The silhouette of a wolf head as our logo for the service Attack Simulation

Our Attack Simulations service line allows to simulate different threats in a cyber stresstest. This highlights undiscovered threats that our clients are faced within a Cyber Warfare. For example, we perform Ransomware Simulation, follow known Tactics, Techniques and Procedures (TTP) of Advanced Persistent Threat (APT) actors as well as we do support the EU standard for Threat Intelligence Based Ethical Red Teaming (TIBER) and traditional Red Teaming.

Attack TTPs are constantly evolving and attackers sophisticate their toolkits more than ever to bypass known good prevention methods at a large scale. With our long-term experience in performing Attack Simulations we permanently stay on top of the MITRE ATT&CK® framework to help you to defend your most valuable assets and lower the risk of a breach.



Organizations have security tools in use that are aimed to ease their day-to-day activity to follow up on specific attack patterns. However, often the less noisy and more stealthy attacks are not recognized as they are getting lost in the large amount of general attack-noise that the teams see on the line.


Preventing a modern targeted attack is a complex task which requires re-occurring training exercises and playbook training. The real state of a company’s security estate is often unknown to stakeholders involved, resulting in security budgets calculated without those important exercises.


IT staff is often trained on specific products and their security. This neglects the big picture of a potential attack chain and implications when multiple attack vectors are combined to a sophisticated attack.


Y-Security provides its clients with the greatest up-to-date Attack Simulations methodology available. Our Red Team exercises, Threat Simulation and Bespoke Scenario Simulation exercises are aligned to industry best practice. We combine our decades of experience in performing cyber resilience simulations with known, and (publicly) unknown, Tactics, Techniques and Procedures of real-world threat actors.


Our Red Team exercise is a goal-based adversarial activity that is performed from the perspective of an attacker with no or little knowledge of the target. The exercise is designed to verify if current technical, physical or process-based security controls and procedures are resistant to a targeted cyber attack. You gain insights into the risks a single coherent cyber-attack can bring to your organization. Additionally, your IT team learns from the attack results to improve their detection capabilities and strengthen your organization’s resistance against a targeted cyber attack.

A fireball as a logo for our Red Team service.
Location: Remote / Onsite
Variation: Purple Team, TIBER, Simulated Attack, Threat Intelligence

With our team’s experience we deliver a wide range of attack types, based on real world threat scenarios. This does not only include your digital assets, but also physical assets and your organization’s premises. No two red teams are alike and we take our time in each exercise to closely collaborate with you. Together, we identify the most likely attack scenarios and add the unexpected ones on top.

The Adversary Simulation exercise begins with developing a unique targeted attack plan specific to your organization. The attack plan is created with input from Threat Intelligence. We combine our experience, known threats to your organization’s branch of industry and threats your organization is facing. Elaborated threats are combined in a risk-based and goal-oriented attack plan including Tactics, Techniques and Procedures (TTPs) used by real Advanced Persistent Threat (APT) groups. In the attack plan we focus on gaining access to your organization’s critical assets and illustrate the impact of a compromise without suffering from the consequences of a real breach.

At Y-Security, we utilize the MITRE ATT&CK® framework as the basis for our methodology and extend it with our knowledge of performed Attack Simulations. The MITRE ATT&CK framework is a curated knowledge base and model for cyber adversary behavior that is used to describe the behavior of APT groups and software they use by aligning them to TTPs. The framework is divided into 14 categories and were merged into 6 phases for simplicity to form the kill-chain:

After the assessment you receive a detailed report to enhance your organization’s resistance against a targeted cyber attack. The report includes identified attack paths, activities undertaken throughout the exercise together with detailed logs and recommendations for your organization. Additionally, feedback sessions are conducted with stakeholders, Senior IT management and your IT team to discuss the attack paths and provide in-depth support to develop a more robust cyber security strategy.

We also carry out Threat Simulation exercises in which we mimic the behavior of an APT actor to verify if current technical, physical or process-based security controls and procedures are resistant to a targeted cyber attack.

Are you interested in testing your resilience?





Our Attack Simulations exercise allows you to perform a sophisticated attack chain within a safe, risk-evaluated environment, performed by experienced and well trained staff.


Improve your maturity level by expanding your standard security testing scope to the full picture that a real-world attacker would see and face.


Our Attack Simulations should be seen as a training opportunity for your IT and response team. Our exploit and lateral movement activity is performed in a repeatable fashion to allow your teams to tailor detection training to their needs.