Frequently Asked Questions

Pricing & Plans

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected for testing and validation. For a personalized quote, schedule a demo with Cymulate's team. (Source: manual)

How is Cymulate's subscription fee determined?

The subscription fee is based on the features and capabilities included in the selected package, the number of assets covered, and the scenarios chosen for testing and validation. (Source: manual)

Features & Capabilities

What are the key capabilities of Cymulate's platform?

Cymulate offers continuous threat validation, unified platform integration (BAS, CART, Exposure Analytics), attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, ease of use, and an extensive threat library with over 100,000 attack actions updated daily. (Source: https://cymulate.com/platform/)

Does Cymulate support integrations with other security technologies?

Yes, Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit our Partnerships and Integrations page. (Source: https://cymulate.com/cymulate-technology-alliances-partners/)

How does Cymulate automate threat validation?

Cymulate runs 24/7 automated attack simulations to validate security defenses in real-time, leveraging a library of over 100,000 attack actions aligned to MITRE ATT&CK and updated daily. (Source: https://cymulate.com/platform/)

What are the benefits of using Cymulate?

Benefits include improved security posture (up to 52% reduction in critical exposures), operational efficiency (60% increase in team efficiency), faster threat validation (40X faster than manual methods), cost savings, enhanced threat resilience (81% reduction in cyber risk within four months), and better decision-making with actionable insights. (Source: https://cymulate.com/solutions/optimize-threat-resilience/)

Competition & Comparison

How does Cymulate differ from similar products in the market?

Cymulate stands out with its unified platform (BAS, CART, Exposure Analytics), continuous threat validation, AI-powered optimization, complete kill chain coverage, ease of use, proven results (52% reduction in critical exposures, 60% increase in efficiency, 81% reduction in cyber risk), continuous innovation, and extensive threat library. (Source: https://cymulate.com/cymulate-vs-competitors/)

What advantages does Cymulate offer for different user segments?

CISOs benefit from quantifiable metrics and insights; SecOps teams gain operational efficiency and faster threat validation; Red Teams access automated offensive testing with 100,000+ attack actions; Vulnerability Management teams automate in-house validation and prioritize vulnerabilities. (Source: https://cymulate.com/roles-ciso-cio/)

Use Cases & Benefits

Who can benefit from Cymulate's platform?

Cymulate is designed for CISOs, security leaders, SecOps teams, Red Teams, and Vulnerability Management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. (Source: EM Platform Message Guide.pdf)

Is Cymulate suitable for enterprises with complex security needs?

Yes, Cymulate is ideal for enterprises needing compliance, continuous threat validation, and exposure management across hybrid and cloud environments. It supports organizations with over 10,000 employees and complex infrastructures. (Source: EM Platform Message Guide.pdf)

What problems does Cymulate solve for security teams?

Cymulate addresses overwhelming threats, lack of visibility, unclear risk prioritization, resource constraints, fragmented tools, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies, and post-breach recovery challenges. (Source: manual)

Are there case studies showing Cymulate's impact?

Yes. For example, Hertz Israel reduced cyber risk by 81% in four months; a sustainable energy company scaled penetration testing cost-effectively; Nemours Children's Health improved detection in hybrid/cloud environments. See more at our Case Studies page. (Source: https://cymulate.com/customers/)

Technical Requirements & Implementation

How easy is it to implement Cymulate?

Cymulate is designed for quick, agentless deployment with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately after deployment. (Source: manual)

What resources are required to start using Cymulate?

Customers are responsible for providing necessary equipment, infrastructure, and third-party software as per Cymulate’s prerequisites. The platform integrates seamlessly into existing workflows. (Source: manual)

Support & Educational Resources

What support options does Cymulate provide?

Cymulate offers email support ([email protected]), real-time chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for querying the knowledge base and creating AI templates. (Source: manual)

Does Cymulate provide educational resources?

Yes, Cymulate offers a Resource Hub, blog, glossary, webinars, and e-books covering best practices, threat research, and product information. Visit our Resource Hub. (Source: https://cymulate.com/resources/)

Where can I find Cymulate's blog and newsroom?

For insights on threats, research, and company news, visit our blog and our newsroom. (Source: https://cymulate.com/news/)

Where can I find resources like whitepapers, product info, and thought leadership articles?

All resources, including whitepapers, product information, and thought leadership articles, are available in our Resource Hub. (Source: https://cymulate.com/resources/)

Product Information

What is Cymulate's Exposure Management Platform?

The Exposure Management Platform is Cymulate's unified solution for continuous threat validation, exposure prioritization, attack path discovery, automated mitigation, and collaboration across teams. It helps organizations prove threats and improve resilience. (Source: https://cymulate.com/platform/)

How does Cymulate's Attack Path Discovery feature work?

Attack Path Discovery automates testing for lateral movement, privilege escalation, and identifies potential attack paths within your environment. For more details, visit Attack Path Discovery. (Source: https://cymulate.com/attack-path-discovery/)

What is Cymulate's Automated Mitigation capability?

Automated Mitigation integrates with security controls to push updates for immediate prevention of threats, optimizing your security posture. (Source: https://cymulate.com/automated-mitigation/)

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating robust security and compliance standards. (Source: https://cymulate.com/security-at-cymulate/)

How does Cymulate ensure data security?

Cymulate uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, and a tested disaster recovery plan. Application security includes secure development lifecycle, vulnerability scanning, and annual third-party penetration tests. (Source: https://cymulate.com/security-at-cymulate/)

Is Cymulate GDPR compliant?

Yes, Cymulate incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO). (Source: https://cymulate.com/security-at-cymulate/)

Customer Experience & Feedback

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive interface and ease of use. Testimonials highlight quick implementation, user-friendly dashboards, actionable insights, and accessible support. For example, Raphael Ferreira, Cybersecurity Manager, said, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights." (Source: https://cymulate.com/customers/)

Are there customer success stories for Cymulate?

Yes, Cymulate has numerous customer success stories, including Hertz Israel's 81% reduction in cyber risk, Nemours Children's Health's improved detection, and Saffron Building Society's compliance achievements. Read more at our Case Studies page. (Source: https://cymulate.com/customers/)

Company Information & Vision

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity practices by enabling organizations to proactively validate defenses, identify vulnerabilities, and optimize their security posture. The vision is to create a collaborative environment for lasting improvements in cybersecurity. (Source: https://cymulate.com/about-us/)

What is Cymulate's company size and history?

Cymulate serves customers across industries and sizes, from small enterprises to large corporations with over 10,000 employees. It is recognized as a market leader in automated security validation and continuously innovates its SaaS platform. (Source: https://cymulate.com/about-us/)

Threats & Attack Simulation

How does Cymulate help organizations address email gateway exposures?

Cymulate identifies gaps in email gateway controls that could be exploited by attackers to deliver ransomware, steal credentials, or exfiltrate sensitive data. (Source: Customer Story - The Nesting Trick That Bypassed the Gateway.pdf)

Do you have resources about preventing lateral movement attacks?

Yes, Cymulate provides a blog post titled 'Stopping Attackers in Their Tracks' discussing lateral movement attacks and prevention strategies. Read it at our blog. (Source: https://cymulate.com/attack-path-discovery/)

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: Azure Arc Privilege Escalation & Identity Takeover
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

The Most Malicious Threat Actors Using Email

Last Updated: March 25, 2025

cymulate blog article

Cyberattacks using emails have been the most widely used attack vector for the past few years, including this year. Threat actors are spreading ransomware, trojans, malware, and more with a simple email. In this blog, we will review the breakdown and the average penetration ratio per category of threats.

In 2018, 858 worldwide organizations from various sectors mainly financial ones, including banks and insurance companies, turned to Cymulate to have their “cyber defenses” tested. We saw results across the board and want to share the statistics.  

Armed Email Attacks by the Numbers

While some institutions were well-protected with less than 10% of email malware attacks slipping through, other institutions had over 70% of the malicious emails sent penetrate their organization’s parameters and bypass the email security controls.

As a Proof of Concept (POC), the organizations used Cymulate to check within minutes how vulnerable they are in case of a threat actor attacked them in the email attack vector. The platform initiated an attack consisting of dozens of emails armed with different file attachments. Seven categories of attacks were used to test which percentage in each category would breach the organization. In order to analyze the detection capabilities of the different security controls, these categories were divided to malicious and non-malicious attacks.

During the analysis, a staggering average of 59% of malicious e-mails went through. It was found that 43% of emails contained ransomware penetrated, 40% of the emails contained worms penetrated, 54% of the emails contained some kind of exploit penetrated, 51% of the emails contained code execution penetrated, 40% of the emails contained payloads penetrated, and emails which contained malicious links and Trojans penetrated with a ratio of 30% each.

Non-Malicious Code Execution

Ratio of Penetration

  • Exploits with a non-malicious shellcode= 54%

Non-Malicious Code Execution

Ratio of Penetration

  • Exploits with a non-malicious shellcode= 54%
  • Pure Code execution = 51%

Malicious Code Execution by Type

Ratio of Penetration

  • Ransomware = 43%
  • Worms = 40%
  • Payloads = 40%
  • Malicious Links = 30%
  • Trojans = 29%

The Weapon of Choice: Common File Types

In a recent analysis done by Helsinki-based security provider F-Secure, 85% of all malicious emails sent by threat actors have a .DOC, .XLS, .PDF, .ZIP, or .7Z attached. These numbers fit quite well with the results found during the many assessments performed with Cymulate and it is well understood with these files are the weapon of choice used by malicious hackers, cyber criminals and even nation powers.

Out of the 35 different file extensions used, we saw that attacks based on .xls with a macro or OLE embedded object or .oft with an OLE embedded object attachments embedded within an email penetrated the most with 75% penetration ration each. PDF file-based attacks came in second, reaching 60% penetration ration. Altogether, attacks based on office files with macros or OLE embedded objects such as .doc, docx, .xlsx and .ppt had between 30% -34% penetration ratio each.

The Threat Actors Spreading Common File Types

Numerous attacks such as Emotet and Hancitor which wreaked havoc during 2018 were delivered using these type of email attacks. As seen with multiple threat actors such as Cobalt Group, Lazarus group, Leviathan and other multiple APT groups (such as APT28 and APT32) have been using office file attachments like the ones above to spread their attacks.

The Breakdown 

File TypePenetratedDescription of File Type
.xls75%Microsoft Excel with a macro or OLE embedded object
.oft75%Outlook template file with an Attachment
.vcs68%Calendar appointment with an attachment
.pdf60%A pdf file with an attachment
.ics59%Calendar appointment with an attachment
.html50%HTML file with an automatic downloader
.ppt26%Microsoft PowerPoint with a macro or OLE embedded object
.doc20%Microsoft Word with a macro or OLE embedded object

 

Results of The Analysis

The main issue to be aware of is these file attachments used as payload-carrying mechanisms as described above. (.DOC, .XLS, .PDF, .ZIP, or .7Z) 

  • Vendors providing secure email solutions such as SEG, Sandbox, etc. have not concentrated their capabilities on a very important attack method using the email vector where the popular and widely used files such as standard calendar files with the extension ics and vcs with a malicious attachment, had a penetration rate of 59% and 68%. This penetration technique has been used by threat actors for a couple of years as covered by SANS.
  • Even more frightening was the fact that some organizations still allow emails containing .exe and .cmd to get inside their organization by email. Though the statistics of these successful attacks were low at around 2.5% penetration, it still happened.

Summary

By looking into the results of these assessments, an organization can configure its security controls to block any email containing specific attachments or set rules in the mail filters and sand boxes to sanitize emails containing specific attachments and prevent these sorts of attacks to penetrate the organization and land at an employee’s email box.

One last and very important thing for employees: Take a few extra seconds before clicking on an email could be all it takes to avoid a nasty ransomware, credential harvesting trojan, or cryptomining malware infection.

Want to validate if your security products will intercept these malicious emails? Cymulate enables you to validate your current security and identify possible gaps in the face of a simulated multi-vector, internal and external attacks, including the very latest vulnerabilities.

Cymulate Exposure Validation makes advanced security testing fast and easy. When it comes to building custom attack chains, it's all right in front of you in one place.
Mike Humbert, Cybersecurity Engineer
DARLING INGREDIENTS INC.
Learn More
Book a Demo