AttackIQ Blog

    Attack Graph Response to US-CERT Alert (AA22-277A): Chinese Threat Actors Steal Sensitive Information from a Defense Industrial Base Organization

    October 6, 2022
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) observed in an attack by Chinese-sponsored adversaries against a Defense Industrial Base organization in the U.S.
    Read More
    Purple Hats '22 Customer Awards

    Purple Hats 2022 Customer Awards

    September 27, 2022
    As we look forward to our next Purple Hats Conference, the industry destination for all cybersecurity professionals, we want to remember and celebrate the winners of our inaugural customer awards program.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-264A): Iranian State Actors Conduct Cyber Operations Against the Government of Albania

    September 23, 2022
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) used by Iranian nation-state adversaries against the government of Albania.
    Read More
    Emulating the Sophisticated Russian Adversary APT28 (Background))

    Emulating the Sophisticated Russian Adversary APT28

    September 21, 2022
    AttackIQ has released a content bundle including two new attack graphs covering two historical APT28 campaigns involving their SkinnyBoy and Zebrocy malware families and standalone scenarios emulating command-and-control traffic to test boundary controls.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Ransom Operations

    September 16, 2022
    AttackIQ has released a new attack graph emulating the techniques used by Iranian actors to compromise and encrypt systems — without the need for malware — to help customers defend against threats that try to operate while living solely off the land.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-249A): #StopRansomware Vice Society

    September 8, 2022
    AttackIQ has released a new attack graph emulating a Vice Society attack to help customers validate their security controls and their ability to defend against this threat actor and others who utilize similar behaviors.
    Read More
    Zeplin

    Attack Graph Response to US-CERT Alert (AA22-223A): Testing Security Controls against Zeppelin Ransomware 

    August 11, 2022
    AttackIQ’s Adversary Research Team has released a new assessment to test endpoint and network controls’ ability to prevent Zeppelin Ransomware.
    Read More
    Blog Background

    Attack Graph Response to US-CERT Alert (AA22-216A): Testing Security Controls against 2021’s Top Malware Strains

    August 10, 2022
    AttackIQ’s Adversary Research Team has released two new assessments to test endpoint and network controls’ ability to prevent widely utilized malware families.
    Read More
    Blog Background

    How to Test Your Defenses Against Personalized Top 10 MITRE ATT&CK Techniques

    August 4, 2022
    The Center for Threat-Informed Defense recently published a methodology and calculator so that you can identify the top MITRE ATT&CK techniques that impact your sector.
    Read More
    Attack Graph for SysJoker’s Linux Variant (Cron)

    Malware Emulation Attack Graph for SysJoker’s Linux Variant

    August 2, 2022
    AttackIQ’s Adversary Research Team has released a new Malware Emulation Attack Graph that emulates the Linux behaviors of the multi-platform backdoor known as SysJoker.
    Read More

    Leveraging the MITRE ATT&CK framework to build a threat-informed defense

    July 29, 2022
    In this guest blog post, Bradley Schaufenbuel of Paychex writes about how security teams can leverage the MITRE ATT&CK framework to mount a “threat-informed” defense. This post originally appeared as an article in SC Magazine.
    Read More
    IDC Study The Business Value of AttackIQ '22

    IDC Study Finds Organizations Using AttackIQ Significantly Reduced Risk and Cost of Security Breaches, While Improving SOC Efficiency

    July 29, 2022
    Hot off the press, IDC has released an IDC Business value White Paper, sponsored by AttackIQ, that explores the business value and benefits of using the AttackIQ Security Optimization Platform.
    Read More

    Why Moving Beyond CVSS Scores is a Business Imperative

    July 27, 2022
    Organizations today find themselves at a critical turning point in the evolution of their vulnerability management efforts. New vulnerabilities are being published more quickly than teams can credibly analyze and remediate them (currently greater than 75 per day), while at the same time a serious talent shortage has developed. According to CyberSeek, the U.S. cybersecurity workforce has over 950,000 workers, with approximately 465,000 open positions.
    Read More

    4 Signs Your Vulnerability Risk Analysis Process is Outdated

    July 13, 2022
    With increasing online threats and a massive shift to remote work over the past two years, it’s no surprise that cybersecurity risks are a top concern for businesses in 2022. Cyber incidents top the Allianz Risk Barometer for the “most important global business risk” in 2022, accounting for 44% of the survey’s responses.
    Read More

    OilRig Attack Graphs: Emulating the Iranian Threat Actor’s Global Campaigns

    July 11, 2022
    AttackIQ has released two new attack graphs that emulate different aspects of OilRig’s operations against multiple sectors around the globe. With these attack graphs, you can test and validate your defenses to improve cybersecurity readiness.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-174A): Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems

    June 28, 2022
    AttackIQ has released two new fully featured attack graphs emulating the tactics, techniques, and procedures (TTPs) used by likely nation-state adversaries that continue exploiting the Log4Shell vulnerability in VMware Horizon Systems.
    Read More

    Response to US-CERT Alert (AA22-174A): Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems 

    June 24, 2022
    In response to US-CERT Alert AA22-174A, AttackIQ has released new malware transfer scenarios to the platform and recommends validating security controls using previously released scenarios addressing Log4Shell and the VMware CVE-2022-22954 vulnerability.  
    Read More

    Attack Graph Emulating the Conti Ransomware Team’s Behaviors

    June 15, 2022
    AttackIQ has released a new full-featured attack graph emulating the tactics, techniques, and procedures (TTPs) used by the Conti Ransomware Group. Despite the group’s recent dissolution, Conti’s successful post-compromise tactics, techniques, and procedures will live on. This attack graph will help defenders test their cyberdefense technologies against the full range of techniques and procedures that Conti used – and which Conti’s former members, now in other ransomware groups, will likely continue to use.
    Read More

    Attack Graph Response to US CERT AA22-152A: Karakurt Data Extortion Group 

    June 3, 2022
    AttackIQ has released a new fully featured attack graph emulating the tactics, techniques, and procedures used by the Karakurt Data Extortion Group recently reported in US-CERT Alert AA22-152. 
    Read More

    Testing your defenses against CVE-2022-30190: MSDT “Follina” 0-Day 

    June 2, 2022
    AttackIQ has released a new scenario to test your security controls against exploits used in the Follina 0-day. This new scenario helps security teams validate visibility, patching, security controls, and logging in their environments relative to this pervasive 0-day vulnerability. Elevate your security program performance using AttackIQ.
    Read More
    Blog Image for US Cert Alert AA22-152A

    Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group 

    June 2, 2022
    AttackIQ has released a new scenario and assessment in response to US-CERT Alert AA22-152A, Karakurt Data Extortion Group 
    Read More

    MITRE ATT&CK at Seven: The Seven Biggest Milestones

    May 31, 2022
    It’s been seven years since the MITRE ATT&CK framework was first published. Here, we look at some of the major milestones in its development and examine how the framework has become a game-changer for enterprise cybersecurity.
    Read More

    Announcing AttackIQ’s Malware Emulation Attack Graphs

    May 26, 2022
    We are immensely pleased to announce the first of AttackIQ’s “malware emulation attack graphs.” We broke down real-world malware into its logical steps to understand the adversary’s behavior. We then use our attack graph methodology to arrange the malware into its component tactics, techniques, and procedures. Using the malware emulation attack graph, defenders can emulate a specific strain of malware to test and validate their security controls. Take a look.
    Read More

    IDC’s Top Insights Around Purple Teaming

    May 25, 2022
    Why adopt purple teaming? This IDC analyst brief explains how blending red and blue mindsets helps you holistically prepare for cyberattacks.
    Read More