Frequently Asked Questions

Harvester APT Campaign & Technical Details

What is the Harvester APT group and what makes their campaign in South Asia notable?

The Harvester APT group is a nation-state-backed threat actor that targeted victims in South Asia using a previously unseen toolset. Their campaign is notable for deploying a custom backdoor called Backdoor.Graphon, along with additional tools such as downloaders and screenshot utilities, to enable remote access and data exfiltration while blending their activities with legitimate network traffic.

What tools did the Harvester group use in their attacks?

The Harvester group used several tools, including:

How did the Harvester group maintain persistence on victim machines?

The attackers used registry modifications for persistence, specifically setting a registry value to execute a malicious VBS script at startup. They also used legitimate cloud infrastructure (CloudFront and Microsoft Azure) for C&C operations to blend in with normal network activity.

What is Backdoor.Graphon and how does it operate?

Backdoor.Graphon is a custom .NET PE DLL backdoor used by the Harvester group. It communicates with attacker-controlled servers hosted on Microsoft infrastructure, executes commands received from the C&C, and exfiltrates encrypted data back to the attackers. It is designed to evade detection and maintain persistent access.

How did the attackers use legitimate cloud infrastructure in their campaign?

The attackers leveraged Microsoft Azure and CloudFront infrastructure for their command and control (C&C) operations. This allowed them to blend malicious traffic with legitimate network activity, making detection more difficult for defenders.

What evidence of persistence did the Harvester group leave on infected systems?

The attackers created registry entries to ensure their malicious scripts would run at startup and used scheduled tasks and file artifacts (such as password-protected ZIP archives for screenshots) to maintain persistence and evade detection.

How did the Harvester group exfiltrate data from victim machines?

Data exfiltration was performed by encrypting and sending data back to attacker-controlled servers via HTTPS requests to Microsoft Azure-hosted domains. Screenshots and other sensitive information were packaged in password-protected ZIP archives before exfiltration.

What techniques did the Harvester group use to evade detection?

The group used legitimate cloud infrastructure for C&C, embedded decoy URLs, and deleted evidence of their activities (such as old screenshot archives). They also used off-the-shelf tools like Cobalt Strike and Metasploit to blend in with common attacker techniques.

What should security teams monitor to detect similar threats?

Security teams should monitor for suspicious C&C activity to cloud infrastructure, unusual registry modifications, unauthorized data exfiltration attempts, and the presence of password-protected ZIP archives or unexpected scheduled tasks.

What is the significance of using tools like Cobalt Strike and Metasploit in APT campaigns?

Tools like Cobalt Strike and Metasploit are widely used by both legitimate penetration testers and attackers. Their use in APT campaigns allows threat actors to leverage advanced capabilities for privilege escalation, persistence, and lateral movement, while making attribution and detection more challenging.

How does the Harvester campaign highlight the importance of threat exposure validation?

The Harvester campaign demonstrates how sophisticated attackers use new toolsets and legitimate infrastructure to evade detection. This underscores the need for continuous threat exposure validation to proactively test defenses against emerging threats and validate security controls in real time.

What is the role of decoy URLs in the Harvester attack chain?

Decoy URLs, such as those opened by the custom downloader, are used to mislead victims and security analysts, making it harder to distinguish malicious activity from legitimate browsing behavior.

How does the Harvester group use registry modifications for persistence?

The group sets registry values under HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run to ensure their malicious scripts are executed every time the user logs in, maintaining persistence across reboots.

What is the function of the custom screenshot tool used by Harvester?

The custom screenshot tool captures and logs screenshots of the victim's desktop, saves them in password-protected ZIP archives, and deletes archives older than one week to minimize forensic evidence.

How does Backdoor.Graphon communicate with its command and control servers?

Backdoor.Graphon communicates with its C&C servers via HTTPS requests to attacker-controlled Microsoft Azure domains, sending encrypted data and receiving commands for execution on the victim machine.

What is the significance of using password-protected ZIP archives in the attack?

Password-protected ZIP archives are used to store and exfiltrate screenshots and other sensitive data, making it harder for defenders to analyze the contents and detect exfiltration activities.

What are the recommended mitigation strategies for defending against campaigns like Harvester?

Recommended strategies include monitoring for suspicious cloud-based C&C traffic, auditing registry changes, detecting unauthorized scheduled tasks, and using continuous threat exposure validation to test defenses against similar attack techniques.

How does Cymulate help organizations defend against advanced persistent threats like Harvester?

Cymulate enables organizations to simulate advanced persistent threat (APT) techniques, validate their defenses against real-world attack scenarios, and receive actionable insights to remediate exposures before they can be exploited by groups like Harvester.

Features & Capabilities

What features does Cymulate offer for real-time threat simulation and immediate threat assessment?

Cymulate provides real-time threat simulations and an immediate threats module that is updated quickly to reflect new attacks. This allows organizations to assess their IT estate for exposure to the latest threats as soon as they emerge and implement remedial actions rapidly based on up-to-date intelligence. Cymulate can simulate attacks across email, web channels, DLP, and more, including ransomware scenarios. Source

Which types of threats can Cymulate validate?

Cymulate validates threats across the full kill chain—including phishing, malware, lateral movement, data exfiltration, and zero-day exploits—using daily updated threat templates and AI-generated attack plans. Source

What types of threats and techniques does Cymulate simulate for endpoint security validation?

Cymulate simulates a wide range of endpoint threats and techniques, including known malicious file samples, malicious behaviors, ransomware, worms, trojans, rootkits, DLL side-loading, and code injection. Source

Which Cymulate attack vectors and modules correspond to the MITRE ATT&CK® tactics?

Cymulate maps its attack vectors and modules to MITRE ATT&CK® tactics, covering Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, and Credential Access through various modules such as Recon, Full Kill Chain APT, Purple Team, Web Gateway, Email Gateway, Endpoint Security, and Immediate Threats Intelligence. Source

What is threat exposure prioritization in cybersecurity?

Threat exposure prioritization is the process of identifying and ranking vulnerabilities and other security weaknesses based on their actual exploitability and impact on business-critical assets. Cymulate uses automated threat validation and exposure scoring to help teams focus on exposures that are not protected by security controls. Source

What problems does Cymulate's Threat Validation solution solve for security teams?

Cymulate's Threat Validation solution addresses two critical problems: lack of confidence in security controls (as threats evolve faster than controls) and security configuration drift (where changes over time decrease threat coverage and create new gaps). Source

What feedback have customers given about Cymulate's immediate threats module?

Customers are particularly impressed with Cymulate's immediate threats module, which is updated quickly to reflect new attacks. This allows organizations to rapidly assess their risk exposure and implement remedial actions. Source

What did a Penetration Tester highlight about Cymulate's immediate threats module?

A Penetration Tester praised Cymulate's immediate threats module, stating, “I am particularly enamored with the immediate threats module and how quickly this gets updated. In short if an attack is new, you can quickly assess your IT estate for how much of a risk is posed to you and implement remedial action quickly.” Source

What are some of Cymulate's integrations with other security technologies?

Cymulate integrates with numerous security technologies, including Akamai Guardicore (Network Security Validation), AWS GuardDuty (Cloud Security Validation), BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, CrowdStrike Falcon, Cybereason, and more. For a complete list, visit the Partnerships and Integrations page.

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams across industries such as media, transportation, financial services, retail, and healthcare. Organizations of all sizes, from small businesses to enterprises with over 10,000 employees, can benefit from Cymulate's platform. Source

What business impact can customers expect from using Cymulate?

Customers can expect a 30% improvement in threat prevention, a 52% reduction in critical exposures, a 60% increase in team efficiency, 40X faster threat validation, an 85% improvement in threat detection accuracy, and an 81% reduction in cyber risk within four months. Source

What core problems does Cymulate solve for security teams?

Cymulate addresses overwhelming volumes of threats, lack of visibility, unclear prioritization, operational inefficiencies, fragmented security tools, cloud complexity, and communication barriers for CISOs. Source

How does Cymulate help organizations prioritize threat exposures?

Cymulate ranks vulnerabilities based on exploitability, business context, and threat intelligence, enabling organizations to focus remediation efforts on the most critical exposures. Source

How easy is it to implement Cymulate and get started?

Cymulate is easy to implement and use, requiring only a few clicks to start running simulations. It offers agentless deployment, quick onboarding, and minimal resource requirements. Customers have praised its intuitive dashboard and fast integration with existing technologies. Source

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive design, ease of deployment, and user-friendly dashboard. Testimonials highlight the platform's simplicity, practical insights, and excellent support. Source

What specific challenges did the Indian financial services company face before implementing Cymulate?

The company struggled with manual control validation, manual validation of MSSP detection and response, and manual threat validation, which were time-consuming and prone to human error. Cymulate automated these processes, enabling continuous validation and faster remediation. Source

Security, Compliance & Implementation

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating its commitment to security, privacy, and compliance with international standards. Source

How does Cymulate ensure data security and privacy?

Cymulate hosts services in secure AWS data centers, uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), and follows a strict Secure Development Lifecycle (SDLC). It also complies with GDPR and employs a dedicated privacy and security team. Source

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's needs, determined by the chosen package, number of assets, and scenarios selected. For a detailed quote, schedule a demo with Cymulate's team. Source

How long does it take to implement Cymulate?

Cymulate's implementation is fast and straightforward, with customers able to start running simulations almost immediately after deployment. The platform is agentless and requires minimal resources. Source

Competition & Comparison

How does Cymulate compare to AttackIQ?

Cymulate delivers an industry-leading threat scenario library and AI-powered capabilities to streamline workflows and accelerate security posture improvement. AttackIQ focuses on automated security validation but lacks Cymulate's innovation, threat coverage, and ease of use. Read more.

How does Cymulate compare to Mandiant Security Validation?

Mandiant is one of the original BAS platforms but has seen little innovation in the past five years. Cymulate continually innovates with AI and automation, expanding into exposure management as a grid leader. Read more.

How does Cymulate compare to Pentera?

Pentera is useful for identifying security gaps with attack path validation but lacks the depth Cymulate provides to fully assess and strengthen defenses. Cymulate optimizes defense, scales offensive testing, and increases exposure awareness. Read more.

How does Cymulate compare to Picus Security?

Picus may suit organizations seeking a BAS vendor with an on-prem option. Cymulate offers a more complete exposure validation platform covering the full kill chain and cloud control validation. Read more.

How does Cymulate compare to SafeBreach?

Cymulate outpaces SafeBreach with unmatched innovation, precision, and automation. It features the industry’s largest attack library, a full CTEM solution, and comprehensive exposure validation. Read more.

How does Cymulate compare to Scythe?

Scythe is suitable for advanced red teams building custom attack campaigns. Cymulate provides a more comprehensive exposure validation platform with actionable remediation and automated mitigation. Read more.

How does Cymulate compare to NetSPI?

NetSPI excels in penetration testing as a service (PTaaS). Cymulate, however, is designed for continuous, independent assessment and strengthening of defenses, recognized as a leader in exposure validation by Gartner and G2. Read more.

New: 2026 Gartner® Market Guide for Adversarial Exposure Validation
Learn More
Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Research: Azure Arc Privilege Escalation & Identity Takeover
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Harvester: Nation-State-Backed Group Uses New Toolset to Target Victims in South Asia

October 21, 2021

The most notable aspect of this campaign is the previously unseen toolset used by the attackers. The attackers deployed a custom backdoor called Backdoor.Graphon alongside additional tools such as downloaders and screenshot utilities, providing remote access and enabling data exfiltration.

Initial Infection and Attack Strategy

The exact initial infection vector used by the Harvester group remains unknown. However, the first sign of Harvester activity on victim machines was a malicious URL. After establishing access, the attackers deployed various tools, including their custom Graphon backdoor, to gain persistent remote access. They also attempted to blend their activities with legitimate network traffic by leveraging CloudFront and Microsoft infrastructure for command and control (C&C) operations.

Tools Used by the Attackers

1. Backdoor.Graphon

  • Custom backdoor utilizing Microsoft infrastructure for C&C communication.

2. Custom Downloader

  • Uses Microsoft infrastructure for C&C activities.
  • Leverages Costura Assembly Loader to execute malicious payloads.
  • Checks for the existence of:[ARTEFACTS_FOLDER]winser.dll
    • If missing, downloads a copy from:
    hxxps://outportal[.]azurewebsites.net/api/Values_V2/Getting3210
    • Creates the file:
    "[ARTEFACTS_FOLDER]Microsoft Services[.]vbs"
    • Sets registry value for persistence:
    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "MicrosoftSystemServices" = "[ARTEFACTS_FOLDER]Microsoft Services[.]vbs"
    • Opens an embedded browser at:
    hxxps://usedust[.]com
    • This URL appears to be a decoy to mislead victims.

3. Custom Screenshot Tool

  • Captures and logs screenshots.
  • Uses Costura Assembly Loader.
  • Saves images to a password-protected ZIP archive.
  • Deletes archives older than one week.

4. Cobalt Strike Beacon

  • Uses CloudFront infrastructure for C&C.
  • Executes commands, injects processes, elevates privileges, and exfiltrates files.

5. Metasploit Framework

  • Off-the-shelf tool for:
    • Privilege escalation
    • Screen capture
    • Backdoor persistence
    • Additional malicious activities

Backdoor.Graphon Execution and C&C Communication

  • Compiled as: .NET PE DLL
  • Exported Function: Main
  • PDB File Path:D:\OfficeProjects\Updated Working Due to Submission4.5\Outlook_4.5\Outlook 4.5.2 32 bit New without presistancy\NPServices\bin\x86\Debug\NPServices[.]pdb

C&C Server Communication

Once executed, Backdoor.Graphon attempts to connect to attacker-controlled servers hosted on Microsoft infrastructure:

hxxps://microsoftmsdn[.]azurewebsites.net/api/Values_V1/AuthAsyncComplete_V1?Identity=[INFECTION_ID]
hxxps://microsoftsgraphapi[.]azurewebsites.net/api/Values_V1/AuthAsyncComplete_V1?Identity=[INFECTION_ID]
hxxps://msdnmicrosoft.azurewebsites[.]net/api/Values_V1/AuthAsyncComplete_V1?Identity=[INFECTION_ID]

Attacker Command Execution

  • Attackers send GET requests to C&C servers.
  • Responses are extracted and deleted after execution.
  • cmd.exe retrieves output and error streams.
  • Data is encrypted and sent back to attacker-controlled servers.

Conclusion

The Harvester group has employed a sophisticated toolset to maintain persistence, evade detection, and exfiltrate sensitive data. Their use of legitimate cloud infrastructure for C&C operations highlights their attempt to blend in with normal network activity. Security teams should monitor for suspicious C&C activity, unusual registry modifications, and unauthorized data exfiltration attempts to mitigate this threat.