Cybersecurity is in the headlines as never before, commanding greater executive attention. As the need for cybersecurity solutions has grown, record numbers of new technologies have emerged to fill the demand. But despite growing cyber spending, budgets for most organizations are finite—and so are the human resources to support and maintain the vast range of security tools they already own. It’s therefore essential to carefully scrutinize vendor offerings before signing on the dotted line.
On February 29, 2017 illusive networks received a customer alert and initiated forensic analysis after malicious activity was detected on a certain endpoint in the network. Our Deception Management System identified the malicious activity as Spora, a variant of ransomware, which like Locky, silently encrypts files with selected extensions and then attempts to redeploy itself on additional hosts via elevated privileges. However, with Deceptions Everywhere deployed illusive networks diverted the ransomware from encrypting files on the original host - redirecting the encryption process to deceptive files - and more importantly thwarted the encryption of files located on the company's network shares.