Frequently Asked Questions

Product Information & Threat Landscape

What is Cymulate and how does it help organizations defend against advanced persistent threats like OilRig?

Cymulate is a cybersecurity platform that empowers organizations to continuously assess and validate their security posture. It enables safe, real-world attack simulations in production environments, helping organizations test their defenses against advanced persistent threats (APTs) such as OilRig. By simulating attacks, Cymulate allows organizations to identify vulnerabilities and mitigate risks before actual attackers can exploit them. Learn more.

How does Cymulate's Breach & Attack Simulation (BAS) platform work?

Cymulate's BAS platform allows organizations to run simulated cyberattacks in their own environments without causing harm. This proactive approach helps test security controls, identify weaknesses, and validate the effectiveness of defenses against threats like APTs. The platform provides actionable insights to improve resilience and reduce risk. Read more.

What types of cyber threats does Cymulate help organizations prepare for?

Cymulate helps organizations prepare for a wide range of cyber threats, including advanced persistent threats (APTs) like OilRig and Leafminer, phishing attacks, malware deployment, lateral movement, and exploitation of vulnerabilities such as EternalBlue. The platform simulates real-world attack scenarios to ensure comprehensive defense validation. See examples.

How does Cymulate address threats from groups like Leafminer?

Cymulate enables organizations to simulate attacks similar to those used by groups like Leafminer, including watering hole attacks, phishing with malicious attachments, and exploitation of vulnerabilities. This helps organizations test their defenses, identify gaps, and implement mitigation strategies before real attacks occur. Learn more about watering hole attacks.

What is the significance of the QUADAGENT PowerShell backdoor in OilRig's campaigns?

The QUADAGENT PowerShell backdoor, attributed to OilRig, is a stealthy malware tool used to establish persistence and communicate with attackers' command and control servers. Cymulate's platform can simulate similar backdoor attacks, helping organizations detect and mitigate such threats before they cause harm. Read the analysis.

How does Cymulate help organizations in Europe defend against increasing Iranian cyber threats?

European organizations, such as those in Germany, face rising threats from Iranian APT groups. Cymulate provides proactive security validation, allowing these organizations to test and strengthen their defenses against sophisticated attacks, as recommended by intelligence agencies. Learn more.

What is a watering hole attack and how does Cymulate help prevent it?

A watering hole attack targets users by compromising websites they frequently visit. Cymulate can simulate watering hole attacks to test an organization's defenses and help implement effective mitigation strategies. Read more.

How does Cymulate support detection engineering and SIEM optimization?

Cymulate automates detection engineering with AI-powered attack simulations, helping organizations close detection gaps, reduce false positives, and improve mean time to detect threats. The platform also supports SIEM rule mapping and continuous validation. Learn more.

What is exposure validation and why is it important?

Exposure validation is the process of testing and confirming the effectiveness of security controls against real-world threats. Cymulate's exposure validation makes advanced security testing fast and easy, enabling organizations to build custom attack chains and validate their defenses in one place. Learn more.

How does Cymulate help organizations stay ahead of emerging threats?

Cymulate continuously updates its threat simulation library and research, enabling organizations to test their defenses against the latest attack techniques and vulnerabilities. This proactive approach helps organizations adapt quickly to new threats. Read the blog.

What is the role of living-off-the-land attacks in modern cyber threats?

Living-off-the-land attacks use legitimate tools and techniques already present in the target environment, making them harder to detect. Cymulate can simulate these tactics to help organizations identify and close detection gaps. Learn more.

How does Cymulate help organizations comply with regulatory requirements?

Cymulate enables organizations to validate their security controls and demonstrate compliance with industry regulations by providing quantifiable metrics and audit-ready reports. This helps organizations meet requirements for frameworks like ISO 27001 and SOC2. See certifications.

What is the value of continuous security validation?

Continuous security validation ensures that defenses remain effective as threats evolve. Cymulate's platform provides ongoing testing, actionable insights, and measurable improvements in security posture, helping organizations reduce risk and improve resilience. Learn more.

How does Cymulate help organizations detect lateral movement attacks?

Cymulate's Attack Path Discovery feature automates testing for lateral movement, helping organizations identify and mitigate risks of attackers moving within their networks. This is crucial for defending against APTs and advanced malware. Learn more.

What is the importance of validating exposures in hybrid and cloud environments?

Validating exposures in hybrid and cloud environments is essential as these infrastructures introduce new attack surfaces. Cymulate secures these environments through automated compliance and regulatory testing, ensuring comprehensive protection. Learn more.

How does Cymulate help organizations prioritize vulnerabilities?

Cymulate validates the exploitability of exposures and ranks them based on prevention and detection capabilities, business context, and threat intelligence. This helps organizations focus on the most critical vulnerabilities and optimize remediation efforts. Learn more.

What is the role of automation in Cymulate's platform?

Automation in Cymulate's platform streamlines security validation, reduces manual effort, and enables continuous testing. This leads to improved operational efficiency and faster identification of security gaps. Learn more.

How does Cymulate support collaboration across security teams?

Cymulate provides a unified platform for SecOps, Red Teams, and Vulnerability Management teams, enabling collaboration and a coordinated approach to addressing security challenges. This ensures alignment of security strategies with business goals. Learn more.

Features & Capabilities

What are the key features of Cymulate's platform?

Cymulate's platform offers continuous threat validation, unified Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), Exposure Analytics, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, ease of use, and an extensive threat library with over 100,000 attack actions updated daily. See full feature list.

Does Cymulate integrate with other security technologies?

Yes, Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. See all integrations.

How easy is it to implement Cymulate?

Cymulate is designed for quick and easy implementation. It operates in agentless mode, requires minimal resources, and can be deployed without additional hardware or complex configurations. Customers can start running simulations almost immediately. Book a demo.

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive interface and ease of use. Testimonials highlight the platform's user-friendly dashboard, quick implementation, and accessible support. For example, Raphael Ferreira, Cybersecurity Manager, said, "Cymulate is easy to implement and use—all you need to do is click a few buttons." Read more testimonials.

What certifications does Cymulate hold for security and compliance?

Cymulate holds several key certifications, including SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1. These certifications demonstrate Cymulate's commitment to robust security and compliance standards. See details.

How does Cymulate ensure data security and privacy?

Cymulate ensures data security through encryption in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, a tested disaster recovery plan, and compliance with GDPR. The platform also features 2FA, RBAC, and IP address restrictions. Learn more.

What is Cymulate's approach to application security?

Cymulate follows a strict Secure Development Lifecycle (SDLC), including secure code training, continuous vulnerability scanning, and annual third-party penetration tests to ensure application security. See more.

How does Cymulate support HR security and employee awareness?

Cymulate's employees undergo ongoing security awareness training, phishing tests, and adhere to comprehensive security policies to maintain a strong security culture. Learn more.

Is Cymulate GDPR compliant?

Yes, Cymulate is GDPR compliant and incorporates data protection by design. The company has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO). See details.

What is Cymulate's update and innovation cycle?

Cymulate updates its SaaS platform every two weeks, introducing new features such as AI-powered SIEM rule mapping and advanced exposure prioritization to keep customers ahead of emerging threats. Learn more.

What is the Cymulate Resource Hub?

The Cymulate Resource Hub is a central location for insights, thought leadership, whitepapers, product information, and more. It helps users stay informed about the latest trends and best practices in cybersecurity. Visit the Resource Hub.

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, Red Teams, and Vulnerability Management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. Learn more.

What measurable outcomes have customers achieved with Cymulate?

Customers have reported outcomes such as an 81% reduction in cyber risk (Hertz Israel, four months), a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. Read the Hertz Israel case study.

How does Cymulate address the pain point of fragmented security tools?

Cymulate integrates exposure data and automates validation, providing a unified view of the security posture and reducing gaps caused by disconnected tools. Learn more.

How does Cymulate help organizations with resource constraints?

Cymulate automates security validation processes, improving efficiency and allowing security teams to focus on strategic initiatives rather than manual tasks. Learn more.

How does Cymulate help with unclear risk prioritization?

Cymulate validates exposures and provides actionable insights, enabling organizations to prioritize vulnerabilities based on exploitability, business context, and threat intelligence. Learn more.

How does Cymulate address cloud complexity?

Cymulate secures hybrid and cloud infrastructures through automated compliance and regulatory testing, helping organizations manage new attack surfaces and validation challenges. Learn more.

How does Cymulate help CISOs and security leaders communicate risk?

Cymulate provides quantifiable metrics and insights, enabling CISOs and security leaders to justify investments and communicate risks effectively to stakeholders. Learn more.

How does Cymulate support Red Teams?

Cymulate offers automated offensive testing with a library of over 100,000 attack actions aligned to MITRE ATT&CK and daily threat intelligence, enabling Red Teams to scale and enhance their testing capabilities. Learn more.

How does Cymulate improve vulnerability management?

Cymulate automates in-house validation between penetration tests and prioritizes vulnerabilities effectively, improving operational efficiency for vulnerability management teams. Learn more.

How does Cymulate help organizations recover from breaches?

Cymulate enhances visibility and detection capabilities, ensuring faster recovery and improved protection after a breach by replacing manual processes with automated validation. Read the Nedbank case study.

Where can I find Cymulate's latest news, research, and events?

You can stay updated with Cymulate's latest news, research, and events by visiting the blog, newsroom, and events & webinars page.

Pricing & Plans

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected. For a detailed quote, schedule a demo.

Competition & Comparison

How does Cymulate compare to other security validation platforms?

Cymulate stands out with its unified platform that combines BAS, CART, and Exposure Analytics, continuous threat validation, AI-powered optimization, complete kill chain coverage, ease of use, and measurable outcomes. It is recognized as a market leader by Frost & Sullivan and a Customers' Choice in 2025 Gartner Peer Insights. See comparisons.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

OilRig Keeps On Cyber Drilling

By: Cymulate

Last Updated: May 13, 2025

cymulate blog article

Iranian-based Hacker Group OilRig Keeps Cyber Drilling, Posing a Persistent Threat

OilRig, also known as PT34 or Helix Kitten, is a well-known Iranian Advanced Persistent Threat (APT) group linked to multiple cyber operations targeting technology service providers and government entities. Between May and June 2018, the group launched a three-wave campaign using spear-phishing emails crafted to appear as legitimate communications from a Middle Eastern government agency.

These emails contained a portable executable file (converted from .bat), which, when downloaded, deployed the QUADAGENT PowerShell backdoor. The dropper executed silently, downloaded the backdoor, established persistence through a scheduled task, and triggered the final payload. Communication with the attackers’ Command & Control server occurred via rdppath[.]com, utilizing HTTPS, HTTP, and DNS tunneling.

OilRig’s campaigns demonstrate the strategic use of social engineering, stealthy malware deployment, and multi-protocol communication methods—highlighting the persistent threat posed by state-sponsored cyber actors.

The QUADAGENT Backdoor: A Tool of Destruction

In their third wave against the government entity, the hackers made a slight change. They used the Microsoft .NET Framework for conversion and installed a fake error box when the duped victim executed the malicious file. Once the malware was dropped and executed, the backdoor would connect to the hackers’ Command & Control Center at cpuproc[.]com. In all attacks, the malware was running silently in the background, avoiding detection by cybersecurity solutions.

It is important to note that all evidence points to OilRig being the author of the QUADAGENT PowerShell backdoor. This means that we will see many more attacks where this tool will be used by threat actors.

Leafminer: A New Player in Iran’s Cyber Arsenal

OilRig is not the only Iran-based hacker group wreaking havoc. Newcomer Leafminer seems to specialize in espionage and has attacked a long list of governments and companies in Saudi Arabia, Egypt, Israel and Pakistan. Archenemy Saudi Arabia was hit most, also targeting its healthcare facilities. In second place was Lebanon (including the country’s intelligence agency) followed by Israel and Kuwait.

Leafminer used watering hole attacks and phishing emails with malicious attachments. Those specific payloads were designed to exploit the EternalBlue vulnerability. Furthermore, it seems that Leafminer favors a "living-off-the land" approach, which consists of using tactics, techniques and procedures (TTP) that are publicly available or have already been tried and tested by other hackers/hacker groups. Although it seems that Leafminer concentrated its attacks on targets in the Middle East, it can be expected that the US and European countries (such as Germany and the UK) will become targets as well.

Europe in the Crosshairs: Iran's Expanding Cyber Reach

In Europe, Germany has been a prime target for this kind of APT attacks. In its latest report, the German intelligence agency (Bundesamt für Verfassungsschutz or BfV) stated that the number of cyberattacks contributed to Iran has been on the rise since 2014, with a sharp increase in 2017. Interior Minister Horst Seehofer concluded that the BfV should not only identify and mitigate cyberattacks but also apply proactive measures.

Cymulate’s Breach & Attack Simulation (BAS) platform could be such a proactive measure, since it allows an agency or company to run real cyberattacks in their own production environment in a safe manner without harming their network in any way. This allows them to test their security posture and mitigate APT attacks before they can hit and penetrate the networks.

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo