Kaspersky has expanded its Kaspersky Interactive Protection Simulation (KIPS) with new advanced cyberattack scenarios tailored specifically for IT organisations. The update introduces realistic simulations of deepfake-enabled fraud, supply chain compromise, trusted relationship attacks and destructive wiper malware, helping businesses test their preparedness against today’s complex threat landscape.
IT companies remain one of the most attractive targets for cybercriminals. As attackers increasingly combine social engineering, supply chain manipulation and ransomware tactics, organisations require hands-on, strategic training that reflects real-world attack dynamics.
Kaspersky Interactive Protection Simulation is designed to bridge the communication gap between CISOs, IT teams and top management. By immersing participants in realistic cyber crisis scenarios, KIPS demonstrates the operational and business impact of attacks in an accessible, engaging format.
Real-world attacks in a realistic simulation environment
The updated IT-focused scenario in KIPS exposes participants to modern attack techniques observed by Kaspersky experts in active malicious campaigns targeting the IT sector.
Participants may face:
- Binary Backdoor in the Build – a supply chain attack that compromises software during signing, packaging or distribution stages. Once deployed, the tampered product enables data theft, persistent remote access and the compromise of trusted customers downstream.
- DeepFake Boss – a social engineering campaign leveraging AI-generated video and voice impersonations of corporate executives to manipulate finance teams into initiating unauthorised payments.
- Trusted Relationship Attack (VPN) – exploitation of third-party access and remote connectivity tools to infiltrate corporate environments through contractors or service providers.
- Wiper Attack (Babuk) – a destructive malware scenario based on leaked Babuk ransomware code. This scenario tests resilience against irreversible data corruption combined with ransomware deployment. In the simulation, if players fail to contain the attack in time, data becomes encrypted, forcing a complete rebuild from scratch.
