• Home
  • Demo
  • Contact
 
  • Home
  • Our Story
    • Overview
    • Testimonials
    • Industry Recognition
    • Leadership
    • Board of Advisors
  • Our Products
    • Threat Landscape
    • Javelin AD | Protect
    • How It Works
    • IR, Hunting, Breach Containment
    • Solution Architecture
    • Features & Benefits
  • AD Assessment
  • Blog
  • News
  • Press Releases

    Blog

  • Javelin Mar 08, 2017

    SAMAS RansomWorm: The Next-Gen Ransomware That Stole $450,000

    By Javelin | March 8, 2017

    How is Samas RansomWorm different from normal ransomware?

    Whereas traditional ransomware only encrypts the machine the attacker is controlling, RansomWorm spreads inside throughout the entire network to encrypt every server and computer—and the backups.

    Read More..

    [gs_lp_like_post] 0 responses
  • Javelin Feb 09, 2017

    Detecting Pass-The- Ticket and Pass-The- Hash Attack Using Simple WMI Commands

    By Javelin | February 9, 2017

    PTH and PTT attacks are commonly known methods that attackers use for their lateral movement in a domain environment. We’ve seen them for a long time in the industry, but the constant pursuit after the detection of those attack methods isn’t over yet.

    They’re really hard to detect because these attacks leverages legitimate Active Directory operations in order to achieve their goals, which is eventually – getting higher permissions inside the domain environment context, and being able to move laterally into more sensitive and desirable locations.

    Read More..

    [gs_lp_like_post] 0 responses

    Recent Posts

  • SAMAS RansomWorm: The Next-Gen Ransomware That Stole $450,000Javelin
  • Detecting Pass-The- Ticket and Pass-The- Hash Attack Using Simple WMI CommandsJavelin

    Tags

    Active Directory apt10 cia DFIR espionage Forensics Incident Response IR Mimikatz nsa Powershell ransomware Samas

    Categories

  • Blog
  • Press Releases
“LETS PLAN AN APT”
GET THE A3 POSTER
THE TRUTH BEHIND APT
Get the White Paper now
DOWNLOAD
AD ASSESSMENT
Exposed? At risk? Check if an attack left backdoors or hooks behind.
GET AD ASSESSMENT
Story
  • Testimonials
  • Industry Recognition
  • Leadership
  • Board of Advisors
  • Contact Us
  • Blog
Products
  • Threat Landscape
  • Javelin AD | Protect
  • How It Works
  • IR, Hunting, Breach Containment
  • Solution Architecture
  • Features & Benefits
  • Javelin
  • Privacy
  • Terms of Use