Header Image
Breach Emulation Pricing Partners Contact Partner Login
Breach Emulation Pricing Partners Contact Partner Login

RedMimicry is a breach and attack emulation software. It emulates realistic threats like ransomware or supply chain attacks. These threats are contained in so called scenarios. A scenario may contain multiple playbooks that emulate different aspects of a threat. During playbooks, operators can use the attack shell to deviate from the playbooks path and conduct manual actions on targeted systems.

Scenarios

Scenarios

We prioritize realism and relevance in our cybersecurity scenarios. Our platform is regularly updated with new scenarios and playbooks to reflect the latest threats. Below is an overview of the current scenarios implemented in RedMimicry:

Ransomware

Our ransomware scenarios are built to closely mirror real-world attacks, focusing on both data encryption and exfiltration. These scenarios replicate the behavior of known ransomware groups, including the use of typical Command and Control (C2) channels, providing a realistic environment to test and strengthen your defenses.

Supply chain attacks

In our supply chain attack scenarios, we simulate the compromise of software development supply chains. This scenario reflects the growing risk of attackers infiltrating systems through trusted third-party software. By running these simulations, you can assess and improve your security measures against such complex threats.

Remote access tooling

Remote Access Tooling scenarios demonstrate how attackers gain unauthorized access to systems, often to scout the environment and move laterally within the network. These simulations help you understand and prepare for the tactics used in real-world intrusions, ensuring that your detection and response mechanisms are effective.

Common payload techniques

Our scenarios also include common payload techniques, which are essential for testing the effectiveness of Endpoint Detection and Response (EDR) and Network Detection and Response (NDR) systems. These playbooks focus on specific attack methods, providing a thorough test of your security infrastructure.

Learn more

To learn more on TTPs and available scenarios, contact Stefan Steinberg.