Frequently Asked Questions
Threat Landscape & IRGC-Linked Attacks
What vulnerabilities have IRGC-linked cyber actors exploited for ransom operations?
IRGC-linked cyber actors have exploited several known vulnerabilities for initial access, including Fortinet FortiOS (CVE-2018-13379, CVE-2020-12812, CVE-2019-5591), Microsoft Exchange (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207), and VMware Horizon Log4j (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105). These vulnerabilities have been used to deploy tools for ransom, extortion, and data exfiltration. Source
How do IRGC-affiliated actors use initial access for ransom and extortion?
After gaining initial access, IRGC-affiliated actors may encrypt data for ransom, exfiltrate data for extortion, or use a combination of both (double extortion). They determine their course of action based on the perceived value of the data, sometimes selling or using it to pressure victims into paying ransom demands. Source
What indicators of compromise (IOCs) are associated with ProxyShell and Log4j exploitation?
IOCs for ProxyShell exploitation include web shells with naming conventions like aspx_[random].aspx, login.aspx, or default.aspx in Exchange directories. For Log4j exploitation, IOCs include user agent strings like ${jndi:ldap//148.251.71.182:1389/RCE} and files such as RCE.class. Source
How do IRGC-linked actors maintain persistence in compromised environments?
They establish new user accounts on domain controllers, servers, and workstations, often enabling built-in Windows accounts (e.g., DefaultAccount) and escalating privileges to administrator level. Some accounts are created to mimic legitimate ones, making detection harder. Source
What ransom techniques are used by IRGC-affiliated actors?
They force BitLocker activation to encrypt data and hold decryption keys for ransom. Ransom notes are sent via email, left as .txt files, or printed on networked printers, often including contact details for negotiation. Source
How do these actors exfiltrate credentials and sensitive data?
They dump and exfiltrate the Local Security Authority Subsystem Service (LSASS) process memory, storing files like sassl.pmd, ssasl.zip, or lsass.dmp in temporary directories for credential harvesting and data theft. Source
What scheduled tasks may indicate IRGC-linked activity?
Unrecognized scheduled tasks or actions named Wininet, Wininet', WinLogon, or CacheTask may be associated with IRGC-linked activity, though some may be legitimate. Source
What are common account names used by IRGC-affiliated actors for persistence?
Common account names include Domain Admin, it_admin, DefaultAccount, and Default01. These may be created to resemble legitimate accounts and evade detection. Source
How does Cymulate help organizations defend against threats like those from IRGC-linked actors?
Cymulate enables organizations to simulate real-world attacks, validate security controls, and identify exploitable exposures. By continuously testing defenses against tactics used by groups like IRGC-linked actors, organizations can proactively remediate vulnerabilities and improve resilience. Learn more
What resources does Cymulate offer for understanding and mitigating advanced threats?
Cymulate provides whitepapers, technical guides, solution briefs, and case studies that cover exposure management, threat validation, detection engineering, and more. These resources help organizations stay informed and implement best practices. Explore resources
Features & Capabilities
What are the key features of the Cymulate Exposure Management Platform?
Cymulate's platform offers continuous threat validation, breach and attack simulation (BAS), continuous automated red teaming (CART), exposure analytics, attack path discovery, cloud validation, and an extensive threat library with daily updates. These features help organizations proactively identify and remediate security gaps. Learn more
Does Cymulate support integration with other security tools?
Yes, Cymulate integrates with a wide range of security technologies, including EDR and anti-malware (e.g., CrowdStrike Falcon, Cisco Secure Endpoint), SIEM (CrowdStrike Falcon LogScale), cloud security (AWS GuardDuty, Check Point CloudGuard), network security (Akamai Guardicore), and vulnerability management (CrowdStrike Falcon Spotlight). See all integrations
How does Cymulate's Threat (IoC) updates feature improve threat resilience?
The Threat (IoC) updates feature provides recommended Indicators of Compromise that can be exported and applied directly to security controls, improving resilience by enabling rapid defense against new threats. Learn more
What technical documentation is available for Cymulate users?
Cymulate offers whitepapers, guides, solution briefs, data sheets, and industry reports covering exposure management, CTEM, detection engineering, vulnerability management, and more. These resources provide in-depth technical knowledge for users. Access documentation
How often is Cymulate's threat library updated?
Cymulate's threat library is updated daily, ensuring that organizations can test their defenses against the latest attack techniques and emerging threats. Learn more
What is Cymulate's approach to cloud security validation?
Cymulate provides dedicated validation features for hybrid and cloud environments, allowing organizations to assess and optimize their cloud security controls against real-world threats. Learn more
How does Cymulate support detection engineering?
Cymulate helps organizations build, validate, and optimize threat detections at scale, enabling teams to tune SIEM, EDR, and XDR controls for improved mean time to detect and respond. Learn more
What is Cymulate's implementation process like?
Cymulate is agentless and requires no additional hardware or complex configuration. Customers report that deployment is quick and straightforward, allowing simulations to run almost immediately. See customer feedback
Use Cases & Benefits
Who can benefit from using Cymulate?
Cymulate is designed for CISOs, security leaders, SecOps teams, red teams, and vulnerability management teams across industries such as financial services, healthcare, retail, media, and transportation. Organizations of all sizes, from small teams to enterprises with over 10,000 employees, use Cymulate to enhance their security posture. Learn more
What business impact can customers expect from Cymulate?
Customers have reported an 81% reduction in cyber risk within four months, a 60% increase in team efficiency, a 52% reduction in critical exposures, and a 30% improvement in threat prevention. These outcomes are supported by case studies such as Hertz Israel and Nemours Children's Health. Read case studies
How does Cymulate address the pain points of security teams?
Cymulate solves challenges such as overwhelming threat volume, lack of visibility, unclear prioritization, operational inefficiencies, fragmented tools, cloud complexity, and communication barriers by providing a unified, automated, and evidence-based exposure management platform. Learn more
Are there case studies showing Cymulate's effectiveness?
Yes, Cymulate features case studies across industries, including Hertz Israel (81% risk reduction), Nemours Children's Health (improved visibility), and a financial services organization (automated testing and prioritization). See all case studies
How does Cymulate tailor solutions for different security roles?
Cymulate addresses the unique needs of CISOs (metrics and alignment), SecOps (automation and efficiency), red teams (scalable offensive testing), and vulnerability management teams (prioritization and consolidation). Learn more
What feedback have customers given about Cymulate's ease of use?
Customers consistently praise Cymulate for its intuitive, user-friendly interface and quick implementation. Testimonials highlight the platform's ability to deliver actionable insights with minimal effort. Read testimonials
Security, Compliance & Trust
What security and compliance certifications does Cymulate hold?
Cymulate is certified for SOC2 Type II, ISO 27001:2013 (Information Security Management), ISO 27701 (Privacy Information Management), ISO 27017 (Cloud Services Security), and CSA STAR Level 1. These certifications demonstrate Cymulate's commitment to security, privacy, and cloud compliance. See details
How does Cymulate ensure data security and privacy?
Cymulate hosts its services in secure AWS data centers, uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), and follows a strict Secure Development Lifecycle (SDLC) with continuous vulnerability scanning and annual third-party penetration tests. Learn more
Is Cymulate GDPR compliant?
Yes, Cymulate adopts a holistic approach to GDPR, incorporating data protection by design and maintaining a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO). See compliance details
How does Cymulate train its employees on security?
All Cymulate employees receive ongoing security awareness training, are subject to phishing campaign tests, and must adhere to comprehensive security policies. Learn more
Pricing & Plans
What is Cymulate's pricing model?
Cymulate operates on a subscription-based pricing model tailored to each organization's needs. Pricing depends on the package, number of assets, and scenarios selected. For a custom quote, schedule a demo with Cymulate's team. Book a demo
Competition & Comparison
How does Cymulate compare to AttackIQ?
While AttackIQ provides automated security validation, Cymulate offers a more comprehensive threat scenario library, advanced AI-powered features, and greater ease of use. See comparison
What differentiates Cymulate from Mandiant Security Validation?
Cymulate stands out for its continuous innovation, AI-powered automation, and expanded exposure management capabilities, whereas Mandiant has seen less innovation in recent years. See comparison
How does Cymulate compare to Pentera?
Pentera focuses on attack path validation, but Cymulate provides a more complete exposure validation platform, covering the full kill chain and offering cloud control validation. See comparison
What makes Cymulate different from Picus Security?
Picus Security offers BAS with on-prem options, but Cymulate delivers a comprehensive exposure validation platform with full kill chain coverage and cloud control validation. See comparison
How does Cymulate compare to SafeBreach?
SafeBreach provides breach and attack simulation, but Cymulate offers a full CTEM solution, comprehensive exposure validation, and advanced automation with the industry's largest attack library. See comparison
What are the advantages of Cymulate over Scythe?
Scythe is built for advanced red teams to build custom attack campaigns, while Cymulate offers automated, no-code workflows, daily threat updates, and actionable remediation guidance, making it more user-friendly for security teams. See comparison
Company Information & Vision
When was Cymulate founded and how large is the company?
Cymulate was founded in 2016 and has a global presence with offices in eight locations, serving over 1,000 customers in 50 countries. Learn more
What is Cymulate's mission and vision?
Cymulate's mission is to revolutionize cybersecurity by fostering a proactive approach to managing threats, empowering organizations to effectively manage their security posture and improve resilience. See company vision
How does Cymulate contribute to the future of cybersecurity?
Cymulate drives innovation in exposure management, continuous threat validation, and automation, helping organizations shift from reactive to proactive security strategies and align with emerging industry trends. Learn more