Cybercrime

    How Does Your Security Stack Up Against North Korean Hackers? Put Your Defenses to the Test!

    September 27, 2023
    AttackIQ has released a new Flex package designed to replicate the activities associated with the recent supply chain attack on 3CX software by Lazarus Group, a North Korean-based adversary.
    Read More

    Attack Graph Response to CISA Advisory AA23-187A: Increased Truebot Activity Infects U.S. and Canada Based Networks

    July 10, 2023
    AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA23-187A) that seeks to emulate the activities carried out by the financially motivated and highly sophisticated criminal adversary known as TA505.
    Read More

    Attack Graph Response to CISA Advisory AA23-165A: Understanding Ransomware Threat Actors: LockBit

    June 14, 2023
    On June 14, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) along with other US-based and international security organizations released a joint cybersecurity advisory (CSA) detailing the operations behind the LockBit ransomware attacks. AttackIQ has released a wide range of Attack Graphs emulating LockBit and other RaaS operators as part of CISA’s #StopRansomware campaign.
    Read More

    Emulating the Always Persistent Cybercrime Malware Emotet

    February 17, 2023
    AttackIQ has released two new attack graphs emulating recent Emotet campaigns that resulted in data exfiltration and ransomware extortion. This release continues our focused research on shared e-crime malware used in attacks by multiple threat actors.
    Read More
    Attack Graph for SysJoker’s Linux Variant (Cron)

    Malware Emulation Attack Graph for SysJoker’s Linux Variant

    August 2, 2022
    AttackIQ’s Adversary Research Team has released a new Malware Emulation Attack Graph that emulates the Linux behaviors of the multi-platform backdoor known as SysJoker.
    Read More

    What To Do in the Case of Brand Reputation Impersonation

    October 15, 2021
    Recently, AttackIQ was notified that an Iranian threat actor had created a fake domain and fraudulent website (attackiq[.]ir) impersonating AttackIQ and abusing the company brand. This blog is an account of what happened and how AttackIQ responded, and it aims to provide insights to help organizations prepare to deal with similar Brand Reputation Abuse situations.
    Read More

    Open Source Vulnerability Management

    April 28, 2019
    Read More

    MITRE ATT&CK Evaluations Of Cyber Security Products

    March 31, 2019
    Read More

    How the Experian Data Breach Case Might Change the Protection of Breach Investigation Reports

    May 27, 2017
    Read More