Question
A company has hired a red team to simulate the tactics, techniques, and procedures of APT 1337, a Malaysian profit-focused hacker syndicate, against their network.
As they attempt to gain access to the company's systems, they use APT 337's signature combination of social engineering techniques, data protection bypasses, and technical exploits to bypass security controls.
What activity is the red team conducting?
answer
Adversary emulation
Penetration testing
Security control testing
Output encoding
As they attempt to gain access to the company's systems, they use APT 337's signature combination of social engineering techniques, data protection bypasses, and technical exploits to bypass security controls.
What activity is the red team conducting?
answer
Adversary emulation
Penetration testing
Security control testing
Output encoding
Answers
GPT-4o mini
The activity that the red team is conducting is **Adversary emulation**.
Adversary emulation involves simulating the tactics, techniques, and procedures (TTPs) of specific threat actors—in this case, APT 1337—to assess the company's defenses and identify vulnerabilities in their security posture. This is distinct from general penetration testing, which may not adhere strictly to the specific strategies of a known threat actor.
Adversary emulation involves simulating the tactics, techniques, and procedures (TTPs) of specific threat actors—in this case, APT 1337—to assess the company's defenses and identify vulnerabilities in their security posture. This is distinct from general penetration testing, which may not adhere strictly to the specific strategies of a known threat actor.