Attack Simulation Services

Attack simulation services provide a broad scope with a holistic view of the organization across multiple information security domains. Using attack simulation methodology incorporating Techniques, Tactics and Procedures (TTPs) of advanced and sophisticated attackers. It covers a wide range of techniques such as Red Teaming, Blue Teaming and Purple Teaming.

Why Attack Simulation Services?

The objective of attack simulation services is to provide tailored interactions to your organization and work with you from both the attacker and defender perspective to identify threats to the critical data from your wider business rather than being confined to a specific subset of systems. 

Unlike our focused penetration testing, our attack simulation experts also support internal incident response teams to assess their capabilities and processes in a controlled and managed way. Depending on the scenarios and threat actors being simulated, the attack simulation teams can include a variety of attack methods such as spear phishing, insider threats, watering hole, media dead drops, physical, and telephone social engineering.

 




Our Attack Simulation methodology

We use a robust methodology aligned with Red Team and CREST STAR assessments but enhanced to include blue and purple team methodologies, which draws on common industry cyber kill chains.

The attack steps are intended to effectively mimic those of an advanced threat actor. Risk management is a key focus throughout the Attack Simulation engagement and enables realistic assessments, whilst minimizing risks to system availability and performance. 

 


CREST STAR framework

CREST Simulated Targeted Attack and Response (STAR) is a framework that delivers controlled, bespoke, intelligence-led targeted cyber-attack assessments which replicate the behaviours of identified threat actors. Our CREST accredited STAR testing ensures that attack groups which pose a genuine threat to your organization’s critical assets are identified and realistically simulated. Threat intelligence ensures that credible threats to an organization are not only identified, but that their modus operandi are effectively simulated during the engagement.

Bespoke Attack Simulation assessments

We are able to tailor Attack Simulation engagements to meet your requirements and budgets by selecting only relevant areas of the methodology. This allows you to focus on what is appropriate for your business and still get assurance of your organization’s resilience to attack.

Examples of bespoke Attack Simulation:

  • Open source intelligence gathering
  • Spear phishing simulation
  • Malware delivery / foothold establishment
  • Endpoint and server persistence
  • Data exfiltration simulation
  • Incident response detection
  • Incident response analysis
  • Incident response prevention

In each of the above cases, the testing can be performed on a zero or partial knowledge basis.