• (863) 354-1136
  • matthew.robinson@lundyunlimited.com

Adversary Simulation (Social Engineering)

When perimeter defense such as firewalls, VPNs, and hardened web interfaces are robust, attackers move to the path of least resistance the employees.This service simulates advanced, targeted social engineering attacks to test your organization’s human security controls and incident response capabilities.

Email Spear Phishing  

Unlike generic spam, this is a highly targeted, researched campaign designed to deceive specific individuals or departments.

 Objective: To induce the target to click a malicious link, download a weaponized attachment, or divulge sensitive credentials.

Vishing (Voice Phishing)

This simulates a phone based attack where a sophisticated “adversary” uses social pressure, urgency, and impersonation to extract information.

Objective:
To gain unauthorized access, verify internal information, or bypass Multi-Factor Authentication (MFA) by manipulating the human on the other end of the line.

Data Harvesting & Internal Reconnaissance

We simulate the actual intent of an advanced persistent threat (APT).

Information Gathering: We create the necessary technical and social context to harvest any and all data provided from internal sources.

Simulation
Scope: This includes capturing credentials, identifying internal file shares, and mapping internal directory structures based on information leaked during the Phishing or Vishing stage