Objectives of the Insider Threat Simulation
During the assessment, MWGroup Offensive Operators will:
- Assess pre-boot authentication to evaluate device-level security.
- Establish Command and Control (C2) infrastructure to maintain covert communication channels.
- Escalate privileges to gain administrative or sensitive access.
- Perform lateral movement within the network, either logically or through techniques such as internal spear phishing.
- Access and exfiltrate sensitive data to simulate data theft scenarios.
- Analyze and adjust detection points and defensive measures in real time to improve security posture.