AttackIQ Blog

    Updated Response to CISA Advisory (AA23-136A): #StopRansomware: BianLian Ransomware Group

    January 16, 2025
    AttackIQ has released an updated attack graph in response to the recently revised CISA Advisory (AA23-136A) that disseminates known BianLian ransomware group Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) identified through the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC) investigations.
    Read More

    Emulating the Tenacious Ako Ransomware

    January 9, 2025
    AttackIQ has released a new attack graph emulating the behaviors exhibited by Ako ransomware since its emergence in January 2020. Contrary to many ransomware strains that focus on individual workstations, Ako targets entire networks, maximizing its impact. It is considered a variant of MedusaLocker due to numerous shared traits, including its defensive behavior and its strategic isolation of specific machines for encryption.
    Read More

    Emulating the Financially Motivated Criminal Adversary FIN7 – Part 1

    December 12, 2024
    AttackIQ has released two new attack graphs that emulate the behaviors exhibited by the long-standing, financially motivated criminal adversary known as FIN7 during its most recent activities in 2024.
    Read More

    Introducing Flex 3.0: Elevating Threat Detection in a Dynamic Landscape

    December 3, 2024
    In today’s rapidly evolving threat landscape, cyber defense is more crucial than ever. As we introduce Flex 3.0, let’s first look at what drives the need for a stronger, smarter approach to detection. Advanced persistent threats (APTs) and sophisticated attacker tactics are now part of the norm. Modern attackers are faster and more creative, taking mere hours to move from initial compromise to reaching their objectives. Yet, detecting an attacker often takes days—sometimes even months.
    Read More

    Response to CISA Advisory (AA24-326A): Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization

    November 22, 2024
    In response to the recently published CISA Advisory (AA24-326A) which highlights the CISA Red Team’s simulation of real-world malicious cyber operations, AttackIQ has provided actionable recommendations to help organizations emulate these attacks. These guidelines enable organizations to emulate tactics and techniques, helping to assess and improve their defenses against similar adversarial behaviors.
    Read More

    Response to CISA Advisory (AA24-317A): 2023 Top Routinely Exploited Vulnerabilities

    November 13, 2024
    In response to the recently published CISA Advisory (AA24-317A) that disseminates the top routinely exploited vulnerabilities from 2023, AttackIQ has proposed a multitude of recommendations that customers can take to emulate these prevalent vulnerabilities.
    Read More

    Emulating the Destructive WhisperGate Malware

    November 12, 2024
    AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with the destructive WhisperGate malware.
    Read More

    Testing Security Controls in the Indo-Pacific: A Critical DoD Imperative

    October 21, 2024
    The Indo-Pacific region has emerged as a focal point of geopolitical tension and technological competition.
    Read More

    Breaking Down Silos with Human-Assisted Intelligent Agents

    October 18, 2024
    A Preview of Next-Gen Threat-Informed Defense at ATT&CKCon 2024.
    Read More

    Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations

    October 17, 2024
    AttackIQ has released a new assessment template in response to the CISA Advisory (AA24-290A), published on October 16, 2024. The advisory highlights that since October 2023, Iranian cyber actors have used password spraying and multifactor authentication (MFA) ‘push bombing’ to compromise user accounts and gain access to organizations across various critical infrastructure sectors.
    Read More

    Emulating the Opportunistic and Lightweight Lumma Stealer

    October 15, 2024
    AttackIQ has released a new assessment template that addresses the numerous post-compromise Tactics, Techniques, and Procedures (TTPs) associated with the subscription-based information stealer known as Lumma Stealer.
    Read More

    Emulating the Surging Hadooken Malware

    October 3, 2024
    AttackIQ has released a new attack graph that emulates the behaviors exhibited by the Hadooken malware during intrusions that abused misconfigurations and critical Remote Code Execution (RCE) vulnerabilities on public-facing Oracle Weblogic Servers.
    Read More

    Emulating the Petrifying Medusa Ransomware

    September 19, 2024
    AttackIQ has released a new attack graph that emulates the behaviors exhibited by Medusa ransomware since the beginning of its activities in June 2021. Medusa is predominantly propagated through the exploitation of vulnerable services, such as public-facing assets or applications with known unpatched vulnerabilities, and the hijacking of legitimate accounts, often using Initial Access Brokers (IABs) for infiltration.
    Read More

    Emulating the Persistent and Stealthy Ebury Linux Malware

    September 12, 2024
    AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with Ebury Linux malware. Despite previous arrests and actions against key perpetrators, Ebury continues to evolve, and its operations remain active.
    Read More

    Response to CISA Advisory (AA24-249A): Russian Military Cyber Actors Target US and Global Critical Infrastructure

    September 10, 2024
    AttackIQ has released a new assessment template in response to the CISA Advisory (AA24-249A) published on September 5, 2024, that assesses cyber actors affiliated with the Russian General Staff Main Intelligence Directorate (GRU) 161st Specialist Training Center (Unit 29155), who are responsible for computer network operations against global targets for the purposes of espionage, sabotage, and reputational harm since at least 2020.
    Read More

    Response to CISA Advisory (AA24-242A): #StopRansomware: RansomHub Ransomware

    September 5, 2024
    AttackIQ has released a new assessment template in response to the CISA Advisory (AA24-207A) published on August 29, 2024, that disseminates known RansomHub ransomware IOCs and TTPs that have been identified through FBI threat response activities and third-party reporting as recently as August 2024.
    Read More

    Emulating the Extortionist Mallox Ransomware

    August 30, 2024
    AttackIQ has released a new attack graph that emulates the behaviors exhibited by Mallox ransomware since the beginning of its activities in June 2021. Mallox primarily gains access to victim networks through dictionary brute-force attacks against unsecured MS-SQL servers.
    Read More

    Response to CISA Advisory (AA24-241A): Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations

    August 29, 2024
    AttackIQ has released a new assessment template in response to the CISA Advisory (AA24-241A) published on August 28, 2024. The advisory outlines espionage activity associated with a specific group of Iranian cyber actors that have conducted a high volume of intrusion attempts against US organizations since 2017 and as recently as August 2024
    Read More

    Response to CISA Advisory (AA24-234A): Strengthening Defenses Through Effective Event Logging and Threat Detection

    August 23, 2024
    In response to the recent CISA Advisory (AA24-234A) outlining best practices for event logging and threat detection, AttackIQ, in alignment with CISA’s guidance, strongly encourages organizations to engage in continuous testing against known, real-world adversary behaviors and TTPs through rigorous security control validation.
    Read More

    AttackIQ’s New NIST CSF Assessment: A Game-Changer for Cybersecurity

    August 8, 2024
    Read More

    Navigating the DORA Landscape with AttackIQ’s Automated Assessment

    August 6, 2024
    Read More

    Emulating Sandworm’s Prestige Ransomware

    August 2, 2024
    AttackIQ has released a new attack graph that emulates the behaviors exhibited by Prestige ransomware since the beginning of its activities in October 2022. Prestige has been observed targeting organizations in the transportation and related logistics sectors located in Ukraine and Poland. In November 2022, it was assessed that the Russian adversary known as Sandworm was most likely behind these attacks.
    Read More

    Democratizing Defense: AttackIQ Flex 2.0 Empowers Every Organization

    August 1, 2024
    Revolutionizing security testing with continuous security validation.
    Read More

    Rat Traps: Emulating AsyncRAT with AttackIQ Flex

    August 1, 2024
    In the ultramodern, mercurial sphere of cybersecurity, somehow a 1700-year-old quote from Helena of Constantinople still deeply resonates. Even with seemingly robust defenses, the smallest vulnerability can be an open invitation for threats like AsyncRAT to infiltrate your system, underscoring the importance of continuous testing to ensure that your existing controls – your rat traps – are functioning effectively.
    Read More