WELCOME
 

Welcome to the June edition of the Atomic Newsletter, a monthly email with updates and news about Atomic Red Team™ and its related projects such as MITRE ATT&CK®, Invoke-AtomicRedTeam, AtomicTestHarnesses, and more. Visit our website and join the community chat with us on Slack!

 
 
THE LATEST FROM ATOMIC RED TEAM
 
 
post-thumbnail
 
How well can you detect Raspberry Robin?
 

These three Atomic Red Team tests will help you validate your detection coverage of Raspberry Robin, a worm spread by USB and other external drives.

 
post-thumbnail
 
Attend a training and support Atomic-Operator!
 

Our friends at Antisyphon Training are donating 10% of revenue from Carrie Roberts’s “Attack Emulation Tools: Atomic Red Team, CALDERA & More” course to support Atomic-Operator, the Python execution framework for Atomic Red Team.

 
Test Falco rules in your Kubernetes cluster
 

The folks at sysdig published this handy guide for using Atomic Red Team to test Falco rules designed to detect anomalous activity in your Kubernetes systems.

 
New features for the Msiexec test harness
 

Red Canary's Matt Graeber and Jonny Johnson added a trio of features to the atomic test harness for T1218.007: Msiexec in May. The new creation utility, parser, and executor are described in detail in comments on GitHub.

 
CONTRIBUTOR SUPPORT
 
 

Top contributors

  • Tlor89
  • Dwhite9
  • lemon5

New contributors

  • it-native
  • javery-sysdig
  • dwhite9
  • BlueDragon01

 
 
Want to write your own test?
 

Take a roll of the dice at the bottom of our Atomic page to check and see which tests are missing atomic tests!

 
LEARN MORE
 
 
  Twitter   LinkedIn   GitHub   YouTube   Slack