Frequently Asked Questions

Threat Details: GlobeImposter & MedusaLocker via RDP

What is the GlobeImposter ransomware campaign involving MedusaLocker?

The GlobeImposter ransomware campaign is a cyberattack operation where threat actors use MedusaLocker ransomware to target systems. Attackers gain initial access by brute-forcing systems with Remote Desktop Protocol (RDP) enabled, then deploy tools like Mimikatz, Advanced Port Scanner, and NirSoft Network Password Recovery for reconnaissance and credential dumping. The campaign not only encrypts files but also installs XMRig to mine digital assets on compromised machines. (Source: Original Webpage)

How do attackers use RDP to spread GlobeImposter and MedusaLocker ransomware?

Attackers brute-force RDP (Remote Desktop Protocol) credentials to gain unauthorized access to systems. Once inside, they deploy ransomware like GlobeImposter and MedusaLocker, perform reconnaissance, dump passwords, and may install additional tools such as XMRig for cryptomining. (Source: Original Webpage)

What tools are commonly used in GlobeImposter ransomware attacks?

Common tools used in these attacks include Mimikatz for credential dumping, Advanced Port Scanner for network reconnaissance, and NirSoft Network Password Recovery for extracting stored passwords. XMRig is also installed for cryptomining after ransomware deployment. (Source: Original Webpage)

What is the impact of ransomware campaigns like GlobeImposter and MedusaLocker?

These campaigns can lead to file encryption, data loss, business disruption, and financial or reputational damage. Attackers may also use compromised systems for cryptomining, further impacting system performance and increasing risk exposure. (Source: Original Webpage)

How can organizations defend against RDP-based ransomware attacks?

Organizations should disable unnecessary RDP access, enforce strong password policies, use multi-factor authentication, monitor for brute-force attempts, and validate endpoint and network security controls. Regular exposure validation and attack simulation can help identify and remediate vulnerabilities before attackers exploit them. (Source: Original Webpage, Knowledge Base)

What is XMRig and why is it used in ransomware campaigns?

XMRig is a legitimate open-source cryptomining tool that attackers deploy on compromised systems to mine digital assets (cryptocurrency) for financial gain, often alongside ransomware attacks. (Source: Original Webpage)

What reconnaissance techniques are used in GlobeImposter ransomware attacks?

Attackers use tools like Advanced Port Scanner and NirSoft Network Password Recovery to map the network, identify valuable assets, and extract credentials for lateral movement and privilege escalation. (Source: Original Webpage)

How does Cymulate help organizations validate their defenses against ransomware like GlobeImposter and MedusaLocker?

Cymulate enables organizations to simulate real-world ransomware attacks, including those using RDP brute-force and credential dumping techniques. The platform validates endpoint, network, and email security controls, helping teams identify exploitable gaps and prioritize remediation to prevent ransomware infections. (Source: Knowledge Base)

What are the consequences of attackers installing cryptominers like XMRig during ransomware campaigns?

Installing cryptominers like XMRig can degrade system performance, increase operational costs, and further compromise the security and integrity of affected systems. It also indicates that attackers are maximizing their financial gain from each compromised asset. (Source: Original Webpage)

What is the role of password dumping tools in ransomware attacks?

Password dumping tools like Mimikatz are used to extract credentials from compromised systems, enabling attackers to escalate privileges, move laterally, and access additional resources for further exploitation or ransomware deployment. (Source: Original Webpage)

Cymulate Platform: Features & Capabilities

What is Cymulate and what does it do?

Cymulate is a leading exposure management and security validation platform that enables organizations to simulate real-world cyberattacks, identify vulnerabilities, and optimize their defenses. It provides continuous threat validation, actionable insights, and seamless integration with existing security tools. (Source: Knowledge Base)

What types of threats can Cymulate validate?

Cymulate validates threats across the full kill chain, including phishing, malware, lateral movement, data exfiltration, and zero-day exploits, using daily updated threat templates and AI-generated attack plans. (Source: Knowledge Base)

What are the key capabilities of Cymulate's platform?

Cymulate offers continuous threat validation, exposure awareness, defensive posture optimization, attack path discovery, automated mitigation, comprehensive integration with SIEM/EDR, and cloud security validation. These capabilities help organizations proactively manage their cybersecurity posture. (Source: Knowledge Base)

How does Cymulate's immediate threats module help organizations?

Cymulate's immediate threats module is rapidly updated to reflect new attacks, allowing organizations to quickly assess their IT estate for exposure and implement remedial actions. Customers praise its speed and relevance for proactive defense. (Source: Knowledge Base)

What types of threats and techniques does Cymulate simulate for endpoint security validation?

Cymulate simulates known malicious file samples, malicious behaviors, ransomware, worms, trojans, rootkits, DLL side-loading, and code injection to validate endpoint security controls. (Source: Knowledge Base)

How does Cymulate address immediate and emerging threats?

Cymulate's immediate threats module is updated rapidly to assess new attacks, enabling organizations to evaluate risk exposure and implement remedial actions quickly. This ensures simulation of the latest threats, including ransomware and other current attack vectors. (Source: Knowledge Base)

What problems does Cymulate's Threat Validation solution solve for security teams?

Cymulate's Threat Validation solution addresses lack of confidence in security controls and security configuration drift, helping teams ensure their defenses can prevent and detect the latest attacks. (Source: Knowledge Base)

What is the primary purpose of Cymulate's product?

The primary purpose of Cymulate's Exposure Management Platform is to help organizations move from guessing to knowing and acting on security threats by hardening defenses, optimizing security controls, and providing actionable insights. (Source: Knowledge Base)

How does Cymulate help organizations prioritize vulnerabilities?

Cymulate ranks vulnerabilities based on exploitability, business context, and threat intelligence, enabling focused remediation efforts and improved operational efficiency. (Source: Knowledge Base)

Use Cases & Business Impact

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, Security Operations (SecOps) teams, Red Teams, Detection Engineers, and Vulnerability Management teams in organizations across industries such as finance, healthcare, and technology. (Source: Knowledge Base)

What business impact can customers expect from using Cymulate?

Customers can expect a 30% improvement in threat prevention, a 52% reduction in critical exposures, a 60% increase in operational efficiency, 40X faster threat validation, and an 81% reduction in cyber risk within four months. (Source: Knowledge Base)

Are there case studies showing Cymulate's effectiveness?

Yes. For example, Hertz Israel reduced cyber risk by 81% within four months, Nemours Children's Health improved detection and response, and Nedbank focused on critical vulnerabilities using Cymulate. See more at Cymulate Customer Stories. (Source: Knowledge Base)

How does Cymulate address pain points like overwhelming threats and lack of visibility?

Cymulate provides continuous threat validation, actionable insights, and automated processes to help organizations prioritize and address vulnerabilities, improve visibility, and reduce operational inefficiencies. (Source: Knowledge Base)

How does Cymulate help with cloud security validation?

Cymulate offers dedicated validation features for hybrid and cloud environments, addressing new attack surfaces and validation challenges introduced by cloud adoption. (Source: Knowledge Base)

What are the main pain points Cymulate solves for security teams?

Cymulate addresses overwhelming threat volume, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers for CISOs and security teams. (Source: Knowledge Base)

How does Cymulate's platform differ for Red Teams, Detection Engineers, and Vulnerability Management teams?

Red Teams benefit from production-safe attack simulations and automated offensive testing. Detection Engineers use Cymulate to close SIEM coverage gaps and validate detection rules. Vulnerability Management teams get consolidated exposure views and prioritization, focusing on exploitable CVEs. (Source: Knowledge Base)

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate is certified for SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1, demonstrating adherence to industry-leading security and privacy standards. (Source: Knowledge Base)

How does Cymulate ensure data security and privacy?

Cymulate uses secure AWS data centers (ISO 27001, PCI DSS, SOC 2/3 compliant), encrypts data in transit (TLS 1.2+) and at rest (AES-256), follows a secure development lifecycle, and provides GDPR compliance with a dedicated privacy and security team. (Source: Knowledge Base)

How does Cymulate support compliance reporting?

Cymulate provides compliance evidence report templates to help organizations demonstrate alignment with key industry standards and regulatory frameworks. (Source: Knowledge Base)

Integrations & Technical Documentation

What integrations does Cymulate offer?

Cymulate integrates with leading security tools such as BlackBerry Cylance, Carbon Black EDR, Cisco Secure Endpoint, CrowdStrike Falcon, SentinelOne, AWS GuardDuty, Splunk, Rapid7 InsightVM, Akamai Guardicore, and more. See the full list at Cymulate Technology Alliances. (Source: Knowledge Base)

Where can I find technical documentation for Cymulate?

Technical resources include the Exposure Management Platform Whitepaper, Data Sheets, Custom Attacks Data Sheet, Technology Integrations Data Sheet, and MITRE ATT&CK Framework alignment. Access these at Cymulate Resources. (Source: Knowledge Base)

Competition & Differentiation

How does Cymulate compare to AttackIQ?

Cymulate offers the industry's leading threat scenario library and AI-powered capabilities for streamlined workflows and accelerated security posture, while AttackIQ does not match Cymulate's innovation, threat coverage, or ease of use. Read more. (Source: Knowledge Base)

How does Cymulate differ from Mandiant Security Validation?

Mandiant's platform has seen minimal innovation in recent years, while Cymulate continually innovates with AI and automation, expanding into exposure management as a grid leader. Read more. (Source: Knowledge Base)

What makes Cymulate different from Pentera?

Pentera focuses on attack path validation but lacks Cymulate's depth in fully assessing and strengthening defenses. Cymulate optimizes defense, scales offensive testing, and increases exposure awareness. Read more. (Source: Knowledge Base)

How does Cymulate compare to Picus Security?

Picus is suitable for on-premise BAS needs but lacks Cymulate's comprehensive exposure validation platform, which covers the full kill chain and includes cloud control validation. Read more. (Source: Knowledge Base)

Pricing & Implementation

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model, customized based on the chosen package, number of assets, and scenarios. For a tailored quote, schedule a demo with the Cymulate team. (Source: Knowledge Base)

How long does it take to implement Cymulate?

Cymulate is known for quick deployment. Customers can start running simulations almost immediately after deployment, with an agentless mode that requires no additional hardware or complex configurations. (Source: Knowledge Base)

How easy is it to start using Cymulate?

Cymulate is praised for its intuitive and user-friendly design, making it easy to implement and use. Customers highlight the smooth onboarding process and minimal resource requirements. (Source: Knowledge Base)

Customer Proof & Company Information

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive and user-friendly design. Testimonials highlight easy implementation, a user-friendly dashboard, and high functionality for both technical and non-technical users. (Source: Knowledge Base)

What is Cymulate's vision and mission?

Cymulate's vision is to lead the way in how companies implement cybersecurity strategies, making the world safer. Its mission is to empower organizations against threats and make advanced cybersecurity as simple as sending an email. (Source: Knowledge Base)

How large is Cymulate and what is its global reach?

Cymulate was founded in 2016, has offices in eight locations, customers in 50 countries, and is trusted by over 1,000 organizations worldwide. (Source: Knowledge Base)

Video Resource

Where can I learn more about Threat Exposure Validation for 2025?

Watch the Threat Exposure Validation Summer Series: Threat Exposure Validation is a must have in 2025 video for insights on why threat exposure validation is essential for modern cybersecurity strategies. (Source: Knowledge Base)

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: The Security Tradeoffs Behind AI Tooling
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

GlobeImposter Ransomware With MedusaLocker Spreading Via RDP

March 21, 2023

A GlobeImposter ransomware campaign was discovered being carried out by the attackers behind MedusaLocker.
The threat actors are suspected to have brute-forced systems with RDP enabled to gain initial access.
Various tools were used to dump passwords and perform reconnaissance including Mimikatz Advanced Port Scanner and the NirSoft Network Password Recovery tool.
In addition to encrypting files the threat actor installed XMRig to mine for digital assets.