Frequently Asked Questions

Product Information & Cyber Attack Simulation

What is Cymulate and how does it help organizations with cyber attack simulations?

Cymulate is a cybersecurity platform that empowers organizations to continuously assess and validate their security posture through advanced threat simulation. It enables security teams to simulate both specific cyber attacks (like Dridex Trojan) and the underlying attack techniques, ensuring defenses are effective against both known and emerging threats. This dual approach helps organizations proactively identify vulnerabilities and optimize their security controls. [Source]

How does Cymulate differentiate between simulating real attacks and attack methods?

Cymulate allows organizations to simulate both the indicators of compromise (IoCs) of specific threats and the broader attack techniques those threats use. This means you can test if your controls block a known variant and also validate if your detection tools can catch new or unknown threats using the same underlying methods, such as macro-based code execution in Office files. [Source]

Why is it important to simulate both specific threats and underlying attack techniques?

Simulating both specific threats and underlying attack techniques ensures that your security controls can detect and prevent not only known attacks but also new variants and zero-day threats. While preventive controls may block known IoCs, detection controls must identify malicious behaviors, even if the threat is previously unseen. [Source]

What types of attack simulations does Cymulate provide?

Cymulate provides a wide range of attack simulations covering the full kill chain, including ransomware, malware, Advanced Persistent Threat (APT) groups, Common Vulnerabilities and Exposures (CVEs), and MITRE ATT&CK Tactics, Techniques, and Procedures (TTPs). [Source]

How does Cymulate's platform support custom attack chain building?

Cymulate Exposure Validation makes advanced security testing fast and easy by allowing users to build custom attack chains within a single, unified interface. This enables security teams to simulate complex, multi-stage attacks tailored to their environment. [Source]

What is Breach and Attack Simulation (BAS) as defined by Cymulate?

Breach and Attack Simulation (BAS) is a technology that automates real-world attack scenarios to evaluate an organization's security posture. It verifies defenses against the latest emergent threats and threat actors. Learn more

How quickly can I get started with Cymulate's breach and attack simulation platform?

Cymulate offers a free 14-day trial that takes minutes to set up and does not require a credit card. The platform is designed for rapid deployment and ease of use, allowing organizations to start testing their defenses almost immediately. [Source]

How does Cymulate help organizations stay ahead of zero-day and unknown threats?

Cymulate simulates both known attack indicators and the underlying techniques, enabling organizations to test their ability to detect and respond to zero-day and unknown threats that may bypass traditional preventive controls. [Source]

What is the difference between preventive and detective controls in the context of attack simulation?

Preventive controls rely on static indicators of compromise (IoCs) to block known threats, while detective controls use behavior-based tools, machine learning, and AI to identify malicious activity, including zero-day or unknown threats. Cymulate tests both types of controls to ensure comprehensive defense. [Source]

How does Cymulate's approach help with phishing and macro-based attacks?

Cymulate can simulate macro-based code execution in Office files, a common technique in phishing attacks. By testing whether security controls can detect and block such behaviors, organizations can better defend against threats that start with malicious email attachments. [Source]

What is the significance of simulating arbitrary code execution in security testing?

Simulating arbitrary code execution, such as launching code from any Office macro, helps organizations identify if their controls can prevent or detect a wide range of threats, not just specific malware strains. This approach strengthens defenses against evolving attack techniques. [Source]

How does Cymulate support continuous assessment and validation of security posture?

Cymulate enables organizations to continuously assess and validate their security posture by running automated attack simulations and providing actionable insights for improvement. This ongoing validation helps organizations stay resilient against new and evolving threats. [Source]

What is the role of behavior-based detection in Cymulate's simulations?

Behavior-based detection is crucial for identifying threats that do not match known IoCs. Cymulate's simulations test whether your security tools can detect malicious behaviors, such as unusual macro execution or lateral movement, even if the threat is new or unknown. [Source]

How does Cymulate help organizations move from control validation to exposure validation?

Cymulate enables security teams to go beyond validating individual controls by connecting vulnerabilities to real attack scenarios, helping organizations understand what is actually exploitable in their environment. [Source]

What is the value of using Cymulate for security teams with limited resources?

Cymulate automates complex attack simulations and provides actionable insights, allowing security teams with limited resources to efficiently validate their defenses and prioritize remediation efforts. [Source]

How does Cymulate's platform help with lateral movement attack prevention?

Cymulate's Attack Path Discovery feature automates testing for lateral movement, helping organizations identify and mitigate risks associated with attackers moving within the network after initial compromise. [Source]

Where can I find more resources and demos about Cymulate's capabilities?

You can access a variety of resources, including demos, whitepapers, and case studies, in Cymulate's Resource Hub. Featured demos include 'From Vulnerability to Validation' and 'Threat Validation Demo.' [Resource Hub]

How does Cymulate empower organizations to stay ahead of cyber threats?

Cymulate equips organizations with tools and insights for continuous assessment, threat simulation, and security validation, enabling them to proactively identify and address vulnerabilities before attackers can exploit them. [Source]

What is the Cymulate Exposure Validation solution?

Cymulate Exposure Validation is a solution that makes advanced security testing fast and easy, allowing organizations to build and execute custom attack chains to validate their security posture. [Source]

How does Cymulate help organizations validate their exposure to real-world threats?

Cymulate connects vulnerabilities to real attack scenarios, enabling organizations to validate what is actually exploitable and prioritize remediation based on real-world risk. [Source]

What is the process for booking a personalized Cymulate demo?

You can book a personalized Cymulate demo by visiting the Book a Demo page. The process is straightforward and allows you to see the platform in action, tailored to your organization's needs. [Book a Demo]

Features & Capabilities

What are the key features of Cymulate's platform?

Cymulate's platform offers continuous threat validation, a unified interface for Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), Exposure Analytics, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, and an extensive threat library with over 100,000 attack actions updated daily. [Source]

Does Cymulate integrate with other security technologies?

Yes, Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit the Partnerships and Integrations page.

How does Cymulate use AI and machine learning?

Cymulate leverages machine learning to deliver actionable insights for prioritizing remediation efforts, optimize security controls, and provide advanced exposure prioritization. [Source]

What is Cymulate's threat library and how is it maintained?

Cymulate provides an advanced library of over 100,000 attack actions aligned to MITRE ATT&CK, with daily updates to ensure coverage of the latest threats and techniques. [Source]

How does Cymulate support collaboration across security teams?

Cymulate enables collaboration between SecOps, Red Teams, and Vulnerability Management teams by providing a unified platform for exposure validation, threat simulation, and actionable reporting. [Source]

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, Red Teams, and Vulnerability Management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. [Source]

What measurable outcomes have customers achieved with Cymulate?

Customers have reported outcomes such as an 81% reduction in cyber risk within four months (Hertz Israel), a 52% reduction in critical exposures, a 60% increase in team efficiency, and a 20-point improvement in threat prevention. [Case Study]

What are common pain points Cymulate helps address?

Cymulate addresses pain points such as fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. [Source]

How does Cymulate tailor solutions for different security roles?

Cymulate provides tailored solutions for CISOs (metrics and risk prioritization), SecOps (automation and efficiency), Red Teams (automated offensive testing), and Vulnerability Management teams (in-house validation and prioritization). [Source]

Are there case studies demonstrating Cymulate's effectiveness?

Yes, Cymulate features case studies such as Hertz Israel (81% cyber risk reduction), Nemours Children's Health (improved cloud visibility), and Saffron Building Society (compliance and governance improvements). [Case Studies]

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly interface and ease of implementation. Testimonials highlight quick setup, accessible support, and actionable insights. [Customer Quotes]

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected. For a detailed quote, you can schedule a demo with the Cymulate team.

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating adherence to industry-leading security and privacy standards. [Security at Cymulate]

How does Cymulate ensure data security and privacy?

Cymulate ensures data security through encryption in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, a tested disaster recovery plan, and compliance with GDPR. The platform also features 2FA, RBAC, and IP address restrictions. [Security at Cymulate]

What application security practices does Cymulate follow?

Cymulate follows a strict Secure Development Lifecycle (SDLC), including secure code training, continuous vulnerability scanning, and annual third-party penetration tests to ensure robust application security. [Security at Cymulate]

Implementation & Support

How long does it take to implement Cymulate?

Cymulate is designed for rapid deployment, operating in agentless mode with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment. [Customer Quotes]

What support resources are available for Cymulate users?

Cymulate offers email and chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for real-time assistance and best practices. [Webinars]

Company & Vision

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity practices by enabling organizations to proactively validate their defenses, identify vulnerabilities, and optimize their security posture. The vision is to create a collaborative environment for lasting improvements in cybersecurity strategies. [About Us]

Where can I find the latest news, research, and events from Cymulate?

You can stay updated through Cymulate's Blog, Newsroom, and Events & Webinars pages.

Where can I find Cymulate's Resource Hub?

Cymulate's Resource Hub, containing insights, thought leadership, and product information, is available at https://cymulate.com/resources/.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Simulating Cyber Attacks vs. Cyber Attack Techniques Methods

By: Cymulate

Last Updated: December 12, 2024

One common misconception I hear from IT security teams is that simulating a specific threat, say the Dridex Trojan, is more ‘real’ than simulating a proprietary (dubbed “Dummy”) version of the Trojan that mimics the underlying attack method that is so critical to that very Trojan’s success.

Simulating Cyber Attacks

Case in point, one strain of the Dridex Trojan was found to hide its code in a Microsoft spreadsheet. To protect against that specific strain of Dridex, simulating the attack’s indicators of compromise (IoCs) would enable security teams to challenge and verify whether their preventive controls can catch that specific variant, including the organization’s email gateway, web proxy, firewall, AV, EDR, and other endpoint security controls. But tomorrow, a new version of Dridex may be released, with new IoCs. How do you know if your security controls can detect it? Plus, the latest strain may feature even newer techniques and system exploitation methods, that make yesterday’s simulation irrelevant. This is where simulating the underlying attack method becomes critical. Why? Because while you need preventive controls to catch a specific strain, (e.g. blacklists, FW, AV), your detective controls will ultimately determine if you can catch any strain that exhibits the same underlying attack method or technique. Preventive controls rely on static IoCs, while detection controls rely on behavior-based tools, machine learning, and AI to identify malicious activity. They are the ones that will let you catch a fileless, zero-day attack, or a yet-unknown threat that has managed to infiltrate your company.

The Cyber Attack Techniques Method

Back to the Dridex Trojan. One strain found in the wild injects specific code into a macro within an excel spreadsheet. When the file is opened, it will run, and execute system exploitation code that is specific to that strain; for example, opening a PowerShell command line UI and connecting to a specific C&C server. While the IoC simulation will ensure that your preventive controls will block comms with that C2 server, they will not help in dealing with the strain’s modus operandi. One option is to simulate arbitrary code execution launched by a spreadsheet macro—the same exploitation technique used by that strain. But the simulation would be unequivocally more effective if it simulated code execution launched by any macro in any Office suite file because that is the fundamental underlying attack method that can save your company from iterations of the same attack technique when performed by other threats, be they dridex or other Trojans or ransomware. In fact, if I can launch a picture of a fairy, or a calculator, from a spreadsheet macro, chances are I’ll be able to inject anything I want into ANY Office file macro. And as 94% of attacks start from phishing emails, an employee that opens a malicious file attachment may well become someone’s ‘patient zero.’ In my pen-testing days, I didn’t even inject malicious code into attack simulations. Why? Because if a potential attacker has enough wiggle room to plant proprietary, arbitrary code into an Office macro, instead of a picture of a fairy, it could be a worm next time. So, yes, there are specific IoCs and behaviors that the Dridex Trojan utilizes, and they keep evolving. That is why it is equally important to simulate the IoCs of a specific attack AS WELL AS the broader infiltration and exploitation techniques it uses to be successful in the first place. Try to differentiate between a real attack and real attack methods. Cymulate’s breach and attack simulation platform is the only solution that can do both. Each attack vector allows you to test the real attack methods AND the immediate threat assessment simulates real attacks. Get started by testing the breach and attack simulation platform for yourself. Our free trial is 14-days, takes minutes to set up, and doesn't require a credit card.
Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo