SafeBreach Labs has updated the Hacker's Playbook™ with simulations for a new attack targeted at financial institutions, called Silence.

This attack uses trojan malware, which monitors and gathers information about business network devices and activity. The data gathered then is used by the attackers to craft false orders for financial transfers that appear to be legitimate.

While this attack has been targeted primarily at financial institutions, SafeBreach recommends all industries and businesses simulate this attack to identify whether or not they are protecting against the snooping malware. As always, SafeBreach Labs will continue to monitor the situation, and develop new simulations as necessary.

To assess security control effectiveness against techniques involved in this attack, the SafeBreach Breach and Attack Simulation Platform specifically tests the following endpoint and network security controls:

Playbook #1407 - Transfer of Silence Trojan

  • Network Controls - Are security controls in place to prevent the download and transfer of the malware used in this attack?

Playbook #1408 - Local installation of Silence Trojan

  • Endpoint Controls - Are security controls in place to prevent the local installation of the malware used in this attack?

Additional breach methods added recently include:

The Safebreach Hacker's Playbook™ of breach methods simulates these breach scenarios, and thousands more, without impacting users or infrastructure. Breach methods are constantly updated by SafeBreach Labs, our team of offensive security researchers, to help keep customers ahead of attacks.


Subscribe to blog post