Advanced Persistent Hacking Emulation

SAFE CORE

What is Aphe?

APHE IS A CYBER SECURITY SERVICE THAT MEASURES THE REAL COMPANY'S IT SECURITY RESILIENCE.

Adversary emulation aims to test the resilience of a network against advanced attackers or advanced persistent threats (APT). To do this, the opponent's tactics, techniques and procedures (TTP) are emulated along the cyber kill chain, leading to deeper targeted attacks. Darkscan recommends "APHE", more suitable for complex organizations with an already structured approach to cyber security.

The value of APHE

APHE it is the state of the art of security assessments. This engagement has a typical duration of three to six months and assumes an advanced level of targeted attacks.

Engagement goals and objectives will be established in mutual agreement with the client's management. Darkscan collects information about target organizations, which is then used to identify paths of least resistance and greatest potential for success. Next, we execute our attack strategy and measure the target's defense level. The final documentation will consist of a series of reports of all the information collected, the tools and methods used, the security controls observed and the areas of opportunity. 

The temporal development of APHE

The Aphe analysis is represented below in its temporal development assuming, in this example, the duration of 3 months.

Aphe's goal

APHE takes security measurement to a whole new level by focusing attack efforts over an extended period of time, typically months.

This allows the Darkscan team to gather more information on specific targets to launch an ad hoc campaign that leverages social engineering, phishing, trojan payloads, persistence techniques and more to compromise the organization.

The goal is to emulate real-world threats targeting your organization to better prepare it for defense against cybercriminals.

Areas of action

APHE takes security measurement to a whole new level by focusing attack efforts over an extended period of time, typically months.

This allows the Darkscan team to gather more information on specific targets to launch an ad hoc campaign that leverages social engineering, phishing, trojan payloads, persistence techniques and more to compromise the organization.

The goal is to emulate real-world threats targeting your organization to better prepare it for defense against cybercriminals.

  • Publicly accessible information about the organization
  • Social media profiles of targeted individuals
  • Previously compromised credentials
  • Prolonged social engineering
  • Hidden communication channels
  • Data exfiltration
  • Maintaining persistence

Final reports

  • Complete dump of all data obtained on the organization and targeted individuals.
  • Executive summary report outlining business risks.
  • Technical report detailing information sources, social engineering attempts, call logs, and more.
Group 2 Copy 3
SAFECORE VIRTUAL ROOM

Welcome

Our digital space is at your disposal!

Choose how to interact
Start here, you can start a new conversation if the consultant is available or book your appointment.

Talk to a consultant

Book an appointment