InnfiRAT Malware Steals Litecoin And Bitcoin Wallet Information

The RAT searches for wallet.dat files in the %AppData%Litecoin and %AppData%Bitcoin folders, with the immediately being collected, if found and …

New InnfiRAT Malware Hunts Down Litecoin And Bitcoin Wallet Info

A remote access Trojan (RAT) dubbed InnfiRAT comes with extensive capabilities to steal sensitive information, including cryptocurrency wallet data. Zscaler’s ThreatLabZ team took a closer look at its inner workings, although the malware has been in the wild for a while.

The earliest this RAT was spotted is November 2017, according to security researcher James_inthe_box, but this is the first time it was analyzed more seriously.

InnfiRAT is a .NET malware the ThreatLabZ team found, with anti-VM and process checks designed to help it detect when it’s running in a sandboxed environment, typically used for malware analysis.

After infecting the target’s computer, InnfiRAT will copy itself into %AppData%/NvidiaDriver.exe and will write a Base64-encoded PE file in memory that gets decoded to another .NET binary with the actual functionality of the malware.

FYI #Innfirat has been rolling around since 2017:https://t.co/VR5zBLQKIK

— James (@James_inthe_box) September 13, 2019

Persistence and anti-analysis measures

If the RAT discovers that it’s running in a sandbox, it will automatically terminate itself, otherwise, it would collect the compromised machine’s HWID and country.

InnfiRAT will also terminate itself if it discovers the processes of tools used for process monitoring such as Process Hacker, Process Explorer, and Process Monitor.

The processes of several web browsers will also be enumerated (i.e., Chrome, Yandex, Kometa, Amigo, Torch, Orbitum, Opera, Mozilla) and, if found, will get immediately killed on sight, potentially to unlock the user profiles for easier harvesting.

The malware will also create a scheduled task designed to execute the malicious %AppData%/NvidiaDriver.exe executable on a daily basis just in case the RAT is discovered and killed.

Checking for specific processes
Checking for specific processes

Stealing crypto and cookies

While InnfiRAT’s command and control (C2) servers can send it 11 types of commands, the most interesting are those that instruct it to search for and steal Bitcoin and Litecoin wallet data, as well as cookie information from the web browsers that got killed in the reconnaissance stage.

The RAT searches for wallet.dat files in the %AppData%Litecoin and %AppData%Bitcoin folders, with the immediately being collected, if found and delivered to the malware’s C2 server.

“InnfiRAT also grabs browser cookies to steal stored usernames and passwords, as well as session data. In addition, this RAT has ScreenShot functionality so it can grab information from open windows,” found the Zscaler ThreatLabZ team.

“InnfiRAT sends the data it has collected to its command-and-control (C&C) server and requests further instructions. The C&C can also instruct the malware to download additional payloads onto the infected system.”

Searching for Bitcoin wallet.dat
Searching for Bitcoin wallet.dat

Text documents of less than 2,097,152 bytes are also collected by the RAT if they’re stored on the victim’s desktop and get sent to the same pile of exfiltrated data stored on the C2 server.

InnfiRAT’s operators can also send it the following commands besides the ones already described above:

SendUrlAndExecute(string URL) – download a file from a specified URL and executes it

ProfileInfo() – collect and exfiltrate network, location, and hardware info

LoadLogs() – write files into specific folders

LoadProcesses() – get a list of running processes and send it to the C2 server

Kill(int process) – command to kill a specific process on the victim machine

RunCommand(string command) – execute a command on the victim machine

ClearCooks() – clears browser cookies for specific browsers

Indicators of compromise (IOCs) including malware sampled hashes and domains used to drop the RAT and as C2 servers are available at the end of ThreatLabZ team’s InnfiRAT write-up.

Last month, two new RATs were discovered by security researchers, one of them targeting several countries as part of a campaign operated by financially motivated threat actors who used a RAT payload dubbed BalkanRAT by the ESET researchers who spotted it.

The other undocumented RAT called LookBack was found by the Proofpoint Threat Insight Team researchers while being delivered via a spear-phishing campaign that targeted three U.S. entities from the utility sector.

Related Posts:

  • No Related Posts

Hacker Accused of Selling Unreleased Music of Famous Artists for Cryptocurrencies Arrested in UK

Police from London’s Intellectual Property Crime Unit (PIPCU) have arrested a 19-year-old man they believe stole unreleased songs from the websites …

Police from London’s Intellectual Property Crime Unit (PIPCU) have arrested a 19-year-old man they believe stole unreleased songs from the websites and cloud-storage accounts of “world-famous artists” and then sold the music for cryptocurrency.

The release does not state where the music was sold nor to whom.

The arrest followed a joint investigation conducted by PIPCU officers and investigators from the Manhattan DA’s office.

London and Manhattan police have been working together as part of a secondment program since 2014.

The investigation was triggered in Manhattan after the police there received, “…referrals from the recording artists’ management companies, identif(ying) one of the perpetrators.”

Search warrants were later executed at a property in North London and another in Ipswich, UK, where the 19-year-old man was arrested, “on suspicion of copyright and computer misuse act offences.”

Police say they also found evidence linked to the investigation at the North London property.

Outspoken Manhattan District Attorney Cyrus R. Vance, Jr. had this to say about the arrest:

“As one of the world’s leading creative capitals, New York City is dedicated to protecting artists’ intellectual property and ensuring that those who steal it face the music. As demonstrated by this investigation, my Office has the expertise, resources, and partnerships to help cybercrime victims reach across the globe to get justice, and we urge anyone who has been a victim of a hack to report it to us at (212) 335-9600.”

Vance Jr. added that the Manhattan D.A. and London police’s secondment partnership, in which London and Manhattan police are temporally assigned overseas, “…has yielded ten major law enforcement actions, including significant indictments related to securities fraud, art schemes, and cybercrime.”

According to the release:

“The secondment facilitates interviews of victims and witnesses, coordinates information sharing and access to overseas records, helps identify victims and targets, establishes lines of communication with other foreign law enforcement offices, and enables the execution of search warrants in the UK.”

Personnel from the Manhattan D.A.’s Cybercrime and Identity Theft Bureau, Investigation Division, International Liaison Office and Rackets Division also contributed to the case.

Related Posts:

  • No Related Posts

Software firm shops new cyber watchdog

Darktrace’s Account Executive for the Caribbean Joe Viviano said :“This technology can autonomously isolate and block the threat while business …

As cyber criminals mount increasingly coordinated attacks on the websites and networks of governments and businesses, humans are turning to machines for help.

Security managers were given a demonstration ofArtificial Intelligence doing security work, in whichunique technology, offered by British-based cyber defence firm Darktrace monitors a network constantly, detects anomalies and fixes potential concerns in some cases while security folk are asleep.

More than 70 security specialists and business executives attended a seminar on Thursday organised by United Kingdom-based Darktrace and local representative, Ark Online.

Darktrace’s Account Executive for the Caribbean Joe Viviano said :“This technology can autonomously isolate and block the threat while business continues as normal.”

He explained that the AI solution is designed to become familiar with the functioning of a customer’s network and detect anomalies when they occur.

“Darktrace automatically protects the system from intrusions, either externally or from persons accessing the network from within the operation,” he added.

Andre Griffith, founder of technology firm ARK ONLINE said: “In the fight against advanced cyber criminals AI gives control back to the defenders, transforming even the most complex and vulnerable organisation into a resilient, self-defending digital business.”

Andre Griffith said Darktrace has been deployed in 105 countries with a growing adoption in Barbados and the wider Caribbean.

The security solution is scalable to large corporations and small companies as customers pay a monthly fee based on the number of installations attached tothe network.

In recent months, cyber crime came to Barbadian shores when bank customers discovered their deposits were missing. Then a hack into the Government’s registry just over six months ago resulted in the personal information of ctizens being compromised.

Related Posts:

  • No Related Posts

Botnet Detection Market 2019 Analysis and In-Depth Research on Market Dynamics, Trends …

Market report of Global “Botnet Detection Market” 2018 study report covers all main geographical regions and sub-regions in the world and focusses …

Botnet

Market report of Global “Botnet Detection Market” 2018 study report covers all main geographical regions and sub-regions in the world and focusses on product sales, cost, market size and growth opportunities in these regions. The Botnet Detection market provides market research data status (2013-2017) and forecast (2018-2023) and also categorizes the Botnet Detection market into key industries, region, type and application.

The prime objective of this report is to help the user understand the market in terms of its definition, segmentation, market potential, influential trends, and the challenges that the market is facing. Deep researches and analysis were done during the preparation of the report. The readers will find this report very helpful in understanding the market in depth. The data and the information regarding the market are taken from reliable sources such as websites, annual reports of the companies, journals, and others and were checked and validated by the industry experts. The facts and data are represented in the report using diagrams, graphs, pie charts, and other pictorial representations. This enhances the visual representation and also helps in understanding the facts much better.

Get a Sample Copy of the Report at – https://www.absolutereports.com/enquiry/request-sample/12899566

Data and information by manufacturer, by region, by type, by application and etc., and custom research can be added according to specific requirements.

Botnet Detection Market by Top Manufacturers:

Akamai Technologies

Imperva

Distil Networks

Perimeterx

Instart Logic

Intechnica

Zenedge (Oracle)

White OPS

Shieldsquare

Kasada

Reblaze

Infisecure

Unbotify

Digital Hands

Integral AD Science

Shape Security

Unfraud

Pixalate

Appsflyer

Variti

Mfilterit

Criticalblue

Datadome

Stealth Security

White Diagnostic

By Component

Solution

Service

By Services

Professional Services

Managed Services

By Application Area

Website Security

Mobile Application Security

API Security

By Deployment Mode

Cloud

On-Premises

By Organization Size

Large Enterprise

SME

By Industry Vertical

Retail and eCommerce

Media and Entertainment

Travel and Hospitality

BFSI

IT and Telecom

Government and Defense

Healthcare and Life Sciences

Others (Education

Auction Sites

Real Estate

and Energy and Utilities)

Botnet Detection Market by Regions: –

United States

Europe

China

Japan

India

The Botnet Detection Market contains the SWOT analysis of the market. Finally, the report contains the conclusion part where the opinions of the industrial experts are included.

Points Covered in The Report:

The points that are discussed within the report are the major market players that are involved in the market such as manufacturers, raw material suppliers, equipment suppliers, end users, traders, distributors and etc.

Inquire More Or Share Questions If Any Before The Purchase On This Report — https://www.absolutereports.com/enquiry/pre-order-enquiry/12899566

The complete profile of the companies is mentioned. And the capacity, production, price, revenue, cost, gross, gross margin, sales volume, sales revenue, consumption, growth rate, import, export, supply, future strategies, and the technological developments that they are making are also included within the report. The historical data from 2011 to 2017 and forecast data from 2018 to 2023.

The growth factors of the market are discussed in detail wherein the different end users of the market are explained in detail.

Key Reasons to Purchase

To gain insightful analyses of the market and have comprehensive understanding of the global market and its commercial landscape.

Assess the production processes, major issues, and solutions to mitigate the development risk.

To understand the most affecting driving and restraining forces in the market and its impact in the global market.

Learn about the market strategies that are being adopted by leading respective organizations.

To understand the future outlook and prospects for the market.

Besides the standard structure reports, we also provide custom research according to specific requirements.

Detailed Table of Content 2018-2023 Global and Regional Botnet Detection Production, Sales and Consumption Status and Prospects Professional Market Research Report

Chapter 1 Industry Overview of Botnet Detection Market

Chapter 2 Production Market Analysis of Botnet Detection Market

Chapter 3 Sales Market Analysis of Botnet Detection Market

Chapter 4 Consumption Market Analysis of Botnet Detection Market

Chapter 5 Production, Sales and Consumption Market Comparison Analysis

Chapter 6 Major Manufacturers Production and Sales Market Comparison Analysis

Chapter 7 Major Type Analysis

Chapter 8 Major Application Analysis

Chapter 9 Industry Chain Analysis

Chapter 10 Global and Regional Market Forecast of Botnet Detection Market

Chapter 11 New Project Investment Feasibility Analysis

Chapter 12 Conclusions

Chapter 13 Appendix

And Many More….

Purchase This Report (Price 3500 USD for single user license) – https://www.absolutereports.com/purchase/12899566

About Absolute Reports:

Absolute Reports is an upscale platform to help key personnel in the business world in strategizing and taking visionary decisions based on facts and figures derived from in depth market research. We are one of the top report resellers in the market, dedicated towards bringing you an ingenious concoction of data parameters.

Contact Us:

Name: Ajay More

Phone: US +1424 253 0807/ UK +44 203 239 8187

Mail id: [email protected]

For Other Report :

Low Power Wide Area Network (LPWAN) Market Mergers & Acquisitions, Expansion, Concentration Rate Outlook (2019-2024)

Cypress Oil Market boosting the growth Worldwide: Market dynamics and trends, efficiencies Forecast 2025

Bike Racks Market 2019 Revenue, Key Players, Supply-Demand, Investment Feasibility and Forecast 2024

Office Furniture Market 2019 Competition, Status and Forecast, Market Size by Players, Regions, Type, Application by 2024

Plastic Fencing Industry 2019 Global Market Growth, Trends, Revenue, Share and Demands Research Report

Related Posts:

  • No Related Posts

The Week that Was.

Newly hatched unicorn Shape Security is said to be thinking of an IPO. The Silicon Valley-based company, which specializes in anti-fraud solutions, …

CRASHOVERRIDE intended to cause long-term damage.

Analysts at Dragos have reassessed the 2016 cyberattack against Ukraine’s power grid and have concluded that the blackout was intended to be far more damaging and longer-lasting than what was actually achieved. The attack appears to have had a final stage that failed for reasons unknown to Dragos. After the blackout was triggered, the attackers tried to launch denial-of-service attacks against the Siemens SIPROTEC protective relays in use by the plant. This initially seemed pointless, since the attack had seemingly already taken place. Dragos suspects, however, that the attackers wanted the plant’s operators to reactivate the systems while lacking visibility and without realizing that the protective relays were disabled. This could have greatly intensified the attack, causing physical damage to equipment and harming employees.

Dragos’ director of threat intelligence Sergio Caltagirone told WIRED that “they’ve pre-engineered attacks that harm the facility in a destructive and potentially life-threatening way when you respond to the incident. It’s the response that ultimately harms you.”

Is your cybersecurity program aligned with your business goals and objectives?

Cybersecurity is a business risk, not an IT problem, and a critical part of business strategy. Security should not be an afterthought. Taking a proactive approach facilitates board-level cyber initiative buy in, supports traction across business units, establishes management alignment for key priorities, and manages data complexity. Let Edwards Performance Solutions better structure and position your cybersecurity program – making it a business asset for continued success. Learn more

North Korean hackers use obscure file formats to evade detection.

Prevailion researchers describe “Autumn Aperture,” a North Korean campaign that’s deploying rarely used file formats like Kodak FlashPix (FPX) to avoid being flagged by antivirus systems. The attackers are using malicious Word files with subject matter that’s relevant to their targets, and they attempt to hide the resulting malicious functionalities by embedding them in FPX files. VirusTotal shows that these are much less likely to be detected than the standard VBA files. 

Prevailion believes the Kimsuky threat actors are behind the campaign, and the researchers conclude that “given the broad scope of entities targeted by Autumn Aperture, there is an increased likelihood that a third party within an organization’s ecosystem is at risk of exposure.”

Cybersecurity Fabric: The Future of Advanced Threat Response

Cyber Attacks continue to increase in size and speed, requiring greater flexibility to defend and respond to emerging security threats. Organizations need inline detection and mitigation to be successful against threats to the evolving network. The solution is one that weaves security throughout your network into a seamless fabric providing coordinated detection and response. Join LookingGlass for our upcoming webinar October 2, 2pm EST to learn how a Cybersecurity Fabric will strengthen your security strategy, simplify your stack, and advance your defenses.

Israeli intelligence may have placed StingRays in DC.

POLITICO reported that three “three former senior officials with knowledge of the matter” said the US government concluded that Israel was responsible for the placement of a number of StingRay devices in Washington DC. One of the officials said the devices were probably intended to spy on President Trump. Israel has denied the allegations, and President Trump said, “I don’t think the Israelis were spying on us….Anything is possible but I don’t believe it.”

Every business can benefit from a cookbook approach to developing a cloud strategy.

By focusing efforts on a living document, CIO’s can connect business strategy to cloud migration planning and implementation. Visit www.coalfire.com and download the latest Gartner Cloud Strategy Cookbook, 2019  The Cloud Strategy Cookbook provides actionable advice on structuring a cloud strategy document, while offering guidance on determining which applications go where.

BlueKeep RCE exploit now available to the public.

Rapid7’s open-source Metasploit framework now has an easy-to-use module for exploiting BlueKeep to achieve remote code execution on Windows systems, ZDNet reports. The module can’t be used for worm attacks, since it requires manual interaction for each system it’s deployed against, but it’s still quite effective against individual systems. ZDNet notes that there are still 700,000 vulnerable systems exposed to the Internet, and probably many more on internal networks.

Setting the Trap with Kevin Mitnick: Crafty Ways the Bad Guys Use Pretexting to Own Your Network

Today’s phishing attacks have evolved beyond spray-and-pray emails that mass target victims. Instead, the bad guys have carefully researched your organization to set the perfect trap. And pretexting is the key.

Join us for this exclusive webinar where Kevin Mitnick, the World’s Most Famous Hacker and KnowBe4’s Chief Hacking Officer, will show you how the bad guys craft such cunning attacks. And he’ll share some hacking demos that will blow your mind.

Save your spot!

Thrip cyberespionage group isn’t new after all.

Symantec told CyberScoop that it believes the Chinese threat actor the company tracks as “Thrip” could actually be a manifestation of another group, “Billbug” or “Lotus Blossom,” which has been active for about a decade. Symantec previously believed Thrip was a new operation discovered last year, but an analysis of one of its backdoors uncovered multiple striking similarities to a tool used by the older threat actor. Symantec’s technical director Vikram Thakur told CyberScoop that “these guys are not absolutely brand new like we had pointed out last year. They seem to be using an evolution of a tool that has almost been used for ten years at this point.”

Cobalt Dickens is back, and pretending to be your university library.

Researchers at Secureworks report a resurgence of activity by the Iranian threat group called “Cobalt Dickens.” The threat actor has been associated with the Mabna Group and others the US Department of Justice indicted in 2018 in connection with cyberespionage Justice said was conducted on behalf of Iran’s Islamic Revolutionary Guard Corps. Secureworks says the latest activity consists of a phishing campaign directed against American and British universities.

Stealth Falcon spyware campaign update.

ESET says it’s associated a hitherto overlooked backdoor with Stealth Falcon. Stealth Falcon itself has been connected by the University of Toronto’s Citizen Lab with the distribution of spyware against a range of Middle Eastern targets. It’s regarded as being, probably, a United Arab Emirates’ operation, linked to Project Raven, earlier described by Reuters.

Big business email compromise.

Toyota Boshoku, a Toyota parts unit, continues to investigate a business email compromise scam in a European subsidiary that may have cost the company ¥4 billion (approximately $37 million). According to Infosecurity Magazine, the incident occurred on August 14th, and if it followed the usual business email compromise template, the theft depended on social engineering. Toyota Boshuku says can’t reveal more because of ongoing police investigations. It does say it’s working to recover the funds its subsidiary lost, and it asks for patience and understanding until investigations are complete.

Patch news.

Microsoft fixed seventy-nine security flaws on Patch Tuesday, seventeen of which were rated critical. KrebsOnSecurity notes that two of these vulnerabilities affected all supported versions of Windows and were being exploited in the wild.

Adobe patched two critical vulnerabilities in Flash Player that could have led to arbitrary code execution.

Crime and punishment.

The US Department of Justice announced on Tuesday that an international law enforcement effort called “Operation reWired” had resulted in the arrests of 281 people allegedly involved in business email compromise schemes. The operation involved law enforcement agencies in Nigeria, Ghana, Turkey, France, Italy, Japan, Kenya, Malaysia, and the United Kingdom, along with the United States’ Department of Homeland Security, Department of the Treasury, Postal Inspection Service, and Department of State. 167 of the arrested individuals were in Nigeria and 74 were in the United States. The FBI also released updated statistics on BEC attacks, showing that there has been “a 100 percent increase in identified global exposed losses” between May 2018 and July 2019.

The Washington Post reported that Fedir Hladyr, a Ukrainian national US prosecutors said was affiliated with the FIN7 cybercriminal gang, took a quilty plea Thursday to two counts of hacking and wire fraud. Mr. Hladyr, who was arrested in Germany last year, was FIN7’s admin. The group is believed responsible for carding and other forms of cybercrime that may have netted them a billion dollars, give or take a baker’s dozen. In exchange for his plea, the Government agreed to drop twenty-four other charges, conviction on which would have earned the defendant hundreds of years in prison. As it stands he faces up to twenty-five years. Observers speculate that the Government made the deal in exchange for information Mr. Hladyr may provide on the rest of the gang.

Two Coalfire employees were arrested while conducting a physical penetration test at a courthouse in Iowa, according to the Des Moines Register. The two men had been hired by the state court administration to try to gain unauthorized access to court records, but the administration says it “did not intend, or anticipate, those efforts to include the forced entry into a building.” The pentesters have been charged with third-degree burglary and possession of burglary tools, and as of this writing they’re being held on a $50,000 bond.

Courts and torts.

Google will pay €965 million ($1.1 billion) to France to settle a four-year-long probe into whether the company avoided paying taxes in the country, Reuters reports.

Cloudflare voluntarily disclosed in a regulatory filing with the US Securities and Exchange Commission that its services may have been used by persons or organizations currently under US sanctions, the Wall Street Journal reported. The parties the company dealt with (presumably without fully understanding who they were) included some designated as terrorists or narcotraffickers.

Policies, procurements, and agency equities.

US President Trump yesterday extended the “National Emergency With Respect To Foreign Interference In or Undermining Public Confidence In U.S. Elections” for one year. The extension maintains the provisions of Executive Order 13848, issued on September 12, 2018, in force. 

France’s finance minister said at an OECD conference that Facebook’s Libra cryptocurrency should be blocked in Europe, and he suggested that the EU should develop its own public digital currency, Cointelegraph reports. Libra’s head of policy and communications told the Independent that “we welcome this scrutiny and have deliberately designed a long launch runway to have these conversations, educate stakeholders and incorporate their feedback in our design.”

US Federal agencies are working out roles and responsibilities in cyberspace during the course of wargames. Breaking Defense describes the exercises as bringing together organizations from the Departments of Defense and Homeland Security. The US Defense Department has also offered Congress a look at some of its current thinking on cyber deterrence. Deterrence is commonly thought of as involving the credible threat of retaliation, but the Department calls its approach to deterrence “multifaceted,” with denial playing a significant part. An adversary can be deterred if they became convinced that their attacks would be futile.

Charles Kupperman, Fox News reports, will serve as interim National Security Advisor to the US President. Kupperman had been serving as deputy to the now-departed John Bolton. A search for a permanent replacement is in progress.

NIST is seeking public comment on the Final Public Draft of NIST Special Publication (SP) 800-160 Volume 2, “Developing Cyber Resilient Systems: A Systems Security Engineering Approach.” The comment period closes on November 1st. The Institute has also released a preliminary draft of the new NIST privacy framework. Comments on this draft are due by October 24th.

Fortunes of commerce.

Symantec, as it goes through Broadcom’s acquisition of its enterprise security business, and as other investors show an interest in its Norton and LifeLock units (the Wall Street Journal says suitors may be offering more than $16 billion), has begun a round of layoffs. The San Francisco Chronicle reports that the company has begun layoffs in California, cutting one-hundred-fifty-two jobs at its corporate headquarters in Mountain View, eighteen in San Francisco, and thirty-six in Culver City.

The Wikimedia Foundation received a $2.5 million donation from Craigslist founder Craig Newmark. The money is intended to help the organization boost its cybersecurity in the wake of a DDoS attack that hit Wikipedia last weekend, Infosecurity Magazine reports.

Mergers and acquisitions.

Akamai is acquiring Exceda, its largest Latin American channel partner. In statements published by BNamericas, Akamai says that it sees the acquisition as a step toward meeting increased regional demand for its content delivery and cloud security services.

Investments and exits.

Cloudflare priced its IPO this week at a share price of $15, which should give the company a market capitalization of about $4.4 billion, PitchBook reports. The lead underwriters are Goldman Sachs, JP Morgan, and Morgan Stanley.

As expected, Colorado-based Ping Identity has filled for its IPO. The company will offer $12.5 million shares of common stock, which it expects to fetch between $14 and $16 a share.

Newly hatched unicorn Shape Security is said to be thinking of an IPO. The Silicon Valley-based company, which specializes in anti-fraud solutions, has raised $51 million in an investment round led by C5 Capital, VentureBeat says. Seven other firms also participated: Kleiner Perkins, HPE Growth, Norwest Ventures Partners, Focus Ventures, JetBlue Technology Ventures, Top Tier Capital Partners, and Epic Ventures. When will there be an IPO? That’s not known, but Shape’s Chief Marketing Officer told VentureBeat that “preparation for an IPO is part of our plan.”

HackerOne has raised $36.4 million in a Series D funding round. VentureBeat reports that the round was led by led by Valor Equity Partners, with participation from Benchmark, New Enterprise Associates, Dragoneer Investment Group, and EQT Ventures.

Threat intelligence startup Cyware Labs has raised $3 million in a seed funding round led by Emerald Development Partners. The company intends to use the funding for the usual growth purposes: product development and increased marketing.

Snyk, whose specialty is detecting and fixing vulnerabilities in open-source code, has raised $70 million. TechCrunch says the funding round was led by Accel, GV, and Boldstart Ventures.

Virginia-based Shift5, which specializes in software and hardware security for weapons and aerospace systems, has raised a $2.5 million seed round. Squadra Ventures led the round, with participation by Lamphere Capital, Outland, Nue Capital, and Emerging Ventures.

Lacework, the Silicon Valley-based cloud-security shop, has closed a $42 million investment round with Sutter Hill Ventures and Liberty Global Ventures. Lacework intends to use the funding to maintain its momentum in DevOps and workload security.

And security innovation.

New Zealand has decided to offer assistance to other Pacific nations as they develop their cybersecurity capabilities. The Government has decided, ZDNet reports, to earmark NZ$10 million over the next five years in aid.

SINET has announced this year’s SINET 16. This annual selection of the most innovative, potentially disruptive companies in the cybersecurity industry picks sixteen winners from an international pool of applicants. This year’s selection was made from among one-hundred-sixty-one companies based in eighteen countries. In reverse alphabetical order, the SINET 16 class of 2010 includes:

  • XM Cyber, which specializes in fully automatic breach and attack simulation that enables customers to recognize attack vectors and prioritize their remediation.

  • Tigera, whose zero-trust network security supports continuous compliance for Kubernetes platforms across a range of environments.

  • Tempered Networks, which provides simple and affordable means of segmenting and isolating control systems and industrial Internet-of-things devices.

  • Sonrai Security, with a Cloud Data Control (CDC) service that delivers a risk model for identity and data relationships across a range of cloud and third-party data stores.

  • Siemplify. an  independent security orchestration, automation and response provider whose workbench enables enterprises and managed security service providers. to manage and respond to cyber threats.

  • OPAQ delivers security-as-a-service from its cloud that enables enterprises to overcome staffing and management challenges in the protection of their IT infrastructure.

  • Kenna Security, whose platform delivers cyber risk predictions that enable security teams to get ahead of exploitation.

  • Karamba Security’s embedded cybersecurity solutions protect connected systems with automated runtime integrity software that does particularly well against remote code execution.

  • CyberSponse, which offers an automated incident response orchestration platform that automates security tools to make human experts more effective.

  • CryptoMove, whose continuous moving target defense and distributed fragmentation offers a new approach to data protection for managing keys and DevSecOps secrets.

  • BigID, a machine-learning shop that enables personal data discovery, correlation, and privacy automation for compliance at scale with regulations like GDPR and CCPA.

  • Balbix, whose specialized artificial intelligence delivers continuous and predictive assessment of breach risk.

  • Awake Security, which offers advanced network traffic analysis for a privacy-aware solution that can detect and visualize incidents in full forensic context.

  • Arkose Labs, which solves fraud by pairing global telemetry with an enforcement challenge to control fraud without false positives or degraded throughput.

  • Aqua Security, which secures container-based and cloud-native applications from development to production.

  • And, finally, Acceptto, which delivers continuous identity access protection by inferring contextual data to analyze and verify user identity and behavior.

The sixteen winners will be featured at the SINET Showcase in Washington, DC, November 6th and 7th at the National Press Club.

Related Posts:

  • No Related Posts