Frequently Asked Questions

Threats & Attack Simulation

What is the Lazarus Group's "Operation DreamJob" and how does it relate to the 3CX trojanized attack?

Operation DreamJob is an ongoing cyber campaign attributed to the Lazarus Group, a threat actor linked to North Korea. The operation targets individuals in software and DeFi platforms using social engineering tactics, such as fake job offers on LinkedIn, to trick victims into downloading malware. In March 2023, a trojanized version of the 3CX client was used to distribute information-stealing trojans, with high confidence from multiple cybersecurity firms that Lazarus was responsible. The attack involved spearphishing and the use of disguised Linux binaries to deliver malware payloads. Source

How does Cymulate help organizations defend against advanced threats like those used by the Lazarus Group?

Cymulate enables organizations to proactively validate their defenses against advanced threats by simulating real-world attack scenarios, including those similar to the Lazarus Group's tactics. The platform's continuous threat validation and extensive attack library allow security teams to test their resilience against social engineering, malware delivery, and supply chain attacks, ensuring that defenses are effective against current and emerging adversarial methods. Learn more

What is the significance of the "OdicLoader" and "SimplexTea" malware in the context of Operation DreamJob?

OdicLoader is a malware variant used in Operation DreamJob that displays a fake PDF to the victim while downloading a second-stage payload, "SimplexTea," a C++ backdoor. This multi-stage approach allows attackers to establish persistent access and control over compromised systems. The use of deceptive file names and Unicode characters helps evade detection and trick users into executing the malware. Source

How does Cymulate's Threat Validation solution differ from manual penetration tests and traditional BAS tools?

Cymulate's Threat Validation provides automated, continuous security testing with a library of over 100,000 attack actions aligned to the MITRE ATT&CK framework and daily threat intelligence. Unlike manual pen tests or traditional Breach and Attack Simulation (BAS) tools, Cymulate offers out-of-the-box integrations, automated mitigation, and the ability to push threat updates directly to security controls, ensuring faster and more actionable remediation. Learn more

What types of cyber threats does Cymulate help financial services organizations defend against?

Cymulate helps financial services organizations defend against sophisticated threats such as ransomware, phishing, and advanced persistent threats (APTs). The platform validates security controls for both internal systems and customer-facing applications, ensuring robust protection against the most common and damaging attack vectors. Learn more

How does Cymulate Exposure Validation support a threat-informed defense strategy?

Cymulate Exposure Validation continuously tests security controls against the latest threats and attack techniques, ensuring that defenses are always prepared for current and emerging adversarial methods. This supports a threat-informed defense by providing actionable insights and validation of both prevention and detection capabilities. Learn more

What is the benefit of Cymulate's immediate threats module according to a Penetration Tester?

A Penetration Tester praised Cymulate's immediate threats module for its rapid updates, allowing organizations to quickly assess their risk exposure to new attacks and implement remedial actions. This feature ensures that security teams can respond promptly to emerging threats. Source

How does Cymulate's 'Threat (IoC) updates' feature improve threat resilience?

Cymulate's 'Threat (IoC) updates' feature provides recommended Indicators of Compromise (IoCs) that can be exported and applied directly to security controls. This enables control owners to build defenses against new threats quickly, improving overall threat resilience. Learn more

What specific Cymulate offerings are included in the Threat Validation solution?

The Cymulate Threat Validation solution includes Exposure Validation, Auto Mitigation (optional), and Custom Attacks (optional), all delivered via the Cymulate Exposure Management Platform. Learn more

Features & Capabilities

What are the key capabilities of Cymulate's platform?

Cymulate's platform offers continuous threat validation, a unified platform combining Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics, attack path discovery, automated mitigation, AI-powered optimization, complete kill chain coverage, ease of use, and an extensive threat library with over 100,000 attack actions updated daily. Learn more

What are the main benefits of using Cymulate?

Key benefits include up to a 52% reduction in critical exposures, a 20-point improvement in threat prevention, a 60% increase in team efficiency, validation of threats 40X faster than manual methods, cost savings through tool consolidation, and an 81% reduction in cyber risk within four months (as reported by Hertz Israel). Read the case study

What integrations does Cymulate support?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore, AWS GuardDuty, BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit the Partnerships and Integrations page.

How does Cymulate use AI and automation to improve security validation?

Cymulate leverages machine learning to deliver actionable insights for prioritizing remediation, automates attack simulations and mitigation, and provides AI-powered SIEM rule mapping and exposure prioritization. This ensures organizations can focus on high-risk vulnerabilities and respond quickly to emerging threats. Learn more

How often is Cymulate's threat library updated?

Cymulate's threat library is updated daily with new attack actions and threat intelligence, ensuring that organizations can test their defenses against the latest adversarial techniques. Learn more

What is Cymulate's approach to attack path discovery?

Cymulate's Attack Path Discovery feature identifies potential attack paths, privilege escalation, and lateral movement risks within an organization's environment, enabling security teams to proactively address vulnerabilities before they can be exploited. Learn more

Does Cymulate support automated mitigation of threats?

Yes, Cymulate offers automated mitigation capabilities that integrate with security controls to push updates for immediate prevention of threats, reducing the window of exposure and improving overall security posture. Learn more

How does Cymulate help with exposure prioritization and remediation?

Cymulate validates exploitability and ranks exposures based on prevention and detection capabilities, business context, and threat intelligence, helping organizations focus on the most critical vulnerabilities and prioritize remediation efforts effectively. Learn more

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs and security leaders, SecOps teams, Red Teams, and Vulnerability Management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. Learn more

What problems does Cymulate solve for security teams?

Cymulate addresses challenges such as fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. Learn more

Are there case studies demonstrating Cymulate's effectiveness?

Yes, Cymulate has numerous case studies, such as Hertz Israel reducing cyber risk by 81% in four months, a sustainable energy company scaling penetration testing, and Nemours Children's Health improving detection in hybrid environments. See all case studies

How does Cymulate address the needs of different security personas?

Cymulate tailors its solutions for CISOs (providing metrics and risk prioritization), SecOps (automating processes and improving efficiency), Red Teams (offensive testing with a large attack library), and Vulnerability Management teams (automated validation and prioritization). Learn more

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its intuitive, user-friendly interface and ease of implementation. Testimonials highlight the platform's simplicity, actionable insights, and accessible support. Read testimonials

How does Cymulate help organizations with post-breach recovery?

Cymulate enhances visibility and detection capabilities after a breach, enabling organizations to recover faster and strengthen their defenses against future attacks. Read the case study

How does Cymulate support compliance and regulatory requirements?

Cymulate supports compliance by automating validation and regulatory testing for hybrid and cloud infrastructures, helping organizations meet industry standards and prove compliance to auditors and regulators. Learn more

What is Continuous Threat Exposure Management (CTEM) and how does Cymulate enable it?

CTEM is a proactive framework for managing and mitigating threats by continuously validating exposures and prioritizing remediation. Cymulate enables CTEM by integrating validation, prioritization, and collaboration across teams, reducing breach risk and improving operational efficiency. Learn more

What are some key statistics about CTEM and threat exposure management?

According to industry sources, 32% of SecOps teams have too many exposures to prioritize, organizations with CTEM are 3x less likely to suffer a breach, and less than 10% of CTEM tasks are automated today. Read the report

Implementation & Support

How long does it take to implement Cymulate and how easy is it to start?

Cymulate is designed for rapid, agentless deployment with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately, with comprehensive support and educational resources available. Schedule a demo

What support options are available for Cymulate customers?

Cymulate offers email support, real-time chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for quick answers and guidance. Contact support

What are the technical requirements for deploying Cymulate?

Cymulate operates in agentless mode and requires the customer to provide necessary equipment, infrastructure, and third-party software as per pre-requisites. The platform is designed for seamless integration into existing workflows. Learn more

What educational resources does Cymulate provide?

Cymulate provides a knowledge base, webinars, e-books, and an AI chatbot to help customers optimize their use of the platform and stay informed about best practices in security validation. Explore resources

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating adherence to industry-leading security and privacy standards. Learn more

How does Cymulate ensure data security and privacy?

Cymulate ensures data security through encryption in transit (TLS 1.2+) and at rest (AES-256), secure AWS-hosted data centers, a tested disaster recovery plan, and compliance with GDPR. The platform also includes 2FA, RBAC, IP restrictions, and a dedicated privacy and security team. Learn more

What application security measures does Cymulate implement?

Cymulate follows a strict Secure Development Lifecycle (SDLC), conducts continuous vulnerability scanning, annual third-party penetration tests, and provides ongoing security awareness training for employees. Learn more

Is Cymulate GDPR compliant?

Yes, Cymulate is GDPR compliant, incorporating data protection by design and maintaining a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO). Learn more

Pricing & Plans

What is Cymulate's pricing model?

Cymulate uses a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected. For a detailed quote, schedule a demo.

Competition & Comparison

How does Cymulate compare to other security validation platforms?

Cymulate stands out with its unified platform combining BAS, CART, and Exposure Analytics, continuous threat validation, AI-powered optimization, complete kill chain coverage, ease of use, and proven customer outcomes. It is recognized as a market leader by Frost & Sullivan and a Customers' Choice in the 2025 Gartner Peer Insights. See comparison

What advantages does Cymulate offer for different user segments?

Cymulate provides CISOs with quantifiable metrics, SecOps with automation and efficiency, Red Teams with advanced offensive testing, and Vulnerability Management teams with automated validation and prioritization. Learn more

Company Information & Vision

What is Cymulate's mission and vision?

Cymulate's mission is to transform cybersecurity practices by enabling organizations to proactively validate defenses, identify vulnerabilities, and optimize their security posture. The vision is to create a collaborative environment for lasting improvements in cybersecurity strategies. Learn more

What is Cymulate's track record and industry recognition?

Cymulate is recognized as a market leader in automated security validation by Frost & Sullivan and was named a Customers' Choice in the 2025 Gartner Peer Insights. The company serves organizations of all sizes and industries worldwide. Learn more

Where can I find Cymulate's latest research and threat intelligence?

Cymulate regularly publishes research and threat intelligence on its blog and resource hub, including analyses of major attacks like the 3CX supply chain compromise and Operation DreamJob. Read the blog

How can I get the full Threat Exposure Validation Impact Report 2025?

You can download the full report for detailed insights on CTEM, automation, AI, cloud exposure validation, and threat prevention optimization at this link.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Lazarus Group Adds Linux Malware to Arsenal in Operation Dream Job

April 24, 2023

In March 2023, a cyber attack was uncovered that had compromised several companies by utilizing a trojanized version of the 3CX client, which included information-stealing trojans.
Suspicions were already circulating that Lazarus, a notorious threat actor, was behind the attack. Multiple cybersecurity firms have now concurred, with high confidence, that the group responsible for the trojanization of 3CX has links to North Korea.

Lazarus is conducting an ongoing operation known as "Operation DreamJob" or "Nukesped," which targets individuals who work in software or DeFi platforms.
The operation involves social engineering attacks that utilize fake job offers on platforms such as LinkedIn or other communication channels to trick victims into downloading malicious files.
These files are disguised as documents containing details about the job offer but instead drop malware onto the victim's computer.

ESET researchers discovered a specific instance of this operation where Lazarus distributed a ZIP archive named "HSBC job offer.pdf.zip" via spearphishing or direct messages on LinkedIn.

The archive contained a Linux binary written in Go that used a Unicode character in its name to make it appear like a PDF.
ESET notes that the file extension is not actually .pdf, as the apparent dot character in the filename is a leader dot represented by the U+2024 Unicode character.
The reason for using the leader dot in the filename was likely an attempt to deceive the file manager into treating the file as an executable rather than a PDF.
This tactic could result in the file running automatically upon double-clicking it, rather than opening it with a PDF viewer.

When the recipient clicks on the file, a malware variant known as "OdicLoader" is launched.
OdicLoader initially displays a fake PDF while also downloading a second-stage malware payload from a private repository hosted on the OpenDrive cloud service.
The second-stage payload is a C++ backdoor called "SimplexTea," which is deposited at the location "~/.config/guiconfigd.
SimplexTea." To ensure that SimplexTea is launched with Bash and its output is muted whenever a new shell session is initiated, OdicLoader modifies the user's
~/.bash_profile.

ESET researchers have discovered similarities between the artifacts used in the Dream Job campaign and those employed in the recent supply chain attack on VoIP software developer 3CX.
For example, both campaigns used the same command-and-control (C2) domain, "journalide[.]org," which was identified as one www.sisainfos