“Operation Cleaver” is an attack campaign Cylance details in a new report. They contend an Iran-based attack group has compromised hundreds of targets in multiple countries and industries. Regardless of the claims of attribution, the message is clear: well-financed, strategically focused attack groups continue to digitally plunder their targets. As a community, our decades-old approach to network and information security simply isn’t working. Attackers trivially thwart million-dollar defensive platforms by simply re-configuring their technology.
Red Canary does things differently. Our clients already have full awareness when the current generation of tools in the “Operation Cleaver” toolbox execute, without relying solely on outdated methods like file and network signatures. Instead, our technology behaviorally profiles endpoint observations and flags suspicious events based on their core characteristics. These characteristics include how the process was initiated, its underlying capabilities, and more. Flagged events are enriched with traditional intelligence signatures before our team of human threat analysts vets each and every one. Events that are validated as true threats result in a timely detection notification with all indicators of compromise the client needs to fully remediate the threat and scope their environment for additional sources of concern.
Since Red Canary uses endpoint behavioral detection enriched with intelligence and and traditional indicators, our clients continue to receive best-of-breed detection even when the “Operation Cleaver” attack group inevitably changes their infrastructure, malware, and other traditionally observable signatures.
Plus, we’re also looking for hundreds of other behaviors combined with thousands of intelligence indicators that will help flag the next attack group or operation long before a report is published. There is no chance of attack groups becoming less sophisticated as time goes on – why should your information security posture rely on the same means of detection?
Subscribe to our blog
See what it's like to have a partner in the fight.
Experience the difference between a sense of security and actual security.
All 2021 Threat Detection Report content is fully available through this website. If you prefer to download a PDF, just fill out this form and let us know what email to send it to.
Thanks for your interest!
Check your inbox, the 2021 Threat Detection Report is headed your way.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.