ATTACKIFY





Select from a number of modules to simulate ransomware behaviour on endpoints and communication over networks.

Ransomware Modules

Ransomware has exploded in recent years and every organization is at risk of ransomware running rampant within their envioronments. ATTACKIFY has a growing number of ransomware modules to assist organizations in detecting common ransomware behaviour. Safely simulate common ransomware functionality and use specific modules to test security awareness of end-users regarding ransomware attacks.

Some of the modules include:

  • Common ransomware functionality and behaviour seen in the wild (actual calls and functionality)
  • REvil functionality
  • WannaCry indicators
  • Ransom notes & social engineering

Don’t just emulate the TTP’s, ATTACKIFY can safely run actual API procedures and process calls seen in real ransomware.

Related Modules

Exfiltration

Exfiltration modules allow you to discover various techniques that can be used to exfiltrate sensitive data from within the organization to external C2's. Discover which services, ports and protcols can bypass your DLP solutions.

more info

Discovery

Discovery techniques allow attackers to fingerprint environments & better understand the environment they are moving through. These modules emulate numerous techniques.

more info

Execution

Attackers are always finding new methods to bypass execution prevention controls allowing them to execute code or commands without alerting or generating logs.

more info