<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Sahil Malvi</title>
    <description>The latest articles on Forem by Sahil Malvi (@itsmalvious).</description>
    <link>https://forem.com/itsmalvious</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3528669%2F5cf2c559-ab89-4bdb-a5dc-b90d6c8e9989.png</url>
      <title>Forem: Sahil Malvi</title>
      <link>https://forem.com/itsmalvious</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/itsmalvious"/>
    <language>en</language>
    <item>
      <title>From Validation to Valuation: How BAS in CTEM Turns Into a Weapon Against OEM Licensing Bloat</title>
      <dc:creator>Sahil Malvi</dc:creator>
      <pubDate>Sat, 18 Oct 2025 12:52:42 +0000</pubDate>
      <link>https://forem.com/itsmalvious/from-validation-to-valuation-how-bas-in-ctem-turns-into-a-weapon-against-oem-licensing-bloat-3j00</link>
      <guid>https://forem.com/itsmalvious/from-validation-to-valuation-how-bas-in-ctem-turns-into-a-weapon-against-oem-licensing-bloat-3j00</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fne0qwmjkitjtaawlcfgt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fne0qwmjkitjtaawlcfgt.png" alt=" " width="720" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Start of my POV:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;In BFSI, most of them spend millions on security controls: EDRs, SIEMs, DLPs, WAFs, firewalls. Vendors pitch them as silver bullets, and procurement signs cheques because who dares say no to security?&lt;br&gt;
But here’s the uncomfortable question: who validates whether those million-dollar controls actually deliver what OEMs claim?&lt;/p&gt;

&lt;p&gt;It’s not only about whether an EDR spotted a payload, or if a DLP stopped sensitive file movement. It’s about whether the OEM’s million-dollar license actually delivers resilience when tested under fire.&lt;/p&gt;

&lt;p&gt;PPT Slide decks or POCs don’t stop breaches. BAS does.&lt;/p&gt;

&lt;p&gt;That’s where my thinking shifted. BAS isn’t just a purple team tool for defense readiness inside CTEM, it becomes a business weapon. It validates, yes. But more importantly, it gives you negotiation leverage against OEMs charging enterprise premiums while quietly missing real-world attacks.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Old Game-Paying for Promises:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fedrs1vycm6vecpm97jt9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fedrs1vycm6vecpm97jt9.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Vendors/OEM sell a dream “Our EDR stops ransomware, our DLP blocks insider leaks, our SIEM gives total visibility, our WAF blocks every threat.”&lt;br&gt;
Renewal comes, procurement signs millions again.&lt;/p&gt;

&lt;p&gt;But when reality plays out, the shortcomings become clear:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;EDR misses obfuscated payload and shadow copy deletion.&lt;/li&gt;
&lt;li&gt;DLP lets sensitive data slip out over various channels.&lt;/li&gt;
&lt;li&gt;SIEM floods dashboards with noise but misses the chain.&lt;/li&gt;
&lt;li&gt;WAF looks impressive on paper, but lateral moves pass unhindered.&lt;/li&gt;
&lt;li&gt;IAM misconfigurations let service accounts pivot into crown-jewel  stores and IAM vendors rarely get this tested.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We don’t pay for proof, we pay for promises. Year after year, license costs keep climbing with some new fancy add-ons.&lt;/p&gt;

&lt;p&gt;Slide decks assure ‘99% coverage, AI, behavioural detection, and other buzzwords.’ Yet when BAS runs a real attack chain, the truth is laid bare. Critical gaps like data exfiltration remain unaddressed.&lt;br&gt;
That’s the old game: trust the pitch, ignore the gaps, and keep the OEM wheel spinning with our budgets.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Current Game-Reality Check:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F85fzbk1j7eyk0y9tz0xp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F85fzbk1j7eyk0y9tz0xp.png" alt=" " width="720" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Once BAS runs in an environment, nothing stays the same: OEM claims are validated under real-world conditions. Controls thought to be airtight start showing vulnerabilities with their flawed policies and misconfiguration. Dashboards that once gave comfort now scream with overlooked gaps.&lt;/p&gt;

&lt;p&gt;The integration is small, but the impact is massive. Teams finally see what works, what fails, and where risk truly lies. BAS doesn’t deal in assumptions, it delivers fact-based results. Every high-impact tactic that slips through isn’t a theory anymore; it’s logged evidence staring everyone in the face.&lt;/p&gt;

&lt;p&gt;And that’s where the tension begins. BAS doesn’t just challenge vendors,&lt;br&gt;
it challenges us. Security teams, product owners, even executives who signed off on compliance dashboards suddenly see that “handled alerts” don’t equal resilience. BAS makes enemies because it removes excuses.&lt;br&gt;
But that’s exactly its value every gap it uncovers becomes a call to action.&lt;/p&gt;

&lt;p&gt;The fallout is productive. This phase is a bit rough for both the BAS operator and the other security teams until the mitigation steps are mapped.&lt;/p&gt;

&lt;p&gt;Some vendors will resist so hard they’ll try to discredit the BAS tests rather than improve. The arms race will intensify. Parameters are tightened. Shadow IT teams get dragged into the light.&lt;br&gt;
Those “we’ll fix it later” leaks finally climb to the top of the list. The conversations shift from comfort in promises to discomfort in proof.&lt;/p&gt;

&lt;p&gt;The Current Game is internal. It’s about awareness, accountability, and responsibility.&lt;br&gt;
It’s about forcing the right people to understand the how and the why of security not just the what. BAS becomes the compass, pulling organizations from assumption to reality, from blind spending to evidence driven security posture.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhrojreer1euqvzwvqjzm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhrojreer1euqvzwvqjzm.png" alt=" " width="720" height="1080"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The New Game-Valuation, brochures vs receipts:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;When BAS first enters, it exposes cracks. But when it matures inside an organization, the game shifts completely.&lt;/p&gt;

&lt;p&gt;Now, every OEM/vendor promise has receipts.&lt;br&gt;
Every overlooked misconfiguration, every policy gap, every silent miss is logged not as theory but as hard data.&lt;/p&gt;

&lt;p&gt;And that data becomes a weapon at the boardroom.&lt;/p&gt;

&lt;p&gt;Renewal isn’t about who has the best marketing brochure anymore&lt;br&gt;
Renewal is about evidence:&lt;/p&gt;

&lt;p&gt;This is where your solution broke under real attack simulation.&lt;br&gt;
This is where we had to step in because your coverage failed.&lt;br&gt;
This is where alerts were created by BAS but not detected or reported by Security Solution.&lt;br&gt;
For BFSI, this is power.&lt;br&gt;
Because for once, it’s not just spending under pressure it’s negotiating with backbone. BAS has already done the hard part: stripping away comfort, removing excuses, forcing visibility.&lt;/p&gt;

&lt;p&gt;OEMs can’t hide behind “will check with team and update” or inflated protection scores. Either they fix, or they justify, or they face reduced valuation.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxunyoyq6fzc7q0uom807.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxunyoyq6fzc7q0uom807.png" alt=" " width="720" height="1080"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;This is the new game.&lt;/strong&gt;&lt;br&gt;
Renewals are no longer driven by faith, but by evidence and that evidence gives BFSI the leverage to set the terms. This is where CTEM provides the broader context: BAS is not an isolated tool but a critical stage in a continuous, risk-based approach.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;What’s CTEM ?&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;Not a tool but a risk-based approach&lt;br&gt;
CTEM is not a single product, but a continuous, risk-based approach to identifying, prioritizing, and mitigating exposures across the organization. It ensures security teams focus on the most critical threats, rather than chasing every vulnerability in the stack.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Gartner CTEM in Five Steps:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;When Gartner first introduced Continuous Threat Exposure Management (CTEM), it shifted the conversation. CTEM wasn’t pitched as just another tool or dashboard; it was framed as a programmatic approach to continuously diagnosing and acting on the exposures that truly matter, a Proactive approach .&lt;/p&gt;

&lt;p&gt;Gartner breaks CTEM into five steps three in the diagnosis stage and two in the action stage:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Diagnosis → Scoping, Discovery, Prioritization&lt;br&gt;
Action → Validation, Mobilization&lt;/strong&gt;&lt;br&gt;
These steps aren’t meant to be a rigid, one way pipeline. In reality, they loop and feed each other. For example, validation often uncovers unexpected exposures, which then demand a fresh look at prioritization. Likewise, a newly discovered asset might be too critical to push into a future cycle it must be pulled back into the current one. CTEM is deliberately flexible: it treats exposure management as a continuous cycle, not a quarterly checklist or once in blue moon.&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;The Five Stages of Gartner CTEM:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw05hcyxicq4um3vbrfe2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw05hcyxicq4um3vbrfe2.png" alt=" " width="720" height="480"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Scoping&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Define the security areas and boundaries to assess.&lt;br&gt;
Identify critical assets, business priorities, and likely adversaries.&lt;br&gt;
Note: “Know what matters most before you chase every vulnerability.”&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Discovery&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Map exposures across assets: vulnerabilities, misconfigurations, identity weaknesses, and shadow IT.&lt;br&gt;
Tools include external attack surface management (EASM) and active scanning.&lt;br&gt;
Note: “You can’t protect what you don’t see.”&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Prioritization&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Rank exposures based on exploitability, business impact, and attacker behavior.&lt;br&gt;
Frameworks: EPSS (Exploit Prediction Scoring System), SSVC (Stakeholder Specific Vulnerability Categorization).&lt;br&gt;
Consider attack path analysis to see how multiple weaknesses could chain into a high impact compromise.&lt;br&gt;
Note: “Not all gaps are equal in focus where the attacker would first strike.”&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Validation&lt;/strong&gt; ~ where BAS kicks in&lt;/p&gt;

&lt;p&gt;Test whether prioritized exposures can actually be exploited.&lt;br&gt;
BAS, pentesting, and red teaming simulate real attacks.&lt;br&gt;
Note: “Theory meets reality, proof is better than assumption.”&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Mobilization&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Turn validated findings into coordinated action across teams.&lt;br&gt;
Feed insights into security operations, procurement, and executive decisions.&lt;br&gt;
Note: “Security becomes a business enabler when insights lead to accountable action.”&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Conclusion, a closing Note on CTEM:&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://dev.tourl"&gt;&lt;/a&gt;&lt;br&gt;
CTEM isn’t just another Gartner acronym to park on a slide show, it’s a working discipline. The real value lies in how it forces organizations to stop chasing noise and start aligning security with business impact. With scoping, discovery, and prioritization, you learn where the fire could start. With validation, BAS ensures the flames aren’t just theoretical. And mobilization ensures fixes aren’t buried in ticket queues but actually move the needle.&lt;/p&gt;

&lt;p&gt;The benefit? Security stops being reactive firefighting and becomes risk-driven execution. Teams know what matters, leaders see proof instead of promises, and investments finally map back to resilience.&lt;/p&gt;

&lt;p&gt;CTEM isn’t designed to satisfy compliance; it is designed to safeguard continuity.&lt;/p&gt;

&lt;p&gt;if you want to explore CTEM in greater depth, I’d strongly suggest the &lt;a href="https://cymulate.com/whitepaper/continuous-threat-exposure-management-ctem-from-theory-to-implementation/" rel="noopener noreferrer"&gt;Cymulate CTEM whitepaper&lt;/a&gt; it provides an excellent overview from theory to implementation.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The real winners in this new game aren’t the claims,&lt;br&gt;
They’re the organizations that uses the BAS + CTEM approach to put hard evidence behind every dollar they spend.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;— — — — — — — — — — — — — — — — — — — — — — — — —  — — —&lt;br&gt;
Na chal-kapāṭena raxṣā, na vākyaiḥ viśvāsaḥ; Raxitānām pramāṇena, satyam eva tiṣṭhati.&lt;br&gt;
(Neither trick nor speech brings protection, nor trust;&lt;br&gt;
Through proof of protection, truth alone stands firm.)&lt;br&gt;
— — — — — — — — — — — — — — — — — — — — — — — — — — — — — &lt;/p&gt;

</description>
      <category>discuss</category>
      <category>networksec</category>
      <category>tools</category>
    </item>
    <item>
      <title>No Harm, Real Alarms: How BAS Simulates Ransomware to Test EDR Resilience</title>
      <dc:creator>Sahil Malvi</dc:creator>
      <pubDate>Thu, 25 Sep 2025 08:36:17 +0000</pubDate>
      <link>https://forem.com/itsmalvious/no-harm-real-alarms-how-bas-simulates-ransomware-to-test-edr-resilience-2l</link>
      <guid>https://forem.com/itsmalvious/no-harm-real-alarms-how-bas-simulates-ransomware-to-test-edr-resilience-2l</guid>
      <description>&lt;p&gt;&lt;strong&gt;This write-up is divided into three parts:&lt;/strong&gt;&lt;br&gt;
The Attack: Understanding Ransomware&lt;br&gt;
A breakdown of how ransomware operates, from initial access to encryption.&lt;/p&gt;

&lt;p&gt;How EDR Solutions Work and Detect Threats&lt;br&gt;
An overview of how Endpoint Detection and Response (EDR) tools identify, analyze, and mitigate ransomware behavior.&lt;/p&gt;

&lt;p&gt;~How Breach and Attack Simulation (BAS) Technology Mimics Attacks&lt;br&gt;
A deep dive into how BAS platforms simulate ransomware attacks without causing real damage to user data or system files.&lt;/p&gt;

&lt;p&gt;The Attack: Understanding Ransomware&lt;br&gt;
What Happens When Ransomware Executes?&lt;/p&gt;

&lt;p&gt;When ransomware is executed, its behavior varies depending on the type. Some variants are self-contained, such as locker ransomware, which restricts access to the system. Others are network-aware worms, like WannaCry or Ryuk, capable of spreading across connected systems.&lt;/p&gt;

&lt;p&gt;Regardless of the variant, most ransomware follows a common chain of actions. Here’s a breakdown of what typically happens post-execution:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step-by-Step: What Ransomware Does After Execution&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Initial Setup and Evasion&lt;br&gt;
Runs in memory&lt;br&gt;
Anti-VM &amp;amp; anti-sandbox checks&lt;br&gt;
Kills security processes (EDRs, AVs)&lt;br&gt;
Escalates privilege (UAC bypass or exploits)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Persistence&lt;br&gt;
Modifies registry: HKCU\Software\Microsoft\Windows\CurrentVersion\Run&lt;br&gt;
Creates scheduled tasks or service&lt;br&gt;
Drops itself in temp folders or %APPDATA%&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;File Discovery and Target Enumeration&lt;br&gt;
Scans file systems for target file extensions:&lt;br&gt;
.doc, .xls, .pdf, .jpg, .db, .pst, etc.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Skips system folders sometimes to avoid crashing system (smart ones do).&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Searches connected media including&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;USB drives&lt;br&gt;
Mapped Network drive&lt;br&gt;
Mounted shares&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Once suitable targets are identified, the ransomware proceeds to encrypt files containing sensitive or high-value data, such as:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;PII (Personally Identifiable Information)&lt;br&gt;
PCI (Payment Card Information)&lt;br&gt;
Business-critical user files&lt;/p&gt;

&lt;p&gt;If the infected system has access to shared drives or USBs, those files may be encrypted as well — expanding the impact beyond the local machine.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4903o63yqxd9dp8msvuo.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4903o63yqxd9dp8msvuo.jpeg" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzhr9nh4v8gpm4ywqepdm.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzhr9nh4v8gpm4ywqepdm.jpeg" alt=" " width="800" height="1200"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;How EDR Solutions Work and Detect Threats&lt;br&gt;
EDR is focused on endpoints (like your laptop, desktop, or server),watching processes, memory, files, registry, and network calls in real time.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;EDR Detects Ransomware Using:&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Behavior-Based Detection (Most Effective)
EDR tools like CrowdStrike, SentinelOne, Microsoft Defender for Endpoint watch for:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;File I/O anomaly: rapid encryption of multiple files (CreateFile, WriteFile, Rename)&lt;br&gt;
File entropy changes (plain → encrypted becomes high entropy)&lt;/p&gt;

&lt;p&gt;.txt, .doc, .xls → .locked, .encrypted&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff0kjpkvv6pj9bkyxf46i.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff0kjpkvv6pj9bkyxf46i.jpeg" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;File extensions being renamed in bulk&lt;/p&gt;

&lt;p&gt;Unusual process spawning:&lt;br&gt;
winword.exe → drops powershell.exe&lt;br&gt;
explorer.exe → spawns vssadmin.exe&lt;/p&gt;

&lt;p&gt;Ransomware encrypts hundreds of files in seconds. That’s unusual compared to user activity.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Command Line Pattern Matching
EDR inspects suspicious command lines like:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;vssadmin delete shadows /all /quiet&lt;br&gt;
bcdedit /set {default} recoveryenabled no&lt;br&gt;
cipher /w:C&lt;br&gt;
A normal user doesn’t run this. EDR flags this as ransomware behavior or destruction of recovery.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Process Tree Monitoring
Tracks parent-child process chains:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;winword.exe → powershell.exe → cmd.exe → malware.exe&lt;br&gt;
This suspicious chain = alert.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Honeypots / Canary Files
Some EDRs plant hidden decoy files like:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;C:\Users\Public\DoNotTouch_Monitor.docx&lt;br&gt;
If touched its likely ransomware assumed by EDR solution.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Memory Injection / Code Injection Detection&lt;br&gt;
If ransomware injects into a legitimate process (e.g., explorer.exe) using CreateRemoteThread or VirtualAllocEx, EDR flags it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;ML/Heuristics&lt;br&gt;
Behavior profiling and anomaly detection&lt;br&gt;
New ransomware (unknown hash) still gets caught via behavior, not signature.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmkib6orasd86shyr0ijn.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmkib6orasd86shyr0ijn.jpeg" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;How Breach and Attack Simulation (BAS) Technology Mimics Attacks&lt;br&gt;
BAS simulates ransomware attacks using non-destructive behavioral mimicry. You’re spot on across most aspects. Let’s break this down and fine-tune the key technical points, highlight EDR interaction, and address some practical realities for red/blue teams.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;BAS Ransomware Simulation&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Behavioral Simulation — Not Actual Ransomware
Does not encrypt real files — no user or system data is harmed.
Label: T1486&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Emulates observable ransomware behaviors, such as:&lt;/p&gt;

&lt;p&gt;Mass file access operations&lt;br&gt;
File renaming across multiple directories&lt;br&gt;
Simulated extension changes (e.g., .docx ➝ .locked)&lt;br&gt;
Fake “encryption-like” content or entropy increase (not real encryption)&lt;br&gt;
These behaviors are used to trigger EDR/XDR responses&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;How BAS Interacts with EDR
EDR solutions don’t rely on signatures only.
They look for behavior like:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;High-rate file modification&lt;br&gt;
Use of built-in tools (vssadmin, bcdedit) Label: T1490&lt;br&gt;
Suspicious process trees (explorer.exe → powershell.exe) Label: T1059, T1059.003&lt;br&gt;
Unusual entropy or file type changes&lt;br&gt;
Memory injection or child process spawning. Label: T1086&lt;br&gt;
BAS simulates these, not executes them. The simulation engine triggers behavioral signatures, e.g.:&lt;/p&gt;

&lt;p&gt;Creating hundreds of fake .locked files&lt;br&gt;
Renaming test files to simulate encryption&lt;br&gt;
Simulating file scans and system API calls used by real ransomware (e.g., CreateFile, WriteFile, SetFileTime)&lt;br&gt;
EDR is fooled (intentionally) to think ransomware is present — validating detection logic.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Why %TEMP%, %ProgramData%, and Controlled Scopes?
These directories:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Are commonly abused by real malware.&lt;br&gt;
Are writable by standard users (safe to test without risking system files).&lt;br&gt;
Let the agent run simulated payloads in realistic but isolated environments.&lt;br&gt;
BAS: Uses local test files only, avoids real user data, and confines all activity to agent-controlled zones for safe execution and cleanup&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Safe Emulation Tactics Used by BAS
Simulated encryption: Instead of encrypting actual data,&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;BAS writes dummy files may changes harmless content. Alters timestamps or metadata.&lt;br&gt;
Registry Simulation:&lt;/p&gt;

&lt;p&gt;Creates mock entries that mimic persistence tactics but does not touch critical keys.&lt;br&gt;
Mock Process Injection:&lt;/p&gt;

&lt;p&gt;BAS may simulate or replay an injection attempt into explorer.exe, but doesn’t actually inject malicious code.&lt;br&gt;
C2 Communication Simulation:&lt;/p&gt;

&lt;p&gt;May simulate DNS queries or test beaconing and can test whether security tools detect this without contacting a real malicious server.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;BAS Agent Capabilities
The BAS Agent:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Executes the tests locally on the endpoint. Can run custom payloads or template-based tests. Cleans up afterward with self destruction code injected in the script.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8k35qe27ynaorlgwwx1d.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8k35qe27ynaorlgwwx1d.jpeg" alt=" " width="800" height="1200"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Real-World Use Case (Example):&lt;br&gt;
You run a BAS ransomware simulation:&lt;/p&gt;

&lt;p&gt;Agent creates 20 fake .locked files in %TEMP%.&lt;br&gt;
Renames them with high-entropy contents and uses PowerShell to simulate registry/persistence.&lt;br&gt;
Your EDR detects this: Ransomware behavioral match — blocked, Logs high write frequency + fake encryption. ATP flags simulated shadow copy deletion attempt.&lt;br&gt;
No real files are harmed, but your detection pipeline gets stress-tested just like in a live attack.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Below script for test purpose&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;#ItsMalvious
---------------------------------------------------------------------
# Create test directory
$TestDir = "$env:TEMP\RansomTest"
New-Item -ItemType Directory -Path $TestDir -Force | Out-Null

# Step 1: Create 20 .txt files
1..20 | ForEach-Object {
    $FilePath = Join-Path $TestDir "File$_.txt"
    Set-Content -Path $FilePath -Value "This is file $_ for simulation"
}

# Step 2: Rename first 10 to .locked, next 10 to .encrypted
Get-ChildItem -Path $TestDir -Filter *.txt | Sort-Object Name | Select-Object -First 10 | ForEach-Object {
    Rename-Item $_.FullName ($_.FullName -replace '.txt$', '.locked')
}

Get-ChildItem -Path $TestDir -Filter *.txt | Sort-Object Name | Select-Object -First 10 | ForEach-Object {
    Rename-Item $_.FullName ($_.FullName -replace '.txt$', '.encrypted')
}

# Optional: Simulate file content change to mimic encryption
Get-ChildItem -Path $TestDir -Filter *.locked,*.encrypted | ForEach-Object {
    Set-Content $_.FullName -Value ("X" * 2048)  # High entropy simulation
}

# Step 3: Wait for EDR to observe activity
Start-Sleep -Seconds 10

# Step 4: Self-destruct - delete all files and folder
Remove-Item -Path $TestDir -Recurse -Force
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;What the Script Actually Does:&lt;br&gt;
~ Creates a Folder&lt;br&gt;
$TestDir = "$env:TEMP\RansomTest"&lt;br&gt;
This creates a folder like:&lt;/p&gt;

&lt;p&gt;C:\Users\Sahil\AppData\Local\Temp\RansomTest&lt;br&gt;
So it’s working only in your system’s TEMP directory, not your Desktop, Downloads, or Documents.&lt;/p&gt;

&lt;p&gt;Creates 20 Text Files:&lt;br&gt;
It creates fake .txt files like:&lt;/p&gt;

&lt;p&gt;File1.txt, File2.txt, ..., File20.txt&lt;br&gt;
inside the RansomTest folder only.&lt;/p&gt;

&lt;p&gt;Renames &amp;amp; Modifies Only Those Files:&lt;br&gt;
It renames and modifies only the 20 files within the same folder:&lt;/p&gt;

&lt;p&gt;File1.txt → File1.locked&lt;br&gt;
File11.txt → File11.encrypted&lt;br&gt;
Then writes 2048 "X" characters into each to simulate encryption.&lt;br&gt;
Deletes Only the Test Folder:&lt;br&gt;
Remove-Item -Path $TestDir -Recurse -Force&lt;br&gt;
This only deletes the RansomTest folder and its contents, nothing else.&lt;/p&gt;

&lt;p&gt;Will It Touch Your Desktop or Real Files?&lt;br&gt;
Doesn’t touch C:\Users\Sahil\Desktop\&lt;br&gt;
Doesn’t access your Documents, Downloads, or network drives&lt;br&gt;
Only works in $env:TEMP\RansomTest&lt;/p&gt;

&lt;h1&gt;
  
  
  Verdict / My Opinion
&lt;/h1&gt;

&lt;p&gt;BAS tools give blue teams the power to test and validate their ransomware detection capabilities without putting their environments at risk.&lt;/p&gt;

&lt;p&gt;By simulating attacker behavior — not malware payloads — BAS tools enable organizations to:&lt;/p&gt;

&lt;p&gt;Verify their EDRs and SIEMs are correctly tuned&lt;br&gt;
Train analysts to respond to ransomware scenarios&lt;br&gt;
Continuously assess security posture without real damage&lt;br&gt;
If you’re looking to understand ransomware better, start by simulating it safely — and study how your EDR reacts. It’s the safest way to get as close to the real thing as possible without crossing the line.&lt;/p&gt;

&lt;p&gt;NOTE: Security isn’t just about deploying expensive tools — it’s about proving they actually work when it matters.&lt;br&gt;
Breach and Attack Simulation (BAS) gives organizations the power to challenge their own defenses — testing whether technologies like EDR, DLP, PAM, IAM, WAF, proxy, and SIEM aren’t just deployed, but effective.&lt;/p&gt;

&lt;p&gt;But this goes beyond just testing. With Continuous Threat Exposure Management (CTEM) — a strategic approach introduced by Gartner&lt;br&gt;
— With BAS and CTEM, CISOs and security leaders can:&lt;/p&gt;

&lt;p&gt;Map technical risk to real business impact&lt;br&gt;
Show executive leadership where actual exposure lies&lt;br&gt;
Prioritize and justify security budgets based on validated protection&lt;/p&gt;

&lt;p&gt;This is how a CISO stops guessing and starts leading.&lt;/p&gt;

&lt;p&gt;You can’t fix what you don’t see — and you can’t justify what you can’t prove. BAS and CTEM together bring visibility, validation, and real-world confidence back into cybersecurity.&lt;/p&gt;

&lt;p&gt;Because in today’s threat landscape, if your defenses only look good on paper —&lt;br&gt;
you’re already breached.&lt;/p&gt;

&lt;p&gt;This is just the start.&lt;br&gt;
A complete series is on the way — breaking down how real-world attacks work and how each security solution responds.&lt;br&gt;
Stay tuned — because understanding the how is the first step to defending the now.&lt;/p&gt;




&lt;p&gt;|&lt;strong&gt;R&lt;/strong&gt;akṣā-vidyāyām &lt;strong&gt;ā&lt;/strong&gt;cāryā &lt;strong&gt;x&lt;/strong&gt;-śūnyatāṁ t*&lt;em&gt;ī&lt;/em&gt;&lt;em&gt;vrā anubhūtiḥ **t&lt;/em&gt;&lt;em&gt;ārayati **a&lt;/em&gt;*rjunam.|&lt;br&gt;
(In the science of protection, the teacher of unknowns pierces illusion and uplifts the seeker.)&lt;/p&gt;




</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>testing</category>
    </item>
  </channel>
</rss>
