2019 Case Studies: Awake Continues to Discover the Undiscoverable
The threat landscape is ever evolving, and 2019 was no exception. With the bad (headline-grabbing data breaches, critical cybersecurity threats, and diverse nation state attacks) also comes the good, empowering the defenders with the ability to see what is often considered “impossible” to detect today.
Awake uniquely applies AI to automate the detection of sophisticated threats that otherwise require manual and time-consuming efforts from experienced threat hunters, such as uncovering low and slow command and control (C2). Research indicates these types of incidents were up 265% in the first half of 2019 alone when compared to the same period in 2018. This type of non-malware activity is so hard to detect because it weaponizes the tools that people and businesses rely upon for every-day activities—think Microsoft Office, Python or PowerShell. Traditional security solutions that look for known malware simply aren’t good enough in this new environment.
But the Awake Security Platform isn’t a traditional security solution. Legacy approaches can’t keep pace with the modern threat of today’s attackers who use such techniques, abuse insider credentials, or use sites like Twitter and Google Drive for command and control. Moreover, with the proliferation of cloud, IoT, BYOD, and third-party devices, the ability to “manage” security on the endpoint is diminished. Awake Security is the only advanced network traffic analysis company that delivers answers, not alerts to help security teams tackle these trends, which is why the company has earned noteworthy praise across the industry from analysts and influencers alike.
With Awake’s advanced network traffic analysis, security teams can see everything that’s happening on the network to find and stop attacks that are hiding in plain sight (or just plain hiding.) Check out the following “most-interesting” case studies to learn how we thwarted the adversary in 2019:
- IoT devices exfiltrating data
- Malicious browser extensions intercepting and manipulating browser-based traffic
- A Russian-made remote desktop software installed on critical infrastructure
- Serverless C2 on the cloud disguised as an Office add-in
- Unauthorized VPN used to hide data exfiltration
- A ransomware attempt at a manufacturing company
These are just a handful of the seemingly impossible to detect threats we identified and stopped in 2019. As the potential attack surface continues to expand, Awake will be on-hand to help organizations around the globe get and stay ahead of complex threats.
Let our security experts show you how we solve that challenge and answer any questions you might have – schedule a demo today.
Dig Deeper with These Resources
Awake Security 2 Minute Explainer Video
What if security could think? What if it could sense danger, calculate risk, and react quickly based…
The Internet’s New Arms Dealers: Malicious Domain Registrars
This report dives into the results of a multi-month investigation that uncovered a massive global surveillance campaign…