Frequently Asked Questions

Product Information & Technology

What is Cymulate and how does it help protect against cryptojacking?

Cymulate is a cybersecurity platform that enables organizations to proactively validate their defenses against threats like cryptojacking. By running automated attack simulations, Cymulate helps identify vulnerabilities and test the resilience of your infrastructure against mining malware and other cyber threats. Learn more about Cymulate's platform.

How does Cymulate Exposure Validation work?

Cymulate Exposure Validation allows organizations to simulate real-world attack scenarios, including cryptojacking, to assess the effectiveness of their security controls. It provides advanced security testing in a user-friendly interface, enabling custom attack chains and actionable insights. Read more about Exposure Validation.

What types of attack vectors does Cymulate simulate?

Cymulate simulates a wide range of attack vectors, including phishing, infected websites, watering hole attacks, social engineering, and lateral movement. This helps organizations test their defenses against threats like cryptojacking and ransomware. Learn more about Cymulate's attack simulations.

How does Cymulate help organizations detect cryptojacking malware?

Cymulate enables organizations to run simulations that mimic cryptojacking attacks, allowing them to check if their infrastructure has been compromised and evaluate their detection and response capabilities. This proactive approach helps identify gaps before attackers exploit them. Learn more about Cymulate's platform.

Can Cymulate simulate attacks using JavaScript mining scripts?

Yes, Cymulate can simulate attacks that use JavaScript mining scripts, which are commonly used in cryptojacking via infected websites. This helps organizations assess their vulnerability to in-browser mining and take steps to mitigate risks.

What is the primary purpose of Cymulate's platform?

The primary purpose of Cymulate's platform is to help organizations proactively validate their cybersecurity defenses, identify vulnerabilities, and optimize their security posture. It empowers security teams to stay ahead of emerging threats and improve their overall resilience. Learn more about Cymulate's mission.

How does Cymulate address the latest cyber threats?

Cymulate continuously updates its threat simulation library to address the latest cyber threats, including cryptojacking, ransomware, and lateral movement attacks. The platform provides daily updates and actionable insights to help organizations stay protected. Read Cymulate's blog for latest threats.

What is the Cymulate Exposure Management Platform?

The Cymulate Exposure Management Platform is a unified solution that integrates exposure validation, prioritization, attack path discovery, and automated mitigation. It enables organizations to continuously validate their security controls and optimize threat resilience. Read the whitepaper.

How can I start a free trial of Cymulate?

You can test the effectiveness of your security controls against possible cyber threats with a 14-day trial of Cymulate's platform. Start a Free Trial.

Features & Capabilities

What are the key capabilities of Cymulate's platform?

Cymulate offers continuous threat validation, unified exposure management, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, ease of use, and an extensive threat library with over 100,000 attack actions updated daily. Explore Cymulate's platform.

Does Cymulate support automated mitigation?

Yes, Cymulate integrates with security controls to push updates for immediate prevention of threats, enabling automated mitigation and faster response to emerging risks. Learn more about automated mitigation.

How does Cymulate prioritize exposures?

Cymulate validates exploitability and ranks exposures based on prevention and detection capabilities, business context, and threat intelligence, helping organizations focus on the most critical vulnerabilities. Learn more about exposure prioritization.

What is attack path discovery in Cymulate?

Attack Path Discovery in Cymulate identifies potential attack paths, privilege escalation, and lateral movement risks, enabling organizations to understand and mitigate complex threats. Learn more about attack path discovery.

How easy is Cymulate to use?

Cymulate is praised for its intuitive and user-friendly dashboard, requiring minimal setup and providing actionable insights with just a few clicks. Customers report immediate value and ease of implementation. Read customer testimonials.

What integrations does Cymulate offer?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. See the full list of integrations.

Does Cymulate support endpoint and cloud security validation?

Yes, Cymulate supports endpoint and cloud security validation through integrations with leading solutions such as AWS GuardDuty, Check Point CloudGuard, CrowdStrike Falcon, SentinelOne, and others. Learn more about cloud security validation.

Pricing & Plans

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's requirements. Pricing is determined by the chosen package, number of assets, and scenarios selected for testing. For a personalized quote, schedule a demo.

Implementation & Support

How long does it take to implement Cymulate?

Cymulate is designed for quick deployment, operating in agentless mode with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment. Book a demo.

What support options are available for Cymulate users?

Cymulate offers email support, real-time chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for querying security insights. Contact support or join a webinar.

Security & Compliance

What security certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating robust security and compliance standards. Read more about Cymulate's certifications.

How does Cymulate ensure data security?

Cymulate ensures data security through encryption for data in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, and a tested disaster recovery plan. Learn more about data security.

Is Cymulate GDPR compliant?

Yes, Cymulate incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO), ensuring GDPR compliance. Read more about GDPR compliance.

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, Red Teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. Learn more about Cymulate's target audience.

What problems does Cymulate solve for organizations?

Cymulate addresses fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. Read case studies.

Are there case studies showing Cymulate's impact?

Yes, Hertz Israel reduced cyber risk by 81% in four months, a sustainable energy company scaled penetration testing cost-effectively, and Nemours Children's Health improved detection in hybrid environments. Explore Cymulate's case studies.

How does Cymulate improve operational efficiency?

Cymulate automates security validation processes, leading to a 60% increase in team efficiency and saving up to 60 hours per month in testing new threats. Learn more about operational efficiency.

How does Cymulate help with post-breach recovery?

Cymulate enhances visibility and detection capabilities after a breach, ensuring faster recovery and improved protection by replacing manual processes with automated validation. Read Nedbank's case study.

Competition & Comparison

How does Cymulate differ from other security validation platforms?

Cymulate offers a unified platform combining Breach and Attack Simulation, Continuous Automated Red Teaming, and Exposure Analytics. It provides continuous threat validation, AI-powered optimization, complete kill chain coverage, ease of use, and proven results such as a 52% reduction in critical exposures and an 81% reduction in cyber risk. See Cymulate vs competitors.

What advantages does Cymulate offer for different user segments?

Cymulate delivers tailored solutions for CISOs (quantifiable metrics), SecOps (automation and efficiency), Red Teams (automated offensive testing), and Vulnerability Management teams (efficient prioritization). Learn more about solutions for each persona.

Educational Resources & Insights

Where can I find Cymulate's blog and newsroom?

You can stay updated with the latest threats, new research, and company news through Cymulate's blog and newsroom.

Where can I find resources like whitepapers, product info, and thought leadership articles?

Cymulate's Resource Hub is a central location for insights, thought leadership, and product information. Visit the Resource Hub.

Does Cymulate provide educational resources like a blog, glossary, or resource hub?

Yes, Cymulate provides a variety of educational resources, including a Resource Hub, blog, and glossary of cybersecurity terms. Explore resources.

Where can I read about preventing lateral movement attacks?

Cymulate has a blog post titled 'Stopping Attackers in Their Tracks' discussing common lateral movement attacks and prevention strategies. Read the blog post.

Where can I find resources about ransomware attacks in healthcare?

Cymulate provides a blog post explaining proactive cybersecurity strategies for healthcare organizations to protect against ransomware. Read the blog post.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Cryptojacking - The Latest Cybercrime Play

Last Updated: December 12, 2024

Following the news, you are quite likely awed by the boost in cryptocurrency, especially since Bitcoin has made the (financial) headlines. Founded in 2009, it has risen to levels we have seldom seen before. Needless to say, many other cryptocurrencies jumped on the bandwagon and are now catching up with Bitcoin. As detailed in the Global Cryptocurrency Benchmarking Study 2017 of the University of Cambridge, other cryptocurrencies have gained many followers and are traded much higher than ever before. Cryptojacking is a direct result of cryptocurrencies' rising popularity.

As we all know, anything of value is of interest to cyber crooks. Looking at the spectacular value gain that Bitcoin and the like were able to achieve during 2017, it did not take long for them to focus on ways to benefit from it.  Bitcoin is already familiar territory for them since it is their favorite currency to be paid in for ransomware extortion. But they did not want to use it only for payments, they quickly focused on ways to get more cryptocurrency with minimum effort. What better way to create a new income stream than by stealing cryptocurrency directly from their owners, end users, and cryptocurrency companies?  So what did they do? They are using their still effective cyber attack methods (such as phishing and browsing legitimate websites that were infected) to entice users to download their mining malware through payloads and scripts. They also use watering hole attacks and even social media shares e.g., Facebook messenger, to get their hands on their victims’ cryptocurrency. Unfortunately, those attacks are quite successful. As usual, social engineering is still the secret sauce for their attack success.

They use “cryptojacking” to use their victims’ computing devices to mine cryptocurrency without their victims even being aware of the attack. Although this attack vector in itself is not entirely new, it is still highly effective and has surged during the last months of 2017. To state it plainly - hackers have found a way to ride the cryptocurrency boom. From Bitcoins to Litecoins, Ethereum, Ripple, and Iota, - nothing is safe from those cyber crooks.

Sadly enough, we can presume that millions of users worldwide might already have been victimized, which would translate into millions of dollars in illegal gains for those cryptocurrency hackers. We already know that attacks have been carried out by e.g., infecting legitimate websites such as the CBS Showtime website, UFC live streams, and even governmental websites of countries such as Moldova and Bangladesh.

When web browsing is used as an attack vector, the cryptojackers use JavaScript on a legitimate webpage to mine digital cash. Since JavaScript is used on almost about every website, the JavaScript code responsible for in-browser mining doesn’t need to be installed. This way, the cyber crooks are sure that their victims will not even notice that their computers are secretly abused to mine cryptocurrency. When cyber crooks use emails as an attack vector, they send socially engineered crafted emails to millions of potential victims. Those emails are used to deliver the payload, which will try to install itself on the compromised station to start mining. Again, the victims will quite likely be unaware that their computer has been compromised.

As 2017 comes to a close, we at Cymulate want to warn all legitimate owners and miners of cryptocurrency worldwide that, sadly enough, they are under attack. Cybercrooks have branched out to become cryptocurrency hackers who are launching new forms of malware to harvest by hook and by crook the digital tokens that use the processing power on their victims’ computers for their own benefit. Their effective attacks are likely to have already affected millions of users. If this crime trend continues, many more will be victimized and their illegal gains will total millions of dollars. To illustrate, the Slovenian mining marketplace NiceHash was hacked on December 6, 2017, by professional attackers using sophisticated social engineering. Approximately 4,700 bitcoin were stolen with a market value of close to $64M (at December 7, 2017 prices).

To protect your cryptocurrency, we advise you to store them in a cold wallet (a physical device, such as a USB flash drive, that is disconnected from the web and can be plugged in when needed) instead of a hot wallet which is an internet-connected account that potentially can be accessed by hackers.

To protect users and organizations, we advise to check regularly if the infrastructure has been compromised. Since social engineering remains popular, organizations need to be vigilant and make sure that their employees will not fall victim to emails containing malware or phishing attacks that will trick them into downloading the malicious crypto mining script. By using the Cymulate platform, enterprises can run simulations anytime and from anywhere to check how resilient their infrastructure is against such attacks. To learn more, click here.

Test the effectiveness of your security controls against possible cyber threats with a 14-day trial of Cymulate's platform.

Start a Free Trial

Don’t speculate, Cymulate

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo