Leading Malware Threats De-Weaponized Allowing Companies to Safely Test Network Security

Leading Malware Threats De-Weaponized Allowing Companies to Safely Test Network Security

Threat Runner, just launched by HORNE Cyber, will allow organizations of any size to safely test how their networks will respond to real malware like WannaCry, Satan and Cerber.

-

NASHVILLE, Tenn. — HORNE Cyber today announced the release of Threat Runner, a revolutionary security product that, for the first time, safely emulates an authentic malware infection on your organization’s network, exposing vulnerabilities in need of remediation without encrypting files and sensitive data. Cybersecurity engineers with Threat Runner have succeeded in reverse engineering malware from the ground up, accurately emulating threats while de-weaponizing them. This means security testing can be done against real threats, instead of hypothetical, providing a true picture of where an organization’s security stands.

“There is no better way to know your own cybersecurity threshold than witnessing how your network will react to real world threats,” said Dr. Wesley McGrew, Director of Cyber Operations at HORNE Cyber. “We believe Threat Runner is a revolutionary advancement for IT and cybersecurity professionals. It delivers easy access for organizations of any size to take an offense-oriented approach to cyber resilience and strengthen their overall security postures.”

Threat Runner initially launches with the option to test six of the most damaging malwares ever seen, including:

  • WannaCry is one of the most prolific threats active in today’s threat landscape, impacting major organizations such as the United Kingdom’s National Health Service, The Boeing Company, FedEx and Nissan. WannaCry has caused more than $8 billion in global damage costs since it aggressively emerged in 2017. In addition to WannaCry, this simulation will show the impact of other ransomware variants that utilize the “EternalBlue” exploit including Bad Rabbit, Yatron and Not-Petya.
  • Satan is a ransomware variant that is sold on the dark web allowing users to tailor their own code and ransom demands. Satan is a dark omen for a near future where deploying ransomware is user-friendly and easily accessible.
  • Cerber has attacked millions of Microsoft Office 365 users by bypassing security tools. It is constantly being updated by its developers to ensure its place as a continued threat.

Importantly, this is only a start for Threat Runner. Its developers will be continually updating the product with the latest malware and ransomware variants that are impacting businesses worldwide.

“Our goal is to help organizations of any size be proactive in preparing for the worst malware that exists, and we will achieve that by emulating the latest threats quickly and by making our product easily affordable and accessible,” said Kendall Blaylock, Director of Cyber Intelligence at HORNE Cyber.

Threat Runner starts at an inexpensive price point of $750 for four runs of a threat variant of your choice. Price packages go up with the number of variants and threat runs. Custom packages are available for larger companies who want regular access to all variants and unlimited test runs.

Threat Runner is also easy to use, as simple as downloading directly from the Threat Runner website and running the program.

Once Threat Runner has completed its work, organizations will receive an interactive report with detailed findings and recommended steps for remediation. This report includes a list of compromised nodes and a network tree to visually show how far the emulated malware spread across your network—all of which gives you a valuable understanding of exactly where your organization’s vulnerabilities lie.

For more information on Threat Runner and how you can run it, visit ThreatRunner.com.

About HORNE Cyber

HORNE Cyber provides offense-oriented cybersecurity services for clients in the areas of digital forensics and incident response, advanced penetration testing, strategic advisory, ERP services, regulatory compliance and IT assurance. HORNE Cyber is a wholly owned subsidiary of HORNE LLP, an accounting and advisory firm. Our Threat Runner product is managed out of Nashville, Tennessee, and supported by offices across the mid-Atlantic and Southeast. HORNE Cyber is committed to not only being the best cybersecurity partner for businesses and organizations of all sizes, but to aiding the world as much as it can by innovating with products like Threat Runner that will help the greater good and shore up cyber defenses for anyone who downloads the software.

For more information visit HORNECyber.com.

IoT For All
IoT For All
IoT For All is an initiative to build a valuable resource for all stakeholders in the IoT industry. Our goal is to bring together the smartest minds in IoT to share knowledge through various forms of content, all aimed at educating the people who are implementing and enabling IoT.

Trending

IoT Security: Inherent Risks Require Robust Solutions

IoT systems have greater attack surfaces than ever - these security insights are key to building solutions that we can trust.

Towards Proof-Of-Value: A Tale of IIoT Maturity

As IIoT matures it overcomes challenges such as lengthy cost and implementation periods, and looks beyond proof-of-concept towards proof of value.

When Pizzas Fly: How Drones Could Shake Up the Home Delivery Market

Drones are changing everything about how home delivery works today - or are they? There's lots of hype about how new technology is remaking how businesses work, how cities function, and what we expect out of a modern society. But how do these innovations actually affect day-to-day life? Tricia Booker writes about how drones reshape human to human interactions.

How Mixed Reality Brings the Virtual Hospital to You

Microsoft HoloLens is redefining the future of healthcare by empowering medical professionals to attend patients virtually and enhance the doctor-patient relationship. Check out the remarkable features of mixed reality technology that offers better patient care seamlessly.
Photo of a woman holding a smartphone

What Is Cellular IoT?

You might be unable to answer the question, "what is cellular IoT?" But I'm sure you're familiar with the underlying technology. Cellular networks connect your iPhone to Google Maps,...