Threat Analysis Stories: Defending Against a Gootloader Malware Attack

Cyber-attackers used Gootloader malware in an attempt to compromise the network of an American company. Gootloader can download additional malicious payloads, allowing threat actors to steal information or encrypt files for ransom.

Darktrace’s network security tools detected the unusual activity of the compromised device, including beaconing, SMB scanning, and downloading suspicious files. Using AI in cyber security allowed Darktrace to identify and neutralize Gootloader, protecting the company’s network.

Video

Video

Threat Analysis Stories: Defending Against a Gootloader Malware Attack

Threat Analysis Stories: Defending Against a Gootloader Malware Attack

Cyber-attackers used Gootloader malware in an attempt to compromise the network of an American company. Gootloader can download additional malicious payloads, allowing threat actors to steal information or encrypt files for ransom.

Darktrace’s network security tools detected the unusual activity of the compromised device, including beaconing, SMB scanning, and downloading suspicious files. Using AI in cyber security allowed Darktrace to identify and neutralize Gootloader, protecting the company’s network.

Herunterladen
Video
Keine Anmeldung erforderlich
Huch! Beim Absenden des Formulars ist etwas schief gelaufen.
8,900+ companies trust darktrace

This white paper includes

This resource includes

This case study includes

This data sheet includes

diese ressource weitergeben