Leading Malware Threats De-Weaponized Allowing Companies to Safely Test Network Security

Leading Malware Threats De-Weaponized Allowing Companies to Safely Test Network Security

Threat Runner, just launched by HORNE Cyber, will allow organizations of any size to safely test how their networks will respond to real malware like WannaCry, Satan and Cerber.

-

NASHVILLE, Tenn. — HORNE Cyber today announced the release of Threat Runner, a revolutionary security product that, for the first time, safely emulates an authentic malware infection on your organization’s network, exposing vulnerabilities in need of remediation without encrypting files and sensitive data. Cybersecurity engineers with Threat Runner have succeeded in reverse engineering malware from the ground up, accurately emulating threats while de-weaponizing them. This means security testing can be done against real threats, instead of hypothetical, providing a true picture of where an organization’s security stands.

“There is no better way to know your own cybersecurity threshold than witnessing how your network will react to real world threats,” said Dr. Wesley McGrew, Director of Cyber Operations at HORNE Cyber. “We believe Threat Runner is a revolutionary advancement for IT and cybersecurity professionals. It delivers easy access for organizations of any size to take an offense-oriented approach to cyber resilience and strengthen their overall security postures.”

Threat Runner initially launches with the option to test six of the most damaging malwares ever seen, including:

  • WannaCry is one of the most prolific threats active in today’s threat landscape, impacting major organizations such as the United Kingdom’s National Health Service, The Boeing Company, FedEx and Nissan. WannaCry has caused more than $8 billion in global damage costs since it aggressively emerged in 2017. In addition to WannaCry, this simulation will show the impact of other ransomware variants that utilize the “EternalBlue” exploit including Bad Rabbit, Yatron and Not-Petya.
  • Satan is a ransomware variant that is sold on the dark web allowing users to tailor their own code and ransom demands. Satan is a dark omen for a near future where deploying ransomware is user-friendly and easily accessible.
  • Cerber has attacked millions of Microsoft Office 365 users by bypassing security tools. It is constantly being updated by its developers to ensure its place as a continued threat.

Importantly, this is only a start for Threat Runner. Its developers will be continually updating the product with the latest malware and ransomware variants that are impacting businesses worldwide.

“Our goal is to help organizations of any size be proactive in preparing for the worst malware that exists, and we will achieve that by emulating the latest threats quickly and by making our product easily affordable and accessible,” said Kendall Blaylock, Director of Cyber Intelligence at HORNE Cyber.

Threat Runner starts at an inexpensive price point of $750 for four runs of a threat variant of your choice. Price packages go up with the number of variants and threat runs. Custom packages are available for larger companies who want regular access to all variants and unlimited test runs.

Threat Runner is also easy to use, as simple as downloading directly from the Threat Runner website and running the program.

Once Threat Runner has completed its work, organizations will receive an interactive report with detailed findings and recommended steps for remediation. This report includes a list of compromised nodes and a network tree to visually show how far the emulated malware spread across your network—all of which gives you a valuable understanding of exactly where your organization’s vulnerabilities lie.

For more information on Threat Runner and how you can run it, visit ThreatRunner.com.

About HORNE Cyber

HORNE Cyber provides offense-oriented cybersecurity services for clients in the areas of digital forensics and incident response, advanced penetration testing, strategic advisory, ERP services, regulatory compliance and IT assurance. HORNE Cyber is a wholly owned subsidiary of HORNE LLP, an accounting and advisory firm. Our Threat Runner product is managed out of Nashville, Tennessee, and supported by offices across the mid-Atlantic and Southeast. HORNE Cyber is committed to not only being the best cybersecurity partner for businesses and organizations of all sizes, but to aiding the world as much as it can by innovating with products like Threat Runner that will help the greater good and shore up cyber defenses for anyone who downloads the software.

For more information visit HORNECyber.com.

IoT For All
IoT For All
IoT For All is an initiative to build a valuable resource for all stakeholders in the IoT industry. Our goal is to bring together the smartest minds in IoT to share knowledge through various forms of content, all aimed at educating the people who are implementing and enabling IoT.

Trending

AI Can Solve Our Driving Dependence — If We Don’t Mess It Up

Today, one only has to step out onto a New York street or fly over LA’s tangled highways to see the problems: auto-clogged roads, low-lying vehicle-fume smog, and barely-moving lines of single drivers sitting in multi-passenger cars. Some (mistakenly) cast luxurious self-driving cars as a means to turn the frustrations of a daily commute into a valuable period of relaxation or productivity. In this piece, I explain why that strategy won’t just be ineffective and worsen our commutes, but will also ultimately compel consumers to embrace the very transport philosophy that made us traffic-beleaguered in the first place. I also make a case for why using self-driving cars as public transport can be used as a means to eradicate driving dependence in the long term.

Why Robotic Process Automation Is the Way Forward for the Smart Data Center

This article looks at the role of RPA in the data center of the future, the so-called 'smart data center.' We explore why data centers need to smarten up, what types of RPA are available, how RPA can be integrated into the data center and the benefits of doing so.

AI in IoT Security: Friend or Foe?

Unfortunately, some of the difficulties facing AI in cybersecurity can be exploited by hackers. AI can be used for IoT security, or it can be used against it.
A hand holding a smart phone on a background of cameras

Video: The Heart of an IoT Strategy

When relevant data is properly incorporated into a holistic system, it can reinforce a host of other business efficiencies and security protocols before and after an incident.
the text "IoT" on a colorful background

Street Light Solutions to Save Cities on Utility Costs

Smart technology provides remote lighting control that can more accurately adjust, modify and monitor the amount of time the lights are turned on and to what extent.