Macksofy Technologies
Dubai · Red Team
CERT-In EmpanelledDubai

Red Team Operations in Dubai · BFSI & Gov

Intelligence-led red team operations in Dubai — DIFC BFSI, Smart Dubai semi-government, DXB / DWC airline-airport estates — mapped to UAE IAS, DESC ISR, TIBER-style frameworks and DFSA supervisor expectations.

01
0 segments
DIFC · Smart Dubai · DXB-DWC · MEA HQ
02
0-14 wk
Operation duration by scope
03
0 years
DESC-aligned retention in tamper-evident storage
04
0-40
SIEM rule additions handed to client SOC
Red Team in Dubai

How a Macksofy red team engagement runs in Dubai.

Dubai red-team buyers split across four distinct demand segments and each demands a different scenario library. DIFC-regulated BFSI (banks, payment institutions, broker-dealers, asset managers) wants intelligence-led adversary simulation against money-movement, settlement, FX and DIFC-regulated customer-data systems, mapped to UAE IAS (NESA), DFSA Technology Risk and the TIBER-style frameworks the parent group runs in London / Frankfurt / Singapore. Smart Dubai semi-government and Dubai-government entities want scenarios against citizen-services, DigitalDubai / UAE PASS integrations and the OT / smart-infrastructure boundary, mapped to DESC ISR v2 with pre-agreed rules-of-engagement filed with the Dubai Electronic Security Centre directly. The airline and airport estates (Emirates Group at Dubai International Airport DXB, dnata, Dubai Airports operating DXB and DWC) want scenarios against passenger systems, cargo / freight, ground operations and the airport-OT boundary, with the operational-safety constraints of an Annex 17 ICAO regulated environment. Regional HQs of multinationals running MEA business from JLT / Internet City / Business Bay want red-team exercises against MEA-mandate fraud and supply-chain compromise patterns, with the parent group's TIBER / CBEST / iCAST framework alignment carried through.

For DIFC BFSI we run intelligence-led adversary simulations: open-source recon of DIFC Gate Village exec teams, their vendor ecosystem, public-disclosure leakage (DIFC Authority filings, DFSA approved-persons register, LinkedIn drift); spear-phishing pretexts tuned for regional norms (Eid timing, Ramadan working hours, the regional-board-meeting cadence, the DSF / GITEX / Future Investment Initiative event-window pretext); initial-access via the embedded-finance / partner-API surface or a third-party IT-services vendor compromise; lateral via Azure AD / Okta / PingFederate IdP-token theft and ADCS misuse (the LAPSUS$ pattern that hit two Dubai banks in 2024-25); exploitation chains targeting payment / settlement / FX, DIFC-regulated client-data, MT103 / MT202 SWIFT BIC traffic on the treasury-attached endpoints, and the family-office beneficial-owner-information stores. Scenarios are explicitly mapped to NESA UAE-IAS, DFSA Technology Risk and the parent group's TIBER / CBEST / iCAST control catalogue so the same engagement produces the regulator artefact, the parent-group artefact and the actionable detection-engineering backlog.

For Smart Dubai and semi-government clients we model adversary access to citizen-services platforms (Dubai Now app and the upstream DigitalDubai service mesh), the UAE PASS digital-identity integration and the OT / smart-infrastructure boundary touching traffic (RTA), utilities (DEWA), smart-building (Emaar / Damac / Majid Al Futtaim portfolios), and the Dubai Police / Smart-Police digital-services adjacency. Rules-of-engagement are pre-agreed with DESC directly, with the white-cell composition disclosed and the audit-trail-of-every-adversary-action retention period set at five years in tamper-evident storage. This is not optional in Dubai — it is the difference between an authorised exercise and a regulatory incident, and DESC's enforcement disposition has hardened materially since the 2023 review of the ISR v2 framework.

For airline and airport estates we run scenarios that respect the operational-safety constraints of an Annex 17 regulated environment. The Emirates Group estate includes passenger-services (booking, check-in, lounge access, the boarding-pass / e-ticket trust chain), cargo (Emirates SkyCargo, Cargo IS), crew systems, and the ground-handling adjacency with dnata. The Dubai Airports estate includes passenger-flow (PSCRM systems, e-gate biometrics, the EmaratechGo integration), baggage handling, ramp operations, and the airport-OT boundary including ground-radar, ramp-power-distribution and HVAC. Red-team scope inside these environments is strictly out-of-band on customer-impacting flows and pre-cleared with the airline / airport safety-and-security committee — adversary-action retention is in tamper-evident storage with the same disposition DESC expects, and CERT-In incident-reporting overlap is pre-wired where the airline group has Indian operations.

Engagements run 6-10 weeks for a DIFC BFSI scenario, 8-12 weeks for a Smart Dubai semi-government scenario including the OT / smart-infrastructure boundary, and 10-14 weeks for an airline / airport scenario with the safety-and-security committee oversight. Onsite kickoff is in DIFC, Business Bay, Internet City or the airline / airport operations HQ depending on the client. We keep a UAE-resident lead consultant onsite throughout the operation, with senior support flying in from Mumbai BKC for the major reviews — the operational-planning review, the mid-operation pulse with the white cell, and the after-action review with the client board.

Physical pretexting is rehearsed against actual Dubai building conventions, not US / European templates. Visitor passes at DIFC Gate Village run through the Gate Village Reception with tenant pre-clearance and Emirates ID scan; contractor escort policy varies across DIFC Gate Village 1-11, ICD Brookfield and Index Tower with different default service-tier expectations; out-of-hours access workflows in Business Bay towers vary by building manager (Bay Square versus U-Bora versus Bay Avenue have visibly different practices); JLT cluster reception varies across JBC clusters and HDS Tower. The pretext rehearsal explicitly covers regional norms — the working-week is Monday-Friday (Sunday is a workday only in some Dubai-government entities), the prayer-time pattern affects building-foot-traffic windows, the Eid and National Day calendar affects courier-and-vendor traffic, and the Arabic-English language defaults across reception staff vary across DIFC versus Business Bay versus Internet City.

Reports are dual-language where required (English primary, Arabic for Dubai-government and federal handover) and dual-format for the regulator + parent-group consumers. DESC ISR v2 attestation, NESA UAE-IAS Tier-3 evidence, DFSA Technology Risk supervisor-template detail and the parent group's TIBER / CBEST / iCAST artefact — same operation, same evidence, four-way artefact. The detection-engineering backlog handed to the client SOC at engagement close is the actionable output the SOC team uses to close the detection gaps the operation surfaced — typically 20-40 SIEM rule additions, 5-10 EDR detection-tuning items and a small number of architecture-level guardrails the bank's enterprise architecture team adopts in the next quarter's release.

Commercial nuance is local. Engagements are letter-of-authorisation-led — the client board issues a formal letter authorising the operation with the explicit scope, white-cell composition, rules-of-engagement and indemnity scope; we counter-sign and the letter is filed with the client's legal counsel for the operation's duration plus the five-year retention period DESC expects. Billing is in AED with the 5% UAE VAT line, invoiced from our regional billing entity. For Dubai-government-adjacent operations the engagement letter additionally references the DESC pre-notification record so any DESC-side inquiry during the operation is met with the pre-agreed white-cell escalation chain.

Engagement workflow

Five phases. Dubai timeline.

Every Macksofy red team engagement in Dubai runs through the same phased protocol — adapted to Dubai-specific procurement, regulator and delivery realities.

01
Phase 01
Letter of Authorisation + DESC Notification
  • Board-issued letter of authorisation + white-cell composition disclosure
  • DESC pre-notification record for Dubai-government-adjacent operations
  • Rules-of-engagement + indemnity scope + tamper-evident retention setup
  • Parent-group TIBER / CBEST / iCAST control-catalogue alignment confirmation
02
Phase 02
Intelligence + Threat Model
  • Open-source recon — DIFC Authority filings, DFSA register, LinkedIn drift, vendor mapping
  • Regional adversary modelling — MuddyWater / APT34 / FIN8 / LAPSUS$ / ALPHV TTPs
  • Pretext development tuned for UAE business norms + Arabic-English bilingual
  • Building-convention reconnaissance — DIFC Gate Village / ICD Brookfield / Bay Square / JBC / HDS
03
Phase 03
Initial Access + Lateral
  • Spear-phishing + vishing + physical pretext per agreed rules-of-engagement
  • Embedded-finance / partner-API / third-party-vendor compromise paths
  • Azure AD / Okta / PingFederate IdP-token theft + ADCS misuse
  • Lateral to money-movement / DIFC-customer-data / SWIFT-attached endpoints
04
Phase 04
Objective + Operational Discipline
  • Crown-jewel objective achievement under pre-agreed rules-of-engagement
  • Adversary-action audit-trail in tamper-evident storage (DESC 5-year disposition)
  • Safety-and-security committee touchpoint for airline / airport scope
  • Out-of-band discipline on customer-impacting flows (Annex 17 / DFSA-sensitive systems)
05
Phase 05
Purple Handover + Four-way Reporting
  • Purple-team replay with client SOC + SIEM tuning backlog (20-40 rules typical)
  • UAE IAS Tier-3 + DESC ISR v2 + DFSA supervisor template + TIBER artefact
  • Bilingual English / Arabic report where required (Dubai-government + federal handover)
  • Board-level after-action review with detection-engineering recommendations
Industries served

Which Dubai verticals we deliver Red Team for.

DIFC-regulated BFSI

Banks, payment institutions, broker-dealers and asset managers — money-movement / FX / SWIFT BIC scenarios.

DIFC Innovation Hub fintechs

Embedded-finance + partner-API fintechs — bank-fintech federation compromise scenarios.

Smart Dubai + semi-government

Citizen-services + UAE PASS + DigitalDubai service mesh + Dubai Police adjacency under DESC ISR v2.

Emirates Group + dnata

Passenger-services + cargo + ground-handling under Annex 17 ICAO operational-safety constraints.

Dubai Airports (DXB + DWC)

Passenger-flow + baggage + ramp-OT scenarios with the airport safety-and-security committee oversight.

MEA regional HQs

JLT / Internet City / Business Bay HQs running MEA business — TIBER / CBEST / iCAST framework alignment.

What ships

The Dubai deliverable pack.

Every Dubai red team engagement closes with the pack below — regulator-ready evidence, technical detail and board-readable summaries.

  • Board-issued letter of authorisation + DESC pre-notification record (where applicable)
  • UAE IAS (NESA) Tier-3 red-team evidence pack
  • DESC ISR v2 attestation pack in registered-auditor route format
  • DFSA Technology Risk supervisor-template detail for DIFC-regulated entities
  • Parent-group TIBER / CBEST / iCAST artefact aligned to the parent's control catalogue
  • Bilingual English / Arabic report where Dubai-government / federal handover required
  • Purple-team SIEM tuning backlog handed to client SOC (20-40 rule additions typical)
  • Adversary-action audit-trail in tamper-evident storage (DESC 5-year retention)
Recent Dubai engagement

A Dubai red team case study.

DIFC-licensed bank (Gate Village) — TIBER-style operation with parent group in London
Scope

8-week intelligence-led red-team objective — reach SWIFT-attached treasury endpoint and MT103 issuance privileges without SOC detection, with DESC pre-notification + parent-group TIBER control-catalogue alignment + DFSA Technology Risk evidence overlay

Outcome

Initial access via spear-phish against MEA-corporate-banking lead during DSF event-window; lateral via Azure AD token theft + ADCS misconfiguration; MT103 issuance privilege reached at D+12 with 14 missed alerts mapped to SIEM rule gaps; 31 detection-engineering items handed to client SOC and parent-group global SOC; DESC ISR v2 evidence pack accepted first read; TIBER artefact filed with parent-group PRA reporting cycle.

What clients say · Trusted India + UAE

Rated 4.9 ★ from 612 client reviews.

CERT-In Empanelled
Govt of India · MeitY
EC-Council ATC
Authorized Training
ISO 27001 Certified
Info Security Mgmt
We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.
AK
Aisha Khan
Information Security Manager · Listed Fintech · BKC, Mumbai
The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.
IK
Inspector K. Joshi
Cyber Cell · Maharashtra Police · Mumbai
Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.
VI
Vivek Iyer
DevSecOps Lead · Healthcare SaaS · Hyderabad
FAQ

Questions Dubai buyers ask before signing.

Yes — for any Dubai-government-adjacent operation, DESC pre-notification is a hard pre-requisite. The white-cell composition is disclosed, the rules-of-engagement are filed, and the adversary-action audit-trail is retained in tamper-evident storage for the five-year disposition DESC expects. Operating outside this discipline in Dubai is the difference between an authorised exercise and a regulatory incident, and DESC's enforcement disposition has hardened materially since the 2023 ISR v2 review.
More services in Dubai

Other Macksofy engagements in Dubai.

Red Team in other cities

Same engagement, other Macksofy metros.

Talk to us

Get a fixed-price proposal in 48 hours.

Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.

CERT-In Empanelled
Information Security Auditor · India
  • CERT-In Empanelled
  • EC-Council ATC · CompTIA Authorized
  • 20,000+ professionals trained
  • India + UAE engagements
Human verification· Cloudflare Turnstile

By submitting this form you agree to be contacted by Macksofy. We typically respond within a few business hours and never share your details. Protected by Cloudflare Turnstile and rate limiting.