Response to CISA Advisory (AA24-326A): Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a US Critical Infrastructure Sector Organization
Ayelen Torello | | adversary emulation, CISA Alert, Critical Infrastructure, cyber resilience, Cybersecurity Advisory (CSA), Red Team Assessment (RTA), Red Teaming
In response to the recently published CISA Advisory (AA24-326A) which highlights the CISA Red Team's simulation of real-world malicious cyber operations, AttackIQ has provided actionable recommendations to help organizations emulate these attacks. These guidelines enable organizations to emulate tactics and techniques, helping to assess and improve their defenses against similar ... Read More
Emulating the Destructive WhisperGate Malware
Ayelen Torello | | adversary emulation, Critical Infrastructure, Cybersecurity Advisory (CSA), Malware, Ukraine, WhisperGate
AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with the destructive WhisperGate malware. The post Emulating the Destructive WhisperGate Malware appeared first on AttackIQ ... Read More
Emulating the Persistent and Stealthy Ebury Linux Malware
Ayelen Torello | | adversary emulation, Broad-Based Attacks, Credential Access, ddos, distributed denial of service, Ebury, Linux, Malware, SSH
AttackIQ has released a new attack graph that seeks to emulate the Tactics, Techniques and Procedures (TTPs) associated with Ebury Linux malware. Despite previous arrests and actions against key perpetrators, Ebury continues to evolve, and its operations remain active. The post Emulating the Persistent and Stealthy Ebury Linux Malware appeared ... Read More
Response to CISA Advisory (AA24-241A): Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations
Ayelen Torello | | adversary emulation, CISA Alert, Defense Industrial Base, education, Financial Services, Fox Kitten, government, Healthcare & Life Sciences, Iran, Lemon Sandstorm, Parisite, Pioneer Kitten, RUBIDIUM, UNC757
AttackIQ has released a new assessment template in response to the CISA Advisory (AA24-241A) published on August 28, 2024. The advisory outlines espionage activity associated with a specific group of Iranian cyber actors that have conducted a high volume of intrusion attempts against US organizations since 2017 and as recently ... Read More
Response to CISA Advisory (AA24-193A): CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth
AttackIQ has released two new assessment templates in response to the CISA Advisory (AA24-193A) published on July 11, 2024, that disseminates Tactics, Techniques and Procedures (TTPs), mitigation and detection methods associated with SILENTSHIELD red team assessment carried out by CISA against a Federal Civilian Executive Branch (FCEB) organization. The post ... Read More
Emulating the Notorious Chinese State-Sponsored Winnti Group
AttackIQ has released three new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the stealthy and notorious Winnti Group during its activities in 2021 and 2022. The post Emulating the Notorious Chinese State-Sponsored Winnti Group appeared first on AttackIQ ... Read More
Emulating the Open-Source Remote Access Trojan (RAT) AsyncRAT
Ayelen Torello | | adversary emulation, AsyncRAT, Broad-Based Attacks, GitHub, open source, remote-access Trojan, TTPs
AttackIQ has released two new attack graphs that seek to emulate the Tactics, Techniques and Procedures (TTPs) associated with and exhibited by the open-source Remote Access Trojan AsyncRAT during its activities in 2023. The post Emulating the Open-Source Remote Access Trojan (RAT) AsyncRAT appeared first on AttackIQ ... Read More
Emulating the Southeast Asian Adversary OceanLotus
Ayelen Torello | | adversary emulation, APT32, Civilian Institutions, Financial Services, Media & Entertainment, Ocean Buffalo, OceanLotus, Operation OceanStorm, Operation Typhoon, SeaLotus
AttackIQ has released four new attack graphs that seek to emulate the behaviors exhibited by the politically motivated Vietnamese adversary known as OceanLotus during its most recent and prevalent activities. The post Emulating the Southeast Asian Adversary OceanLotus appeared first on AttackIQ ... Read More