Cymulate Launches Industry’s First Agentless APT Simulation
Breach and Attack Simulation Leader, Cymulate, Launches Industry’s First Agentless APT Simulation to Validate Security Posture Empowers Enterprises and SMBs to test their security posture against the world’s most deadly attacks at the touch of a button Rishon Lezion, Israel – September 19, 2019 – Cymulate, a comprehensive, on-demand SaaS-based Breach and Attack Simulation (BAS) platform, today reveals its Agentless APT (Advanced Persistent Threat) Simulation, which replicates the most authentic experience of how such an attack would penetrate an organization’s network and identifies gaps across the entire kill chain. Often conducted by skilled hackers, APTs usually originate from either cyber criminals seeking personal financial information and intellectual property or from state-sponsored cyber attacks designed to steal data and compromise infrastructure. APTs utilize multiple vectors and entry points to navigate a company’s security defences and breach a network. Once inside the network, detection can be evaded for months as lateral movement is carried out below the radar in order to access their prized bounty. Recent research shows the ‘breakout time’ – the time it takes for an intruder to begin moving laterally from patient zero – of a Russian-based APT threat actor now averages around 18 minutes. A United Nations report claims that North Korea has amassed $2 billion through the use of widespread and increasingly sophisticated cyberattacks. According to Cymulate’s Research Lab, exposure to APT attacks remains high for organizations globally.
- 70% of organizations are vulnerable to Turla’s APT malware, Russian-speaking actors who recently revamped their arsenal to target government entities
- 85% of organizations are vulnerable to Russian-speaking APT group Silence, now becoming a major threat to banks and financial institutions globally
- 77% of organizations are vulnerable to TA505 actors, a Russian threat aimed at financial entities globally
- 85% of organizations are vulnerable to Chinese APT ‘Operation LagTime IT, currently targeting government IT agencies in East Asia
Featured Resources
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe