Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.
Assess your current email security posture with 50+ real-life attack scenarios. Spend only few minutes and see how many of those will land in your inbox
In the never-ending cyberarms race, email security solutions are evolving and so are attackers' evasion techniques.
During 70 000+ hours of responding to real incidents and conducting numerous cybercrime investigations Group-IB have been witnessing a lot of tricks, used by threat actors to bypass security systems.
Based on these insights we gathered a special set of samples that use encryption, time-based evasion and other techniques.
Follow the link below to audit your email security capabilities against the recent tactics and techniques used by attackers.

Attackers send out malware in archived attachments. Password for them may be hidden elsewhere, e.g. in another attachment

Malicious payload may be accessible via links and hidden behind time-dependant status changes, redirects, in cloud file storages and more

Malicious attachment may request specific user interaction, use self-encryption, implement different time based and interaction based technques

Choose or create a separate mailbox within your corporate domain. It’s preferred that this email is not in day-to-day use

Fill the information and accept the terms of user agreement in the testing system. Provide the created mailbox for the test

Run the test. Test scenarios will be sent to the provided email to determine how many of them bypass your existing security solution
The links and attachments in test emails are malicious. Please refrain from opening the attached files or clicking the links in the test emails.
The system only sends out test emails it has no access to your email communications, security systems or other sensitive data.
If there are no emails from the test delivered in the provided mailbox, then you are nicely protected form modern advanced email-borne attacks
If there is at least one email form the test delivered to the mailbox, then attackers may bypass your current email security solution using similar techniques