Frequently Asked Questions
Threat Intelligence & KNOTWEED Attack Details
What is KNOTWEED and who operates it?
KNOTWEED is an Austria-based private-sector offensive actor (PSOA) operated by DSIRF. DSIRF claims to provide advanced due diligence, risk analysis, and red teaming services to multinational corporations in technology, retail, energy, and financial sectors.
What malware is associated with KNOTWEED attacks?
KNOTWEED attacks are associated with the Subzero malware, which is deployed using various methods including exploit chains and malicious Excel documents. Subzero consists of multiple components, including Jumplump (persistent loader) and Corelump (main malware).
How does the Subzero malware operate?
Subzero is deployed through exploit chains or malicious Excel files. The attack involves a downloader shellcode that retrieves a JPEG image with encrypted data, which is then decrypted and loaded into memory as the Corelump malware. Corelump operates in memory, evading detection, and provides capabilities such as keylogging, screenshot capture, file exfiltration, remote shell access, and running arbitrary plugins.
What exploits were used in KNOTWEED's attack chain?
KNOTWEED used a chain of exploits including CVE-2021-31199, CVE-2021-31201 (Windows privilege escalation), and CVE-2021-28550 (Adobe Reader). An additional exploit, CVE-2021-36948, targeted the Windows Update Medic Service to load arbitrary signed DLLs.
How does KNOTWEED achieve persistence on infected systems?
KNOTWEED achieves persistence by dropping trojanized DLLs (Jumplump) into the C:\Windows\System32\spool\drivers\color directory and modifying COM registry keys to point to these DLLs. This technique is known as COM hijacking.
What detection recommendations are provided for KNOTWEED attacks?
Detection recommendations include monitoring for writes of PE files to C:\Windows\System32\spool\drivers\color, changes to COM registry keys, PowerShell scripts executed from internet locations, and modifications of commonly abused registry keys. Monitoring the five specific CLSIDs used by Jumplump is also advised.
What are the capabilities of the Corelump malware?
Corelump provides keylogging, screenshot capture, file exfiltration, remote shell access, and the ability to run arbitrary plugins downloaded from KNOTWEED's command-and-control server. It operates exclusively in memory to evade detection.
What utility tools are used by KNOTWEED?
KNOTWEED uses bespoke utility tools such as Mex and PassLib. Mex is a command-line tool with several red teaming or security plugins, some of which are copied from public sources like GitHub.
How does KNOTWEED use malicious Excel documents in its attacks?
KNOTWEED uses Excel files masquerading as legitimate documents, containing obfuscated macros and benign comments to evade detection. These macros use Excel 4.0 functions to load shellcode, which then downloads and executes the Corelump malware.
What infrastructure is associated with KNOTWEED's operations?
KNOTWEED's infrastructure includes domains and IP addresses hosted by providers like Digital Ocean and Choopa. Domains such as acrobatrelay[.]com, demo3[.]dsirf[.]eu, debugmex[.]dsirflabs[.]eu, and szstaging[.]dsirflabs[.]eu have been linked to their operations.
How does Jumplump contribute to KNOTWEED's persistence?
Jumplump is a trojanized DLL dropped to disk that loads Corelump into memory from the JPEG file in the %TEMP% directory. It also modifies COM registry keys for persistence and attempts to download Corelump again if not present.
What are the main stages of the KNOTWEED attack chain?
The main stages include initial access via exploit chains or malicious documents, deployment of downloader shellcode, retrieval and decryption of the Corelump payload, in-memory execution, and persistence via COM hijacking and trojanized DLLs.
What are the recommended monitoring actions for defenders?
Defenders should monitor for PE file writes to C:\Windows\System32\spool\drivers\color, changes to specific COM registry keys, suspicious PowerShell activity, and modifications to default system CLSID values as indicators of KNOTWEED activity.
How does KNOTWEED evade detection?
KNOTWEED uses heavy obfuscation in its shellcode and loader, operates Corelump exclusively in memory, and modifies legitimate DLLs and registry keys to avoid traditional detection methods.
What is the significance of the JPEG file in KNOTWEED's attack?
The JPEG file is used to conceal the encrypted loader and Corelump payload. The downloader shellcode retrieves this image, extracts and decrypts the payload, and loads it into memory, making detection more difficult.
What are the main post-compromise actions of KNOTWEED?
Post-compromise actions include keylogging, screenshot capture, file exfiltration, remote shell access, and running additional plugins. The malware also modifies system files and registry keys for persistence and evasion.
How can organizations use Cymulate to validate defenses against threats like KNOTWEED?
Cymulate's Exposure Management Platform enables organizations to simulate real-world attack scenarios, including those similar to KNOTWEED, to validate detection and response capabilities, identify exploitable exposures, and prioritize remediation efforts. Features like Exposure Validation, Attack Path Discovery, and Automated Mitigation help organizations proactively defend against advanced threats.
What resources are available for learning more about exposure management and threat validation?
Cymulate offers a range of resources, including whitepapers, guides, solution briefs, data sheets, and reports. Notable examples include the 'Exposure Management Platform and CTEM Whitepaper', 'Continuous Threat Exposure Management Solution Brief', and the 'Threat Exposure Validation Impact Report 2025'. Visit the Cymulate Resource Hub for more information.
Features & Capabilities
What are the key features of Cymulate's Exposure Management Platform?
Cymulate's platform offers continuous threat validation, unified breach and attack simulation (BAS), continuous automated red teaming (CART), exposure analytics, AI-powered optimization, complete kill chain coverage, attack path discovery, cloud validation, and an extensive threat library with daily updates.
Does Cymulate integrate with other security technologies?
Yes, Cymulate integrates with a wide range of security technologies, including EDR and anti-malware solutions (e.g., CrowdStrike Falcon, Cisco Secure Endpoint, BlackBerry Cylance PROTECT), SIEM (CrowdStrike Falcon LogScale), cloud security (AWS GuardDuty, Check Point CloudGuard), network security (Akamai Guardicore), and vulnerability management (CrowdStrike Falcon Spotlight). For a full list, visit the Cymulate integrations page.
How does Cymulate help organizations prioritize exposures?
Cymulate ranks vulnerabilities based on exploitability, business context, and threat intelligence, enabling organizations to focus remediation efforts on the most critical exposures. This evidence-based prioritization improves operational efficiency and reduces risk.
What is Cymulate's 'Threat (IoC) updates' feature?
The 'Threat (IoC) updates' feature provides recommended Indicators of Compromise (IoCs) that can be exported via the UI or API in plain text or STIX format. This helps control owners quickly build defenses against new threats and improve threat resilience.
How often is Cymulate's threat library updated?
Cymulate's threat library is updated daily, ensuring that organizations can validate their defenses against the latest attack techniques and emerging threats.
What technical documentation is available for Cymulate?
Cymulate provides whitepapers, guides, solution briefs, data sheets, and industry reports covering topics such as exposure management, CTEM, detection engineering, and vulnerability management. Access these resources at the Cymulate Resource Hub.
How does Cymulate support cloud and hybrid environments?
Cymulate provides dedicated validation features for hybrid and cloud environments, enabling organizations to assess and optimize their cloud security controls and address new attack surfaces introduced by cloud adoption.
What is Cymulate's approach to detection engineering?
Cymulate enables organizations to build, validate, and optimize threat detections at scale, providing tools for SIEM, EDR, and XDR validation to improve mean time to detect and respond to threats.
How easy is it to implement Cymulate?
Cymulate is known for its quick and straightforward implementation. It operates in agentless mode, requiring no additional hardware or complex configuration. Customers can start running simulations almost immediately, and comprehensive support is available throughout onboarding.
Pricing & Plans
What is Cymulate's pricing model?
Cymulate operates on a subscription-based pricing model tailored to each organization's needs. Pricing depends on the selected package, number of assets, and scenarios for testing. For a personalized quote, schedule a demo with the Cymulate team.
Security, Compliance & Trust
What security and compliance certifications does Cymulate have?
Cymulate is certified for SOC2 Type II, ISO 27001:2013 (Information Security Management), ISO 27701 (Privacy Information Management), ISO 27017 (Cloud Services Security), and CSA STAR Level 1. These certifications demonstrate Cymulate's commitment to security, privacy, and cloud compliance. Learn more.
How does Cymulate ensure data security and privacy?
Cymulate employs strong physical security, encryption for data in transit (TLS 1.2+) and at rest (AES-256), and hosts services in secure AWS data centers. The platform follows a strict Secure Development Lifecycle (SDLC), conducts continuous vulnerability scanning, and undergoes annual third-party penetration tests. A dedicated privacy and security team, including a DPO and CISO, oversees compliance and GDPR adherence.
Is Cymulate GDPR compliant?
Yes, Cymulate adopts a holistic approach to GDPR, incorporating data protection by design and maintaining a dedicated privacy and security team. The company ensures compliance with GDPR requirements for all customers.
Use Cases & Success Stories
Who can benefit from using Cymulate?
Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams across industries such as media, transportation, financial services, and retail. Organizations of all sizes, from small teams to enterprises with over 10,000 employees, can benefit from Cymulate's platform.
What business impact can customers expect from Cymulate?
Customers have reported an 81% reduction in cyber risk within four months, a 60% increase in team efficiency, 40X faster threat validation, a 30% improvement in threat prevention, and a 52% reduction in critical exposures. These outcomes are supported by case studies such as Hertz Israel and Nemours Children's Health. Read the Hertz Israel case study.
Are there customer testimonials about Cymulate's ease of use?
Yes, customers consistently praise Cymulate for its intuitive and user-friendly platform. For example, Raphael Ferreira, Cybersecurity Manager, stated, "Cymulate is easy to implement and use—all you need to do is click a few buttons, and you receive a lot of practical insights into how you can improve your security posture." Read more testimonials.
What are some real-world use cases for Cymulate?
Use cases include reducing cyber risk (Hertz Israel), increasing visibility (Nemours Children's Health), automating vulnerability prioritization (financial services organization), optimizing SecOps (credit union), consolidating security tools (IT services organization), automating compliance (sustainable energy company), and providing clear metrics for investment justification (UK bank). See all case studies.
Competition & Comparison
How does Cymulate compare to AttackIQ?
AttackIQ provides automated security validation but lacks Cymulate's innovation, threat coverage, and ease of use. Cymulate offers a more comprehensive threat scenario library and advanced AI-powered features. Read more.
How does Cymulate compare to Mandiant Security Validation?
Mandiant is one of the original BAS platforms but has seen less innovation in recent years. Cymulate continually innovates with AI and automation and has expanded into exposure management as a grid leader. Read more.
How does Cymulate compare to Pentera?
Pentera focuses on attack path validation but lacks the depth of Cymulate's full exposure validation platform, which covers the entire kill chain and includes cloud control validation. Read more.
How does Cymulate compare to Picus Security?
Picus offers BAS with an on-prem option but does not provide Cymulate's comprehensive exposure validation, full kill chain coverage, or cloud control validation. Read more.
How does Cymulate compare to SafeBreach?
SafeBreach offers breach and attack simulation but lacks Cymulate's innovation, precision, and automation. Cymulate provides a full CTEM solution, comprehensive exposure validation, and advanced automation. Read more.
How does Cymulate compare to Scythe?
Scythe is built for advanced red teams to build custom attack campaigns but lacks Cymulate's ease of use, continuous validation, and actionable remediation guidance. Cymulate offers automated, no-code workflows, daily threat updates, and specific mitigation guidance. Read more.
Company Information & Vision
When was Cymulate founded?
Cymulate was founded in 2016 and has since grown to serve over 1,000 customers in 50 countries, with offices in eight locations worldwide. Learn more.
What is Cymulate's mission and vision?
Cymulate's mission is to revolutionize cybersecurity by fostering a proactive approach to managing security threats. The company aims to empower organizations to effectively manage their security posture and improve resilience against threats through continuous validation and innovation. Read more.