Information Security Buzz Features: Cybereason Findings on Privilege Escalation Detection
Written By
Lital Asher-Dotan
Cybereason Lab recently found that common forensics tool fail to correctly capture privilege escalation by attackers. This finding was featured in Information Security Buzz. This is an important findings as escalation of privileges is an early step taken by an attacker early after penetrating the network in 8 out of 10 hacking operations. It allows the attacker to gain control over the user's machine and enables his lateral movement in the network. Read the full report here:
Cybereason was developed to detect hackers activities in the network post-breach. It detects privileges escalation as well as other malicious activities that other systems fail to detect. Watch our demo to see how Cybereason detects an attacker escalating privileges in real time:
Share
About the Author
Lital Asher-Dotan
Lital is a Marketing Team Leader, Storyteller, Technology Marketing Expert. She joined Cybereason as the first marketing hire and built a full marketing department. Specializing in brand building, product marketing, communication and content. Passionate about building ROI-driven marketing teams.
PlugX is a post-exploitation modular RAT (Remote Access Trojan), which is known for its multiple functionalities such as data exfiltration, keystroke grabbing, backdoor functionality, and utilizing DLL-Sideloading techniques for evading security solutions...
First observed in June 2022 in the wild, HavanaCrypt Ransomware masquerades as a legitimate Google Chrome update with sophisticated anti-analysis techniques and other functionality that may be used for data exfiltration and privilege escalation...
PlugX is a post-exploitation modular RAT (Remote Access Trojan), which is known for its multiple functionalities such as data exfiltration, keystroke grabbing, backdoor functionality, and utilizing DLL-Sideloading techniques for evading security solutions...
First observed in June 2022 in the wild, HavanaCrypt Ransomware masquerades as a legitimate Google Chrome update with sophisticated anti-analysis techniques and other functionality that may be used for data exfiltration and privilege escalation...
Want to see the Cybereason Defense Platform in action?Schedule a Demo