THREAT ALERT: DarkGate Loader
The execution of DarkGate Loader ultimately leads to execution of post-exploitation tools such as Cobalt Strike and Meterpreter. This Threat Alert provides an overview of an attack involving DarkGate Loader.

Lital Asher-Dotan
An endpoint detection and response (EDR) platform significantly improves your security team’s ability to find the most subtle and dangerous threats lurking in your network. However, not all EDR platforms are created equal. When evaluating EDR platforms, you should consider capabilities including the level of visibility, investigation and response effectiveness, ease of deployment, impact on the environment, and the strength of the servers.
An EDR platform must collect crucial information across the IT environment to deliver deep visibility of what is occurring at any given point in time. The platform needs to include the capability to:
An EDR platform should allow Security Operations Center (SOC) teams to efficiently hunt for threats and quickly respond to attacks. The platform needs to include the capability to:
An ideal EDR platform needs to be easy to roll out and gain acceptance by your peers in the IT organization. The solution should reduce your management burden. The solution should:
An ideal EDR platform should have minimal or zero impact on your endpoint users, and deployment methodologies. The endpoint sensor needs to minimize the risk of causing user outages, and minimize integration testing requirements prior to rollout. The solution needs to use an endpoint sensor that:
An ideal EDR platform should do more than analyze data on the endpoint. The solution needs to analyze data centrally to identify patterns and anomalous behavior across endpoints. The platform needs to include servers that:
Does the solution automatically detect fileless malware and lateral movement?
Does the solution perform statistical and behavioral analysis?
Does the solution correlate activities across multiple endpoints?
Does the agent run continuously on the endpoint?
Does the solution monitor memory as well as file-based activity?
Does the solution proactively monitor and alert on security incidents?
Does the solution prioritize incidents and provide visibility into suspicious activity?
Does the solution allow you to kill processes, quarantine files and delete registry keys on affected endpoints?
Does the agent deploy quickly without impacting end users?
Does the solution come preconfigured to detect and hunt for threats?
Does the solution come with the option to deploy in the cloud or on-premises?
Does the solution offer the option of a managed service?
Does the endpoint agent run in user space?
Does the solution use less than 5% of CPU resources and 50MB of memory?
Does the solution transmit less than 10MB in network traffic?
Does the solution store critical information centrally?
Does the solution perform centralized threat analytics and behavioral analytics?
Lital is a Marketing Team Leader, Storyteller, Technology Marketing Expert. She joined Cybereason as the first marketing hire and built a full marketing department. Specializing in brand building, product marketing, communication and content. Passionate about building ROI-driven marketing teams.
The execution of DarkGate Loader ultimately leads to execution of post-exploitation tools such as Cobalt Strike and Meterpreter. This Threat Alert provides an overview of an attack involving DarkGate Loader.
A Microsoft Office code execution vulnerability dubbed “Follina” allows delivery of malware without needing the victim to allow macro execution and is very likely to be mass-exploited. The Cybereason Defense Platform detects and prevents the exploitation of Follina and enables effective hunting of this vulnerability...
The execution of DarkGate Loader ultimately leads to execution of post-exploitation tools such as Cobalt Strike and Meterpreter. This Threat Alert provides an overview of an attack involving DarkGate Loader.
A Microsoft Office code execution vulnerability dubbed “Follina” allows delivery of malware without needing the victim to allow macro execution and is very likely to be mass-exploited. The Cybereason Defense Platform detects and prevents the exploitation of Follina and enables effective hunting of this vulnerability...
Get the latest research, expert insights, and security industry news.
Subscribe