Frequently Asked Questions

Threats & Attack Techniques

What is a fake installer attack and how does it work?

A fake installer attack involves a user downloading a malicious file disguised as a legitimate software installer (such as TeamViewer). Once executed, the installer drops malware, creates additional files, and may use tools like BITS admin to download further payloads. These attacks can steal credentials, establish persistence via scheduled tasks and registry entries, and open the door for further exploitation by attackers.

How do attackers use BITS admin in malware campaigns?

Attackers leverage BITS admin, a command-line tool for managing file transfers, to download arbitrary files from the internet. In the context of fake installer attacks, BITS admin is used to fetch additional malicious payloads, making it harder for traditional security tools to detect the activity.

What types of data are targeted in fake installer attacks?

Fake installer attacks often target credentials stored in browsers, such as those found in Microsoft Edge's credential store. Attackers copy these credentials to gain access to personal, business, or financial accounts, and may sell the stolen data on underground markets.

How do attackers maintain persistence after a fake installer attack?

Attackers maintain persistence by creating scheduled tasks and modifying the AutoStart registry to ensure their malware runs on system startup. For example, they may use schtasks.exe to create a scheduled task or add entries to the Windows registry to automatically launch malicious executables.

Why are users vulnerable to fake installer attacks?

Users are vulnerable because they often search for free or cracked versions of software and trust unofficial sources. Attackers exploit this trust by distributing malware disguised as legitimate installers, leading to credential theft and system compromise.

What is the impact of credential theft in fake installer attacks?

Credential theft can lead to unauthorized access to sensitive accounts, financial loss, and further compromise of personal or organizational data. Stolen credentials are often sold on underground markets, increasing the risk of widespread exploitation.

How does Cymulate help organizations detect and respond to fake installer threats?

Cymulate's platform validates threats across the full kill chain, including malware delivery, credential theft, and persistence mechanisms. By simulating real-world attacks like fake installers, Cymulate helps organizations identify exploitable exposures and validate the effectiveness of their security controls.

Which types of threats can Cymulate validate?

Cymulate validates threats across the full kill chain—including phishing, malware, lateral movement, data exfiltration, and zero-day exploits—using daily updated threat templates and AI-generated attack plans. Learn more.

How does Cymulate's immediate threats module help organizations respond to new attacks?

Cymulate's immediate threats module is updated rapidly to reflect the latest attacks. According to a Penetration Tester, "if an attack is new, you can quickly assess your IT estate for how much of a risk is posed to you and implement remedial action quickly."

What is threat exposure prioritization in cybersecurity?

Threat exposure prioritization is the process of identifying and ranking vulnerabilities and other security weaknesses based on their actual exploitability and impact on business-critical assets. Cymulate uses automated threat validation and exposure scoring to help teams focus on exposures that are not protected by security controls. Learn more.

How does Cymulate's 'Threat (IoC) updates' feature improve threat resilience?

Cymulate's 'Threat (IoC) updates' feature provides recommended Indicators of Compromise (IoCs) that can be directly applied to security controls. These can be exported via the UI or API in plain text or STIX format, enabling control owners to quickly build defenses against new threats and improve overall threat resilience.

What does Cymulate mean by 'threats validated'?

'Threats validated' refers to Cymulate's capability to provide full-spectrum validation across an organization's tools, controls, and environments. This process allows security teams to know exactly where their defenses fail by proving the exploitability of threats in their specific environment. Learn more.

What problems does Cymulate's Threat Validation solution solve for security teams?

Cymulate's Threat Validation solution addresses two critical problems: lack of confidence in security controls (as threats evolve faster than controls) and security configuration drift (where changes over time decrease threat coverage and create new gaps).

What are insider attacks and how can the risks be mitigated?

Insider attacks originate from internal actors, either maliciously or accidentally. Key risks include privileged users bypassing controls, lack of monitoring on internal traffic, and inadequate segmentation. Prevention tips include enforcing least privilege access, monitoring user behavior with UEBA, and regularly testing segmentation and access controls. Learn more.

How accessible are crimeware kits for aspiring hackers?

Crimeware kits are now widely available and inexpensive, lowering the barrier to entry for individuals seeking to engage in malware distribution. This trend is discussed in detail in a ZDNet article referenced by Cymulate.

What is Gartner's prediction regarding threat exposure findings by the year 2028?

Gartner predicts that by 2028, more than half of threat exposure findings will result from nontechnical vulnerabilities, rather than technical flaws, requiring a fundamental shift in security priorities as these risks surpass traditional IT concerns. Read more.

Features & Capabilities

What are the key capabilities of Cymulate's platform?

Cymulate offers continuous threat validation, a unified platform combining Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics, AI-powered optimization, complete kill chain coverage, attack path discovery, automated mitigation, cloud validation, and ease of use. Customers report measurable outcomes such as a 52% reduction in critical exposures and a 60% increase in team efficiency. Learn more.

What integrations does Cymulate support?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore (network security), AWS GuardDuty (cloud security), BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, CrowdStrike Falcon, Cybereason, and more. For a complete list, visit the Partnerships and Integrations page.

What technical documentation is available for Cymulate?

Cymulate provides whitepapers, guides, solution briefs, data sheets, and e-books covering topics like exposure management, CTEM, threat detection, and vulnerability management. Access the full resource library at the Resource Hub.

How easy is Cymulate to implement and use?

Cymulate is designed for rapid deployment and ease of use. Customers report that implementation is fast and straightforward, with agentless mode, quick deployment, minimal resource requirements, and comprehensive support. "All you need to do is click a few buttons," says Raphael Ferreira, Cybersecurity Manager. Read more.

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive design and user-friendly dashboard. Testimonials highlight the platform's simplicity, ease of deployment, and excellent support. For example, a Senior Security Analyst noted, "Cymulate support is always easily accessible and they are a main contributing factor to why the tool is so easy to use." Read more.

What security and compliance certifications does Cymulate have?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating robust security and compliance practices. Learn more.

How does Cymulate ensure product security and compliance?

Cymulate employs a robust security program with secure AWS data centers, encryption for data in transit and at rest, a strict Secure Development Lifecycle (SDLC), continuous vulnerability scanning, annual third-party penetration tests, and ongoing employee security training. The platform is GDPR-compliant and has a dedicated privacy and security team. Read more.

What is the primary purpose of Cymulate's platform?

The primary purpose of Cymulate's platform is to harden defenses and optimize security controls by proactively validating controls, threats, and response capabilities. This enables organizations to focus on exploitable exposures and strengthen their overall security posture. Learn more.

How does Cymulate address the needs of different security roles?

Cymulate tailors its solutions for CISOs, SecOps teams, Red Teams, and Vulnerability Management teams, providing validated exposure scoring, operational efficiency, scalable offensive testing, and prioritized remediation. Each persona benefits from features and insights relevant to their responsibilities. Learn more.

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's needs. Pricing depends on the chosen package, number of assets, and scenarios selected. For a custom quote, schedule a demo with Cymulate's team.

What business impact can customers expect from using Cymulate?

Customers can expect a 30% improvement in threat prevention, a 52% reduction in critical exposures, a 60% increase in operational efficiency, 40X faster threat validation, an 85% improvement in threat detection accuracy, and an 81% reduction in cyber risk within four months. Learn more.

How does Cymulate differ from other security validation platforms?

Cymulate stands out with its unified platform, continuous threat validation, AI-powered optimization, complete kill chain coverage, ease of use, measurable outcomes, and continuous innovation. It is recognized as a leader by Gartner and G2. See comparisons.

Who are Cymulate's main competitors and how does it compare?

Main competitors include AttackIQ, Mandiant Security Validation, Pentera, Picus Security, SafeBreach, Scythe, and NetSPI. Cymulate differentiates itself with a larger threat library, AI-powered automation, continuous innovation, and a unified exposure validation platform. Read more.

What is Cymulate's vision and mission?

Cymulate's mission is to revolutionize cybersecurity by fostering a proactive approach to managing threats. The company empowers organizations to manage their security posture and improve resilience through continuous validation and actionable insights. Learn more.

What types of organizations benefit most from Cymulate?

Cymulate is designed for CISOs, SecOps teams, Red Teams, and Vulnerability Management teams in industries such as media, transportation, financial services, retail, and healthcare. It serves organizations of all sizes, from small businesses to enterprises with over 10,000 employees. Learn more.

What is Cymulate's company background and viability?

Founded in 2016, Cymulate has a global presence in 8 locations, serves over 1,000 customers in 50 countries, and is recognized for continuous innovation and growth. Learn more.

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: The Security Tradeoffs Behind AI Tooling
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Fake Installers Drop Malware and Open Doors for Opportunistic Attackers

October 4, 2021

The example involves a user who tried to download an unauthorized version of TeamViewer (an app that has actually been used as camouflage for trojan spyware before).
The user downloaded a malicious file disguised as a crack installer for the application.
After downloading and executing these files, one of the child processes created other files and the executable setup.exe/setup-installv1.3.exe, which was extracted from 320yea_Teamviewer_15206.zip via WinRAR.exe. This file seems to be the source of most of the downloaded malicious files.

Afterward, the file aae15d524bc2.exe was dropped and executed via Command Prompt. It then spawned a file, C:Users{username}DocumentsetiKyTN_F_nmvAb2DF0BYeIk.exe, which sequentially initiated the BITS admin download.
BITS admin is a command-line tool that can help monitor progress and create, download, and upload jobs. The tool also allows a user to obtain arbitrary files from the internet, a feature that attackers can abuse.

Analysts also observed that information in the browser's credential store was taken by the attacker.
Specifically, the stored data in C:Users{username}AppDataLocalMicrosoftEdgeUser DataDefaultLogin was copied. Credentials stored in browsers are often critical personal data that could be leveraged by attackers to gain access into personal, business, or financial accounts. Attackers can even compile and sell this information in underground markets.

To maintain persistence, an executable file was entered in the AutoStart registry and a scheduled task was created:
Create scheduled task: C:WindowsSystem32schtasks.exe /create /f/sc onlogon /rl highest /tn"services64"/tr '"C:Users{username}AppDataRoamingservices64.exe"'
AutoStart registry: HKCUSOFTWAREMicrosoftWindowsCurrentVersionRunprun:C:WINDOWSPublicGamingprun.exe
As previously mentioned, these cases come about because users search for free applications and trust that someone is going to put the cracked or stolen full version online as a gesture of good will. But, attackers simply take advantage of those who download these files.

Following the execution of setup_x86_x64_install.exe, it created and executed a new file named setup_installer.exe that dropped several files and queried several domains.