TTPs

    Attack Graph Response to CISA Advisory (AA23-284A): #StopRansomware: AvosLocker Ransomware

    November 1, 2023
    AttackIQ has released a new attack graph in response to the recently published CISA Advisory (AA23-284A) that disseminates known Indicators of Compromise (IOCs), Tactics, Techniques, and Procedures (TTPs), and detection methods associated with AvosLocker ransomware identified through FBI investigations as recent as May 2023. AvosLocker is known for conducting activities against organizations across multiple critical infrastructure sectors using legitimate software and open-source remote system administration tools.
    Read More

    Emulating the Iranian State-Sponsored Adversary APT35

    August 18, 2023
    AttackIQ has released a new attack graph that aims to emulate activities observed by the politically and military motivated state-sponsored Iranian-based adversary APT35, who is known to target multiple industries primarily in Europe, the Middle East, and North America.
    Read More

    Hiding in Plain Sight: Monitoring and Testing for Living-Off-the-Land Binaries

    March 16, 2023
    For malicious actors, opportunity can be found in the mundane. As adversaries continue to refine their approach with newer and more sophisticated methods to perform malicious activity, it is critical for detection engineers to stay up to date in the latest threat intelligence and adversary behaviors to monitor.
    Read More
    Blog Image for US Cert Alert AA22-152A

    Response to US-CERT Alert AA22-152A – Karakurt Data Extortion Group 

    June 2, 2022
    AttackIQ has released a new scenario and assessment in response to US-CERT Alert AA22-152A, Karakurt Data Extortion Group 
    Read More

    Attack Graph Response to US CERT AA22-074A: Russia-based actors disabling multi-factor authentication (MFA)  

    March 18, 2022
    AttackIQ has released a new attack graph to emulate Russia-based threat actors as they exploit multi-factor authentication protocols to disable MFA. This blog describes the scenarios we have included in the new attack graph to emulate the adversary and then, to inform a purple team construct for cyberdefense operations, it provides detection and mitigation recommendations that you can use to improve your security program effectiveness. Read on for more.
    Read More

    Testing with Realism: Attack Flows and AttackIQ Attack Graphs  

    March 11, 2022
    AttackIQ and the Center for Threat-Informed Defense are furthering the art of adversary emulation with the Center’s new Attack Flow project. Building on our deep research partnership with the Center, AttackIQ’s Attack Graphs emulate the adversary with specificity and realism to test advanced cyberdefense technologies against multi-stage attacks. Read on for more.
    Read More

    Don’t treat cybersecurity hygiene like your car engine light

    October 21, 2021
    ESG has just released the key findings of its cybersecurity hygiene and posture management survey, and in a poll of 400 cybersecurity professionals in North American enterprises, the number one action respondents said would improve cybersecurity hygiene? You guessed it: continuous security control validation.
    Read More

    Put MITRE ATT&CK® to work through Workbench

    June 22, 2021
    For years, users struggled to put MITRE ATT&CK into practice. With the release of ATT&CK Workbench today, defenders can far better ensure that their threat intelligence is continually aligned with the public ATT&CK knowledge base. See how and why.
    Read More

    10 Ways to Apply the MITRE ATT&CK Framework in Your Cybersecurity Strategy

    June 22, 2021
    There are a number of ways that the MITRE ATT&CK framework can be used in your cybersecurity practice. Here are 10 of the most important as laid out in the MITRE ATT&CK for Dummies eBook.
    Read More

    A Next Step “On The Road” (to Security Optimization)

    March 23, 2021
    AttackIQ’s new architecture upgrade makes it possible for customers to emulate comprehensive, multi-stage adversary cyberattack campaigns with realism and specificity, at every step in the kill chain. Check it out.
    Read More

    Lions and Tigers and a December Full of Adversary Activity – Oh My!

    December 23, 2020
    Defensive technologies can provide meaningful capabilities to isolate the adversary from compromised systems as defenders and threat hunters inspect their networks, preventing further reconnaissance and lateral movement, but only if their effectiveness is tested and validated.
    Read More

    Innovating During COVID-19 to Improve Security Effectiveness

    December 1, 2020
    Read More

    Countering ransomware with AttackIQ’s Security Optimization Platform

    August 19, 2020
    Ransomware is on the rise, particularly against city government and hospitals. In advance of the 2020 U.S. presidential election, how does the AttackIQ Security Optimization Platform help businesses to defend themselves?
    Read More

    Purple Teaming Chronicles II: Red-Team Augmentation

    June 30, 2020
    Read More

    Australian Cyber Security Centre (ACSC) Attacker Trends: Useful Information from the Government

    June 16, 2020
    Read More

    Fingerprinting FIN7

    April 20, 2020
    Read More

    Component Object Model Hijacking

    March 26, 2020
    Read More

    Emulating APT29 with AttackIQ

    February 26, 2020
    Read More

    The Hornet’s Nest was just Kicked… What’s Your Move?

    January 8, 2020
    Read More

    The 5 Keys to Success in Evaluating a Security Validation Platform

    June 5, 2019
    Read More

    Bypassing UAC Using Registry Keys

    May 14, 2018
    Read More

    Next Generation Security Teams Are Watching The Game Plays, Are You?

    June 27, 2016
    Read More