Ransomware

    The Evolution of RomCom: From Backdoor to Cyberwar 

    September 23, 2025
    AttackIQ research exposes RomCom’s espionage-to-ransomware convergence and provides 7 emulations to harden detection and response.
    Read More

    Attack Graph Response to CISA Advisory (AA23-319A): #StopRansomware: Rhysida Ransomware

    November 20, 2023
    On November 15, 2023, CISA published an Advisory (AA23-319A) that disseminates known Indicators of Compromise (IOCs), Tactics, Techniques, and Procedures (TTPs), and detection methods associated with Rhysida ransomware identified through FBI investigations. In September 2023, AttackIQ released two new attack graphs in response to recent reports of activities involving Rhysida ransomware.
    Read More

    Attack Graph Response to CISA Advisory (AA23-284A): #StopRansomware: AvosLocker Ransomware

    November 1, 2023
    AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA23-284A) that disseminates known Indicators of Compromise (IOCs), Tactics, Techniques, and Procedures (TTPs), and detection methods associated with AvosLocker ransomware identified through FBI investigations as recent as May 2023. AvosLocker is known for conducting activities against organizations across multiple critical infrastructure sectors using legitimate software and open-source remote system administration tools.
    Read More

    Emulating the Commodity Downloader GootLoader

    October 9, 2023
    AttackIQ has released three new attack graphs that aim to emulate the recent activities involving the commodity JavaScript-based downloader known as GootLoader.
    Read More

    Emulating the Controversial and Intriguing Rhysida Ransomware

    September 20, 2023
    AttackIQ has released two new attack graphs that seek to emulate the various activities carried out by the controversial Ransomware-as-a-Service (RaaS) known as Rhysida against multiple targets worldwide since its discovery in May 2023.
    Read More

    Attack Graph Response to CISA Advisory AA23-187A: Increased Truebot Activity Infects U.S. and Canada Based Networks

    July 10, 2023
    AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA23-187A) that seeks to emulate the activities carried out by the financially motivated and highly sophisticated criminal adversary known as TA505.
    Read More

    Attack Graph Response to CISA Advisory AA23-165A: Understanding Ransomware Threat Actors: LockBit

    June 14, 2023
    On June 14, 2023, the Cybersecurity and Infrastructure Security Agency (CISA) along with other US-based and international security organizations released a joint cybersecurity advisory (CSA) detailing the operations behind the LockBit ransomware attacks. AttackIQ has released a wide range of Attack Graphs emulating LockBit and other RaaS operators as part of CISA’s #StopRansomware campaign.
    Read More

    Attack Graph Response to CISA Advisory AA23-158A: #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability

    June 9, 2023
    AttackIQ has released a new attack graph and two network security validation scenarios in response to the recently published CISA Advisory (AA23-158A) detailing the CL0P Ransomware Gang. This actor also known as TA505, is a financially motivated and highly sophisticated criminal adversary considered to be a major player in the e-crime scene that has left a significant impact on the global cybersecurity landscape.
    Read More

    Attack Graph Response to CISA Advisory (AA23-061A): #StopRansomware: Royal Ransomware

    March 3, 2023
    AttackIQ has released a new fully featured attack graph that emulates the tactics, techniques, and procedures (TTPs) observed in cyberattacks involving Royal Ransomware.
    Read More

    Attack Graph Response to US-CERT Alert (AA22-249A): #StopRansomware Vice Society

    September 8, 2022
    AttackIQ has released a new attack graph emulating a Vice Society attack to help customers validate their security controls and their ability to defend against this threat actor and others who utilize similar behaviors.
    Read More
    Zeplin

    Attack Graph Response to US-CERT Alert (AA22-223A): Testing Security Controls against Zeppelin Ransomware 

    August 11, 2022
    AttackIQ’s Adversary Research Team has released a new assessment to test endpoint and network controls’ ability to prevent Zeppelin Ransomware.
    Read More

    Attack Graph Emulating the Conti Ransomware Team’s Behaviors

    June 15, 2022
    AttackIQ has released a new full-featured attack graph emulating the tactics, techniques, and procedures (TTPs) used by the Conti Ransomware Group. Despite the group’s recent dissolution, Conti’s successful post-compromise tactics, techniques, and procedures will live on. This attack graph will help defenders test their cyberdefense technologies against the full range of techniques and procedures that Conti used – and which Conti’s former members, now in other ransomware groups, will likely continue to use.
    Read More
    Blog Image for US Cert Alert AA22-152A

    Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group 

    June 2, 2022
    AttackIQ has released a new scenario and assessment in response to US-CERT Alert AA22-152A, Karakurt Data Extortion Group 
    Read More

    The trick to handling ransomware: prepare  

    January 19, 2022
    Ransomware is a vexing challenge and attacks have doubled since 2020, but there is a path out of the problem. In this new guide, Countering Ransomware with MITRE ATT&CK, AttackIQ outlines clear, practical steps to test and validate that your security program performs against ransomware. The trick is to prepare, and the path to follow is a threat-informed defense. Check it out and come join us for a technical demonstration of our ransomware capabilities on January 27.
    Read More
    Ransomware: Revealed

    Ransomware and Targeted Attacks in the Healthcare Sector

    September 23, 2021
    Although ransomware can have devastating effects regardless of which industry vertical an organisation is part of, the healthcare industry has particularly paid a heavy price in recent times.
    Read More

    Is Your Healthcare Organization Following These Four Ransomware Best Practices?

    August 24, 2021
    Healthcare is the most targeted sector for data breaches, and ransomware attacks were responsible for almost 50 percent of all healthcare data breaches in 2020. How should healthcare companies proceed? Our guest blogger in this ransomware series is Tracy Cohen, a cybersecurity expert with over a decade of experience managing cybersecurity risk in the healthcare and biopharma sector. She is also a licensed skydiver,
    Read More
    Ransomware: Revealed

    Azure Security Stack Mappings: The Top Native Security Controls for Ransomware

    August 23, 2021
    For the first time, organisations can visually see what Azure security controls can offer in terms of protection, detection and response. With 45 native Azure security control mappings, defenders can start focusing on not only TTPs in the context of Azure threats, but also how each native Azure security control might shield them from related TTPs in Azure.
    Read More

    Healthcare Under Siege: Should Hospitals Pay Hackers Ransom?

    August 9, 2021
    In 2020, three of the top 10 most searched terms were, unsurprisingly, healthcare-related. (Coronavirus, coronavirus update, coronavirus symptoms.) We’ve never been so attuned to what’s happening in our healthcare systems and hospitals.
    Read More

    The Kaseya VSA REvil Ransomware Supply Chain Attack: How It Happened, How It Could Have Been Avoided

    July 13, 2021
    On July 2, 2021, the REvil ransomware group successfully exploited a zero-day vulnerability in the on-premise Kaseya VSA server, enabling a wide-scale supply chain cyber attack. Let’s dig in and see how the attack happened, how attack emulation could have helped, and what you can do to implement a threat-informed defense strategy to prepare yourself for similar threat actor behavior.
    Read More

    Put MITRE ATT&CK® to work through Workbench

    June 22, 2021
    For years, users struggled to put MITRE ATT&CK into practice. With the release of ATT&CK Workbench today, defenders can far better ensure that their threat intelligence is continually aligned with the public ATT&CK knowledge base. See how and why.
    Read More

    Risky Business #624 — AttackIQ’s Mark Bagley and Jonathan Reiber talk with Patrick Gray of Risky Biz about how to solve the ransomware problem

    May 19, 2021
    Read More

    A historic plan, built for the public.

    September 15, 2020
    Read More

    Predicting Attack Behavior – Ransomware Patterns Strategic Leaders Need to be Aware of

    June 28, 2019
    Read More

    Securing Your Supply Chain

    May 5, 2019
    Read More