Threat Analysis Stories: Defending Against a Gootloader Malware Attack

Cyber-attackers used Gootloader malware in an attempt to compromise the network of an American company. Gootloader can download additional malicious payloads, allowing threat actors to steal information or encrypt files for ransom.

Darktrace’s network security tools detected the unusual activity of the compromised device, including beaconing, SMB scanning, and downloading suspicious files. Using AI in cyber security allowed Darktrace to identify and neutralize Gootloader, protecting the company’s network.

Video

Video

Threat Analysis Stories: Defending Against a Gootloader Malware Attack

Threat Analysis Stories: Defending Against a Gootloader Malware Attack

Cyber-attackers used Gootloader malware in an attempt to compromise the network of an American company. Gootloader can download additional malicious payloads, allowing threat actors to steal information or encrypt files for ransom.

Darktrace’s network security tools detected the unusual activity of the compromised device, including beaconing, SMB scanning, and downloading suspicious files. Using AI in cyber security allowed Darktrace to identify and neutralize Gootloader, protecting the company’s network.

Download
Video
No Details required
Oops! Something went wrong while submitting the form.
8,900+ companies trust darktrace

This white paper includes

This resource includes

This case study includes

This data sheet includes

share this Resource