigating Container Security with AttackIQ’s Optimization Solutions

    May 3, 2024
    As businesses continue to adopt container technologies such as Docker and Kubernetes for their deployment efficiency and scalability, they also face a growing challenge—securing these environments. Container security is still a developing field, with many organizations just beginning to understand the extent and effectiveness of necessary security controls.
    Read More

    Gootloader Attacks Healthcare Down Under

    May 1, 2024
    In the vast landscape of Australia, the healthcare sector faces mounting challenges in the realm of cybersecurity. Threat actors are increasingly setting their sights on healthcare institutions, exploiting vulnerabilities with cunning precision. Join us as we uncover the recent cyberattack by Gootloader on the Australian healthcare sector and delve into the critical importance of robust cybersecurity defenses in safeguarding patient data and vital healthcare services.
    Read More

    Response to CISA Advisory (AA24-109A): #StopRansomware: Akira Ransomware

    April 22, 2024
    AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA24-109A) which disseminates known Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) associated to Akira ransomware, identified through FBI investigations and trusted third party reporting as recently as February 2024.
    Read More

    Target Locked: Operation Sharpshooter

    April 17, 2024
    Operation Sharpshooter was a significant cyberattack by the Lazarus Group, targeting critical industries like finance, energy, and defense. Dive into the details of the attack and its implications and explore how AttackIQ Flex can assist in testing and strengthening your cybersecurity defenses.
    Read More

    Emulating the Southeast Asian Adversary OceanLotus

    April 16, 2024
    AttackIQ has released four new attack graphs that seek to emulate the behaviors exhibited by the politically motivated Vietnamese adversary known as OceanLotus during its most recent and prevalent activities.
    Read More

    Intercept the Adversary: Lazarus Group – Operation In(ter)ception

    April 10, 2024
    Operation In(ter)ception reveals Lazarus Group’s 2019 cyber campaign targeting military and aerospace organizations in Europe and the Middle East. Delve into the attacker’s tactics on LinkedIn, their covert infiltration methods, and the complexities of their persistence strategies. Discover how AttackIQ Flex can empower your organization to fortify their defenses against such sophisticated threats through the use of agentless emulation testing.
    Read More

    Cyber Sorcery: Confronting Lazarus Group – MagicRAT and TigerRAT Campaign

    April 4, 2024
    Discover the origin, tactics and future of Remote Access Trojan (RAT) dubbed MagicRAT and how leveraging AttackIQ Flex can help your organization simulate real-world attack scenarios, enabling you to assess and validate their security posture effectively.
    Read More

    Windows Service Permissions and DLL Sideloading

    March 28, 2024
    As any seasoned security professional knows, many published security vulnerabilities and attacks are over-hyped. What makes something newsworthy is not always that it poses a significant risk to most organizations. If an attack doesn’t appear to be technically sophisticated, it will often be overlooked.
    Read More