Huntress Acquires Inside Agent: A New Era for Identity ProtectionFree Trial
Menu
InvestorsCareersBlogAboutAcademySupportContact
LoginSign up
OFFENSIVE CYBER OPERATIONS · RED TEAM · APT SIMULATION · FULL-SPECTRUM ATTACK

Simulate Real-World Adversaries.Expose What Your DefensesCan't Stop.

Nation-state-grade offensive cyber operations that put your security controls, incident response, and detection capabilities under sustained, intelligence-driven adversarial pressure — before a real threat actor does.

Cyber Operations · Nation-State Tradecraft · Full-Spectrum Adversary Simulation

The most sophisticated
adversaries don't knock.

Nation-state groups operate with intelligence, patience, and custom tooling built to evade your specific controls. Generic penetration tests validate known techniques — cyber operations validate whether you can detect the unknown TTPs used against you specifically.

Live Intel FeedLIVE
LATERAL·MVMT11:24:55

Pass-the-Hash — DC01 pivot via WMI exec

HIGH
VOLT·TYPHOON11:25:03

LOLBin exec — wmic.exe /node:10.10.5.12 process call

MEDIUM
PERSIST11:25:18

Scheduled task created: svc_winupdate2 (SYSTEM)

HIGH
APT2911:25:29

Golden Ticket forged — all hash from DCSync executed

CRITICAL
EXFIL11:25:44

DNS tunnel staging — 14.2 GB via dnscat2 beacon

CRITICAL
SCATTERED·SPIDER11:26:02

MFA fatigue accepted — target capitulated push #6

CRITICAL
C2·HEARTBEAT11:26:17

Sliver implant alive — 38 s jitter — JA3 spoofed

MEDIUM
APT2811:24:07

LSASS memory dump attempt — WKST-FINANCE-09

CRITICAL
ATT&CK Coverage WheelMITRE v14 · 14 Tactics · 206 Techniques
206of 227 techniquescovered18 detectedReconRes.DevInit.AccessExecutionPersistPriv.EscDef.EvadeCred.AccDiscoveryLat.MvmtCollectionC2ExfilImpact

Ring Legend

Outer — techniques covered (per-tactic colour)
Inner — techniques that triggered a detection

Detection Reality — 2024 Cohort

Initial access undetected73%
EDR bypass success rate82%
Crown jewel access silent48%
Lateral movement undetected61%
Domain Admin achieved <72h89%

Breach Dwell — Before vs After Spakto

Industry avg
207d
Post-Spakto
14d
Detection Layer Efficacy
Email GatewayCRITICAL GAP

Spear-phish LNKX payload

DETECT28%
BYPASS72%
EDR / AVCRITICAL GAP

Custom shellcode (LLVM)

DETECT18%
BYPASS82%
SIEMHIGH GAP

WMI lateral movement

DETECT41%
BYPASS59%
NDR / IDSHIGH GAP

DNS tunnel C2 exfil

DETECT33%
BYPASS67%
DLPCRITICAL GAP

OneDrive staged exfil

DETECT22%
BYPASS78%
PAMMED GAP

Pass-the-Hash / Kerberoast

DETECT55%
BYPASS45%
0%
Initial access undetected
per 2024 engagement cohort
0d
Industry average breach dwell
IBM X-Force 2024 report
0%
Crown jewel access undetected
red team engagements
0%
EDR bypass rate
custom implant tooling
Offensive Cyber Kill Chain · 7 Operational Phases

Intelligence-led execution.
No shortcuts. No scripts.

PHASE 01 / 07

Target Intelligence

01

Pre-engagement intelligence mirrors nation-state preparation. We enumerate digital footprint across open sources, dark web forums, credential dumps, and infrastructure registries — building the same target package a real adversary assembles before first contact.

OSINT Collection
Dark Web Recon
ASM Mapping
Adversary Profiling
Primary tooling
MaltegoOSINT FrameworkShodanIntelXDehashed
MITRE ATT&CK
T1589T1590T1591T1592
auto · 4s
01
Target Intelligence
02
Initial Access
03
Persistence & C2
04
Privilege Escalation
05
Lateral Movement
06
Collection & Exfil
07
Debrief & Hardening
Engagement Models · Four Operation Types

Calibrated to your
threat model, not a template.

Full-Spectrum Red Team

End-to-end adversary simulation — no scope limits
Investment
£60K–£150K
8–12 weeks
Operational phases
1
Threat model + OSINT recon
2
Multi-vector initial access
3
Sustained persistence + C2
4
Full kill chain execution
5
Crown jewel targeting
6
Purple team debrief
Deliverables
Classified attack narrative
ATT&CK heatmap
Detection gap analysis
Hardening roadmap
Retest slot
Full-Spectrum Red Team
8–12 weeks · £60K–£150K
APT Campaign Simulation
4–8 weeks · £35K–£90K
Assumed Breach Operations
2–4 weeks · £20K–£55K
Zero-Day Research
Retainer-based · £30K–£80K / qtr
Always included
Rules of engagement
Evidence-backed findings
ATT&CK heatmap
Executive brief
Retest slot
Threat Actor Emulation · Named Group TTPs · Sector-Specific

We emulate the exact actors
targeting your industry.

Threat intelligence-led engagements replicate the specific TTPs of adversary groups with documented campaigns against your sector — so your defences train against realistic, not hypothetical, attacks.

Russia · GRU

APT28 / Fancy Bear

52 TECHNIQUES
CURRENTLY ACTIVE
Primary targets
GovernmentDefenceEnergyThink Tanks
Signature TTPs emulated
X-Agent implant
Zebrocy spear-phish
ADFS exploitation
Credential harvesting portals
EMULATION APPROACH

We replicate APT28 / Fancy Bear's specific tooling, C2 patterns, and post-exploitation tradecraft — executing against your production defences in a controlled simulation with full counter-forensics discipline.

Techniques in Library
52
MITRE ATT&CK mapped
All threat actors
Lazarus Group
DPRK · RGB
Volt Typhoon
China · MSS
Scattered Spider
eCrime / EN
ALPHV / BlackCat
Criminal / RaaS
FIN7 / Carbanak
Criminal / UA
Offensive Capabilities · Tooling · Tradecraft

Six offensive capabilities.
Built for your environment.

CAPABILITY 01

Custom C2 Infrastructure

Purpose-built command-and-control using domain fronting, encrypted JA3-evasive channels, and unique communication patterns engineered to evade your specific security tooling.

Domain fronting via CDNJA3/JA3S fingerprint evasionDNS-over-HTTPS beaconingMalleable C2 profiles
CAPABILITY 02

Bespoke Implant Development

Custom-compiled implants per engagement with unique signatures, anti-analysis features, and evasion code targeting your deployed EDR, AV, and AMSI solutions.

Per-engagement compilationReflective DLL injectionAMSI/ETW bypassSleep obfuscation
CAPABILITY 03

Supply Chain Compromise

Simulate third-party software, hardware, and MSP compromises — replicating SolarWinds, 3CX, and MOVEit-style attack patterns against your specific vendor chain.

CI/CD pipeline injectionTrojanised update packagesMSP lateral movementDLL sideloading chains
CAPABILITY 04

OT/ICS Attack Testing

IT-to-OT boundary crossing, ICS protocol attacks (Modbus, DNP3, S7), and SCADA manipulation simulation for industrial environments requiring highest-fidelity adversary testing.

Purdue model traversalICS protocol fuzzingHMI attack simulationSafety system bypass
CAPABILITY 05

Physical Intrusion

Authorised physical security assessments — badge cloning, tailgating, social engineering, hardware implant planting — testing physical-cyber boundary and insider threat paths.

RFID/NFC cloningKeypad bypassRogue device plantingSocial engineering
CAPABILITY 06

Living-off-the-Land Ops

Zero-footprint operations using only native OS tooling, legitimate admin software, and trusted cloud services — operating below EDR alert thresholds and defeating signature detection.

PowerShell/WMI abuseLOLBin executionTrusted cloud C2 (Teams/OneDrive)Fileless persistence
Attack Timeline · Real Engagement Reconstruction

72 hours. Domain admin.
Zero SOC alerts triggered.

This is a representative timeline from a 2024 full-spectrum red team engagement against a Tier 1 financial institution. From first phishing email to domain admin took under 72 hours — with only 2 of 8 attack steps detected.

ENGAGEMENT TIMELINE — FINANCIAL SECTOR · FULL-SPECTRUM RED TEAM · 2024
UNDETECTED
DETECTED
DAY
TIME
EVENT
PHASE
DETECTED
D+0
09:14
Initial phishing email delivered — exec assistant targeted
Initial Access
UNDETECTED
D+0
09:47
Link clicked — EvilginX proxy captures O365 session token
Initial Access
UNDETECTED
D+1
02:10
Cobalt Strike beacon established — LOLBin loader
C2 Establish
UNDETECTED
D+1
06:33
BloodHound enumeration — 4,200 AD objects collected
Discovery
DETECTED
D+2
11:18
Kerberoast — 12 service account tickets extracted
Cred. Access
UNDETECTED
D+2
14:55
Lateral movement to DC01 via Pass-the-Hash
Lateral Mvmt
UNDETECTED
D+3
03:40
Domain Admin achieved — DC sync executed
Priv. Escalation
DETECTED
D+4
22:00
Crown jewel DB exfiltrated via DNS tunnelling — 14GB
Exfiltration
UNDETECTED
Total engagement duration
4 days
Steps detected / total
2 / 8
Detection rate
25%
Crown jewel DB exfiltrated
14GB via DNS tunnelling
Operational Frameworks · Standards · Regulatory Alignment

Every operation grounded
in published doctrine.

TIBER-EU 2.0
CBEST Ready
ATT&CK v14.1
PTES Compliant
FCA Aligned
FRAMEWORK STANDARD · Enterprise + Cloud

MITRE ATT&CK

MITRE Corporation·v14.1
ATT&CK

Every TTP executed is mapped to the enterprise framework — producing a detection coverage heatmap and precise gap analysis against the global adversary knowledge base.

Tactic / Phase Coverage
12 areas mapped
Initial Access
9/9
Execution
11/12
Persistence
16/17
Privilege Esc.
12/13
Defense Evasion
35/38
Credential Access
14/15
Discovery
26/28
Lateral Movement
9/9
Collection
17/17
C2
14/16
Exfiltration
9/9
Impact
22/23
206
Total Controls
194
Covered
94%
Coverage
12
Gap Items
ATT&CK
MITRE ATT&CK
94%
194/206
v14.1 · Enterprise + Cloud
CBEST
CBEST / TIBER-EU
100%
48/48
PTES
PTES Standard
100%
32/32
OCO
Spakto OCO Doctrine
100%
24/24
Framework Deliverables
ATT&CK Navigator export (.json)
Tactic-level heatmap
Technique evidence log
Detection gap analysis
Standards & Matrices
Enterprise MatrixCloud MatrixICS Overlayv14.1
Defense Evasion Results · Security Stack Stress Test

Six controls tested.
Every one bypassed.

Real bypass data from production enterprise environments — not lab conditions. Every finding below was reproduced against a live security stack during a commissioned red team engagement.

71%
Avg Bypass Rate
3
Critical Gaps
6
Controls Tested
CRITICALProofpoint / Defender
Email Gateway
LNKX payload + HTML smuggling via homograph domain
72%
bypass rate
Bypass72%
Detected28%
▼ show finding + fix
◈ Finding

ML filtering bypassed via LNKX file splitting across multi-archive delivery chain. HTML smuggling evaded URL detonation sandbox with zero alert.

◈ Recommended Fix

Enforce FIDO2 MFA + implement sandboxed link detonation with behavioural analysis engine

CRITICALCrowdStrike / SentinelOne
EDR / AV
LLVM-compiled shellcode with HWBP anti-hook + sleep masking
82%
bypass rate
Bypass82%
Detected18%
▼ show finding + fix
◈ Finding

HWBP-based syscall bypass defeated EDR kernel callbacks. LLVM obfuscation evaded all static signatures. Sleep masking reduced memory-scan telemetry to zero.

◈ Recommended Fix

Kernel-level ETW providers + Virtualization-Based Security + enforce memory integrity policy

HIGHSplunk / Microsoft Sentinel
SIEM / SOC
WMI subscription persistence + DCOM lateral movement
59%
bypass rate
Bypass59%
Detected41%
▼ show finding + fix
◈ Finding

WMI event subscriptions generated no alert. DCOM lateral movement blended with legitimate admin traffic — volume below SIEM alert threshold for 11 days.

◈ Recommended Fix

Tune WMI/DCOM alert rules + deploy deception service accounts with honeypot Kerberoastable SPNs

HIGHVectra AI / Darktrace
NDR / IDS
DNS-over-HTTPS C2 tunnel — 14.2 GB exfil over 9 days
67%
bypass rate
Bypass67%
Detected33%
▼ show finding + fix
◈ Finding

14.2 GB exfiltrated via DoH tunnel entirely undetected. JA3/JA3S fingerprint randomisation defeated TLS inspection. Beacon jitter evaded ML baseline.

◈ Recommended Fix

Block DoH to non-approved resolvers + enforce JA3 pinning for egress on data-classified paths

CRITICALMicrosoft Purview
DLP
SharePoint staging → OneDrive sync client → personal cloud exfil
78%
bypass rate
Bypass78%
Detected22%
▼ show finding + fix
◈ Finding

RESTRICTED data moved through SharePoint to OneDrive without triggering DLP. Sync client whitelisted globally — bypassing all label-based enforcement.

◈ Recommended Fix

Enforce Conditional Access on OneDrive sync + apply sensitivity-label-gated exfil controls

MEDIUMCyberArk / Entra ID
PAM / Identity
LSASS dump → Kerberoasting → DCSync — full domain compromise
45%
bypass rate
Bypass45%
Detected55%
▼ show finding + fix
◈ Finding

LSASS dump via indirect syscall evaded CyberArk EDR integration. Kerberoastable SPNs with RC4 keys cracked offline in 4 hours — no alert raised.

◈ Recommended Fix

Protected Users group + Credential Guard + rotate all SPNs to 256-bit AES + tiered admin model

Full detection gap matrix, evidence log, and remediation roadmap included in every engagement report.
Request Full Assessment →
Engagement Process · 6-Phase Methodology · 56-Day Cycle

Structured like an
intelligence operation.

Every engagement follows a defined six-phase cycle — governed, transparent, and evidence-backed at every step. No black-box testing. No scope creep. No surprises.

Phase 01 · Days 1–3

Threat Model

Define the exact adversary targeting your sector. Map crown jewels. Agree scope and rules of engagement with legal.

01
Activities
1
Named-actor TTP research
2
Crown jewel identification
3
Scope definition + boundary map
4
Rules of engagement signing
5
CISO threat briefing
Deliverables
Signed engagement charter
Threat model document
Adversary profile card
Scope boundary map
Governance
GATE REQUIREMENT

Client CISO + Legal sign-off required before any activity commences

DURATIONDays 1–3
ACTIVITIES5
OUTPUTS4
Our Advantage · Why Spakto

We operate like the
adversary pursuing you.

Most red teams run Cobalt Strike defaults and call it a nation-state simulation. Spakto operators are former threat intelligence analysts, malware reverse engineers, and incident responders who have tracked the groups they now emulate.

Former threat intel operators
01

Nation-State Tradecraft

Our red team operators include former threat intelligence analysts, incident responders who've tracked nation-state groups, and malware reverse engineers — not script kiddies with a Kali VM.

Zero commodity frameworks
02

Custom Tooling Only

Every engagement uses custom-compiled implants with unique signatures. We never rely on off-the-shelf tools that your EDR vendor has already seen — making our simulations truly authentic.

Regulatory frameworks supported
03

TIBER-EU / CBEST Ready

For financial institutions and critical infrastructure operators, we deliver TIBER-EU and CBEST-compliant engagements — including the formal threat intelligence requirement.

IT → OT boundary specialists
04

OT/ICS Capability

Most red teams stop at the IT/OT boundary. Spakto has dedicated ICS/SCADA operators who can simulate adversary traversal into operational technology environments.

Full anti-forensics execution
05

Counter-Forensics Ops

We execute with the same counter-forensic discipline as nation-state actors — timestomping, log evasion, forensic artefact minimisation — testing your IR team's ability to reconstruct the attack.

Purple team debrief always
06

Blue Team Collaboration

Every cyber operation concludes with a structured purple team debrief transferring TTP knowledge to defenders and validating detection improvements in real time.

Cyber Operations FAQs

Frequently asked
questions.

Still have questions?
Our security engineers answer within one business day.
Ask a question