25 New Adversary Emulation Packages Covering Ransomware and Advisory-Driven Threats
嗯,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述即可。 首先,我需要通读整篇文章,理解其主要内容。看起来这篇文章是关于AttackIQ Flex发布的25个新的对手模拟包,用于验证防御措施对勒索软件和其他网络攻击的准备情况。 文章提到了这些包分为几个类别:勒索软件和赎金模拟、后入侵行为模拟以及基于政府咨询的模拟。每个类别都有具体的例子,比如Ransom Tales的不同卷,以及针对CISA咨询的模拟包。 此外,文章还强调了这些模拟包如何帮助安全团队测试他们的预防、检测和响应能力,并通过重复测试来识别和改进防御中的漏洞。 现在,我需要将这些信息浓缩到100字以内。重点包括:25个新的对手模拟包、覆盖勒索软件、后入侵行为和政府咨询内容、帮助测试安全控制、提升防御能力。 所以,总结的时候要涵盖这些要点,并且语言简洁明了。 </think> AttackIQ Flex新增25个对手模拟包,涵盖勒索软件、赎金活动及政府威胁报告中的行为模式。这些模块化场景基于真实攻击技术,帮助验证安全控制在预防、检测和响应方面的有效性,并提升整体防御能力。 2026-1-21 14:0:23 Author: securityboulevard.com(查看原文) 阅读量:0 收藏

Real-world intrusions—whether driven by ransomware and extortion groups or documented through government threat advisories—unfold across a full attack lifecycle, placing simultaneous pressure on prevention, detection, and response capabilities.

This release expands your ability to validate ransomware readiness in practice by delivering 25 new adversary emulation packages in AttackIQ Flex, spanning ransomware and extortion activity, post-compromise intrusion behavior, and advisory-driven emulation aligned to government reporting from organizations such as CISA.

Flex Packages are modular adversary emulation scenarios designed to validate security controls using real-world operator tradecraft in a repeatable, evidence-based way.

Ransomware and Extortion Emulation Packages

What this group covers

This release set significantly expands ransomware emulation coverage by aligning scenarios to attacker tradecraft observed across multiple active ransomware and extortion-focused families. Many of the new packages map directly to the Ransom Tales initiative, which translates real-world ransomware TTPs into repeatable adversary emulations defenders can operationalize.

How This Strengthens Defenses

  • Stress-test prevention and detection controls against realistic ransomware playbooks (initial access, execution, persistence, discovery, lateral movement, and impact).
  • Validate incident response readiness, including alerting fidelity, containment, isolation, and recovery workflows under ransomware-like pressure.
  • Establish a repeatable baseline and then expand into family-specific behaviors to identify control gaps and measure improvement over time.

New Ransomware Emulation Packages

Additional ransomware packages released in this cycle: Warlock, Interlock, DragonForce, VanHelsing, Termite, Cuba, Underground, Industrial Spy

Notes:

  • The Warlock emulation aligns to threat activity targeting unpatched SharePoint via the ToolShell exploit chain.
  • The Interlock emulation aligns to the CISA advisory content and supporting reporting referenced by AttackIQ.

Post-Compromise and Hybrid Intrusion Emulation Packages

What this group covers

These emulations replicate what happens after an attacker has already gained access, where most breaches escalate and most controls quietly fail. They focus on post-compromise behaviors that frequently evade traditional control validation because they rely on stealth, living-off-the-land, and staged payload execution.

How This Strengthens Defenses

  • Validate visibility and detection across credential access, persistence, internal reconnaissance, and data movement.
  • Pressure-test threat hunting and triage workflows against activity that resembles real espionage and hybrid intrusion chains.
  • Test segmentation and identity controls under conditions where the adversary already has a foothold.

New Post-Compromise Emulation Packages

Salt Typhoon

Post-compromise activity aligned to SparrowDoor and ShadowPad campaigns

Background: AttackIQ published an emulation focused on Salt Typhoon post-compromise TTPs, and separately notes an update including a SparrowDoor and ShadowPad campaign emulation.

RomCom

Emulation of the intrusion chain from MeltingClaw downloader via ShadyHammock backdoor to RomCom deployment

Background: AttackIQ research highlights RomCom’s evolution and the broader espionage-to-ransomware convergence trend.

Advisory-Driven Emulation Packages

What this group covers

These packages translate CISA advisories into practical, testable emulation content allowing teams to validate controls against the specific TTPs and operational lessons documented in government-led incident reporting.

How This Strengthens Defenses

  • Quickly turn advisory guidance into measurable security validation runs.
  • Reinforce disciplined fundamentals, including rapid patching, centralized logging, and rehearsed incident response procedures.
  • Validate that detection and response pipelines identify the behaviors emphasized in the advisories, not just generic malware signals.

New Advisory Driven Emulation Packages

CISA AA25-141A

Russian GRU targeting Western logistics entities and technology companies

Background: AttackIQ released an assessment template aligned to AA25-141A and the reported GRU Unit 26165 activity.

CISA AA25-266A

Lessons learned from an incident response engagement (Windows)

Background: CISA emphasizes prompt patching and preparedness (IR planning and centralized logging), which this template helps teams validate in practice.

CISA AA24-016A

Androxgh0st malware indicators of compromise

Background: AttackIQ notes the template covers multiple malware samples associated with Androxgh0st activity observed since December 2022.

Practical Implications for Security Teams

Effective defense depends on understanding how adversaries operate across complete intrusion chains, not just whether individual controls trigger.

These adversary emulation packages allow security teams to:

  • Validate defenses using real-world operator tradecraft
  • Measure readiness across ransomware intrusion lifecycles
  • Operationalize advisory guidance through repeatable testing
  • Identify concrete detection and response gaps using evidence-based validation

Getting Started in AttackIQ Flex

These adversary emulation packages are available in AttackIQ Flex. Teams can sign up for free to begin testing.

Paul Reid

VP, Adversary Research Paul Reid is veteran of the complex, fast-paced world of cybersecurity, having served as a technology strategist for more than two decades for innovative technology companies. In these roles, he leveraged his deep expertise in cybersecurity, biometrics, network security, cryptography, and more, to guide customers, partners, industry analysts, and journalists through the intricate cybersecurity landscape. Most recently he has lead a team of Cyber Threat Hunters leveraging behavioral analytics to find emerging threats in the customers environment. Paul has been published numerous times and has shared his perspectives as keynote speakers at prominent industry conferences, such as the NATO Information Assurance Symposium, SANS@Night, and Microsoft TechED. Paul is a published author in the Prentice Hall Series in Computer Networking and Distributed Systems. He also holds several patents in CyberSecurity.

*** This is a Security Bloggers Network syndicated blog from AttackIQ authored by Paul Reid. Read the original post at: https://www.attackiq.com/2026/01/21/25-adversary-emulation-packages/


文章来源: https://securityboulevard.com/2026/01/25-new-adversary-emulation-packages-covering-ransomware-and-advisory-driven-threats/
如有侵权请联系:admin#unsafe.sh