AttackIQ Blog

    Emulating the Constantly Evolving Cybercrime Malware QakBot

    January 25, 2023
    AttackIQ has released three new attack graphs that emulate multiple infection chain variations involving the widely utilized cybercrime malware known as QakBot.
    Read More

    Emulating the Highly Sophisticated North Korean Adversary Lazarus Group – Part 1

    January 5, 2023
    AttackIQ has released a bundle of content consisting of six new attack graphs that seek to emulate the campaigns and operations led by the infamous North Korean-sponsored adversary Lazarus Group against entities worldwide across multiple sectors.
    Read More

    Emulating the Politically Motivated North Korean Adversary Andariel

    December 22, 2022
    AttackIQ has released a bundle of content that includes three new attack graphs that seek to emulate different cyberspace operations led by the North Korean-sponsored threat actor Andariel against multiple entities located in Asia, predominantly in South Korea, through the use of downloaders, backdoors, and custom ransomware.
    Read More

    Attack Graph Response to APT36 Targeted Attacks Against Indian Governmental Organizations

    December 19, 2022
    AttackIQ has released a new attack graph that seeks to emulate the activity carried out by the politically motivated Pakistan-based adversary known as APT36 or Transparent Tribe. This newly released attack graph emulates the behaviors observed in attacks against victims working in Indian government organizations.
    Read More

    Emulating the Financially Motivated North Korean Adversary BlueNoroff

    December 14, 2022
    AttackIQ has released a bundle of content including four new attack graphs that seek to emulate two types of attacks conducted by the North Korean adversary BlueNoroff. The newly released graphs emulate the behaviors used in the attacks against the Society for Worldwide Interbank Financial Telecommunication (SWIFT) software and organizations involved in cryptocurrency.
    Read More

    Limits exist on what ChatGPT will tell you about warfare. And that’s a good thing.

    December 13, 2022
    OpenAI’s ChatGPT can tell you exactly how to use BAS to improve your cyberdefense effectiveness. But it won’t help you with the Russian military specifically, and that’s a very good thing. See below for why OpenAI deserves credit for this algorithmic limit.
    Read More

    A post about BAS, written in the voice of Langston Hughes, by OpenAI’s ChatGPT

    December 12, 2022
    We asked OpenAI’s ChaptGPT to write a 750-800 word blog post about breach and attack simulation (BAS) in the voice of Langston Hughes. It did great; see below. And well-done, team OpenAI. 
    Read More

    Looking Back at 2022: Adoption at Scale, Research, and Validated Industry Analysis 

    December 8, 2022
    A look back at how AttackIQ’s customers and advanced research, as well as key players in the analyst community, helped propel the breach and attack simulation market forward in 2022.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-335A): #StopRansomware: Cuba Ransomware

    December 3, 2022
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) associated to attacks involving Cuba ransomware.This release is a follow-up to an FBI FLASH alert published in December 2021 that first detailed the initial attacks against 49 entities in critical infrastructure sectors. The Cuba ransomware actors have since doubled the number of U.S. victims and compromised over 100 entities worldwide.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-321A): #StopRansomware: Hive Ransomware

    November 18, 2022
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) observed in attacks by cybercriminal groups to deploy their Hive ransomware.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-320A): Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester

    November 17, 2022
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) observed in an attack by Iranian-sponsored adversaries against a Federal Civilian Executive Branch (FCEB) organization in the U.S.
    Read More
    Text4Shell Blog Background

    Customizing AttackIQ Scenarios to Validate Text4Shell Protections

    November 3, 2022
    What is the correct way to validate your controls against a Text4Shell or similar library vulnerability? You need an adjustable, open systems testing platform to test the specific aspects of your implementation to accurately assess if your security controls are correctly configured to stop attacks that leverage it.
    Read More
    Ash Carter

    The Lessons Ash Carter Taught Me

    October 31, 2022
    One of Ash Carter’s former speechwriters and special assistants reflects on the lessons the Secretary of Defense leaves behind.
    Read More

    DeepSurface RiskAnalyzer 3.0 – The Launch of Remediation Workflow

    October 24, 2022
    Most of our development time is focused on the application of risk-based vulnerability management: DeepSurface does the math (there’s a lot of math) and shows you which vulnerabilities carry the greatest risk in your environment, and why.  People frequently respond to a demo of DeepSurface with, “That’s amazing… but what do I do next?”
    Read More

    Attack Graph Response to US-CERT Alert (AA22-277A): Chinese Threat Actors Steal Sensitive Information from a Defense Industrial Base Organization

    October 6, 2022
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) observed in an attack by Chinese-sponsored adversaries against a Defense Industrial Base organization in the U.S.
    Read More
    Purple Hats '22 Customer Awards

    Purple Hats 2022 Customer Awards

    September 27, 2022
    As we look forward to our next Purple Hats Conference, the industry destination for all cybersecurity professionals, we want to remember and celebrate the winners of our inaugural customer awards program.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-264A): Iranian State Actors Conduct Cyber Operations Against the Government of Albania

    September 23, 2022
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) used by Iranian nation-state adversaries against the government of Albania.
    Read More
    Emulating the Sophisticated Russian Adversary APT28 (Background))

    Emulating the Sophisticated Russian Adversary APT28

    September 21, 2022
    AttackIQ has released a content bundle including two new attack graphs covering two historical APT28 campaigns involving their SkinnyBoy and Zebrocy malware families and standalone scenarios emulating command-and-control traffic to test boundary controls.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Ransom Operations

    September 16, 2022
    AttackIQ has released a new attack graph emulating the techniques used by Iranian actors to compromise and encrypt systems — without the need for malware — to help customers defend against threats that try to operate while living solely off the land.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-249A): #StopRansomware Vice Society

    September 8, 2022
    AttackIQ has released a new attack graph emulating a Vice Society attack to help customers validate their security controls and their ability to defend against this threat actor and others who utilize similar behaviors.
    Read More
    Zeplin

    Attack Graph Response to US-CERT Alert (AA22-223A): Testing Security Controls against Zeppelin Ransomware 

    August 11, 2022
    AttackIQ’s Adversary Research Team has released a new assessment to test endpoint and network controls’ ability to prevent Zeppelin Ransomware.
    Read More
    Blog Background

    Attack Graph Response to US-CERT Alert (AA22-216A): Testing Security Controls against 2021’s Top Malware Strains

    August 10, 2022
    AttackIQ’s Adversary Research Team has released two new assessments to test endpoint and network controls’ ability to prevent widely utilized malware families.
    Read More
    Blog Background

    How to Test Your Defenses Against Personalized Top 10 MITRE ATT&CK Techniques

    August 4, 2022
    The Center for Threat-Informed Defense recently published a methodology and calculator so that you can identify the top MITRE ATT&CK techniques that impact your sector.
    Read More
    Attack Graph for SysJoker’s Linux Variant (Cron)

    Malware Emulation Attack Graph for SysJoker’s Linux Variant

    August 2, 2022
    AttackIQ’s Adversary Research Team has released a new Malware Emulation Attack Graph that emulates the Linux behaviors of the multi-platform backdoor known as SysJoker.
    Read More