Adversary Emulation

Our Red Team with 15+ years of expertise in offensive cybersecurity and intelligence is able to uncover human-related vulnerabilities by mimicking real-world cyberattacks and tactics, techniques, and procedures used by Advanced Persistent Threats (APTs) like organized crime, state-sponsored groups, hacktivists and so on, helping Client to improve their resilience and OPSEC:

  • Spear-Phishing:
    We launch a sophisticated cyberattack in order to test employees behaviour starting by deploying one or more evil-twin domains and sending specially crafted e-mails to target employees (containing a fake communication from a Client internal unit, with a weaponized link). As an addition we can deploy a "cloned" Client authenticated website (CRM, VPN, etc.) bringing target employees to land there in order to harvest their credentials.

  • Drive-by Download:
    We launch a sophisticated cyberattack in order to test employees behaviour starting by deploying one or more exploit-serving domains using evil-twin addresses and sending specially weaponized e-mails to target employees containing a fake communication from a Client internal unit, with a link and an attachment containing a link to download a malicious implant. If target employees are tricked to click on link and on specific trigger events a few known/public browser exploits are delivered (and possibly executed by) to them. If target employees are tricked to open weaponized attachment and click on inside link a malicious implant of us which will not harm the target in any way will be downloaded and possibly executed on their workstation getting desktop screenshot and some info as proof (and as an addition showing an unkillable full screen window giving notice of successfully attack).

  • Vishing:
    We launch a sophisticated cyberattack in order to test employees behaviour starting by deploying one or more fresh voip numbers and calling target employees acting as a Client internal unit asking for sensitive information and as an addition, tricking them to download and execute a remote access implant getting desktop screenshot and some user info as proof of execution.

  • Baiting:
    We launch a sophisticated cyberattack in order to test employees behaviour starting by making weaponized USB drives. A Fulgur Security’s Red Team agent emulates an insider threat who has already access to Client headquarter (as one of many providers personnel). They will enter Client building and put several weaponized USB drives in particular areas inside company buildings (ie. near coffee machines, bars, bathroom, etc.) in order to bait some employees to get them and put on their workstation or personal computers and if they will try to open weaponized documents and files a malicious implant of us which will not harm the target in any way will be executed getting desktop screenshot and some user info as evidence (and as an addition changing their desktop wallpaper giving notice of successfully attack).

  • Physical Infiltration:
    We launch a sophisticated cyberattack in order to test employees behaviour and physical security readiness starting by getting satellite photos of Client target building and photographic intelligence by taking pictures and recording videos of: "points of entry/exit", "guards", "access control points", "badges" and any other useful point of interest. A Fulgur Security’s Red Team agent waits outside Client main entrance (or if a secondary entrance is available, like a smoking area, or a bar area, that is to prefer to the main one) and will try to bypass badge/access control by following and going behind to some legitimate employee who is entering (tailgating), or using some excuse like "they forgot badge inside office" or any other pretext technique. If Red Team agent got access inside building they walk around in sensitive areas getting pictures/videos in a covert way using hidden cameras. As an additional step, if required, Red Team agent will try to get access to Data Center acting as an IT Help Desk/Security personnel who was sent to give an urgent check/fix to some server in behalf/due to request by CEO/IT manager.

Rules of Engagement

  • Mission: Attacking Client's employees evaluating their response
  • Modality: Black-box, Gray-box
  • Methodology: OSSTMM, CEH, MITRE ATT&CK, NATO
  • Location: Both from a remote side and within Client company simulating both an external and internal attacker
  • Privacy: NDA, encrypted deliverables, secure-deletion
  • Deliverable: Report with a description of the entire activity and artifacts collected and a Remediation Plan
  • Price: Get a quote

Copyright © 2012-2021 Fulgur Security - P.iva/Vat IT03343330795