Leading Malware Threats De-Weaponized Allowing Companies to Safely Test Network Security

Leading Malware Threats De-Weaponized Allowing Companies to Safely Test Network Security

Threat Runner, just launched by HORNE Cyber, will allow organizations of any size to safely test how their networks will respond to real malware like WannaCry, Satan and Cerber.

-

NASHVILLE, Tenn. — HORNE Cyber today announced the release of Threat Runner, a revolutionary security product that, for the first time, safely emulates an authentic malware infection on your organization’s network, exposing vulnerabilities in need of remediation without encrypting files and sensitive data. Cybersecurity engineers with Threat Runner have succeeded in reverse engineering malware from the ground up, accurately emulating threats while de-weaponizing them. This means security testing can be done against real threats, instead of hypothetical, providing a true picture of where an organization’s security stands.

“There is no better way to know your own cybersecurity threshold than witnessing how your network will react to real world threats,” said Dr. Wesley McGrew, Director of Cyber Operations at HORNE Cyber. “We believe Threat Runner is a revolutionary advancement for IT and cybersecurity professionals. It delivers easy access for organizations of any size to take an offense-oriented approach to cyber resilience and strengthen their overall security postures.”

Threat Runner initially launches with the option to test six of the most damaging malwares ever seen, including:

  • WannaCry is one of the most prolific threats active in today’s threat landscape, impacting major organizations such as the United Kingdom’s National Health Service, The Boeing Company, FedEx and Nissan. WannaCry has caused more than $8 billion in global damage costs since it aggressively emerged in 2017. In addition to WannaCry, this simulation will show the impact of other ransomware variants that utilize the “EternalBlue” exploit including Bad Rabbit, Yatron and Not-Petya.
  • Satan is a ransomware variant that is sold on the dark web allowing users to tailor their own code and ransom demands. Satan is a dark omen for a near future where deploying ransomware is user-friendly and easily accessible.
  • Cerber has attacked millions of Microsoft Office 365 users by bypassing security tools. It is constantly being updated by its developers to ensure its place as a continued threat.

Importantly, this is only a start for Threat Runner. Its developers will be continually updating the product with the latest malware and ransomware variants that are impacting businesses worldwide.

“Our goal is to help organizations of any size be proactive in preparing for the worst malware that exists, and we will achieve that by emulating the latest threats quickly and by making our product easily affordable and accessible,” said Kendall Blaylock, Director of Cyber Intelligence at HORNE Cyber.

Threat Runner starts at an inexpensive price point of $750 for four runs of a threat variant of your choice. Price packages go up with the number of variants and threat runs. Custom packages are available for larger companies who want regular access to all variants and unlimited test runs.

Threat Runner is also easy to use, as simple as downloading directly from the Threat Runner website and running the program.

Once Threat Runner has completed its work, organizations will receive an interactive report with detailed findings and recommended steps for remediation. This report includes a list of compromised nodes and a network tree to visually show how far the emulated malware spread across your network—all of which gives you a valuable understanding of exactly where your organization’s vulnerabilities lie.

For more information on Threat Runner and how you can run it, visit ThreatRunner.com.

About HORNE Cyber

HORNE Cyber provides offense-oriented cybersecurity services for clients in the areas of digital forensics and incident response, advanced penetration testing, strategic advisory, ERP services, regulatory compliance and IT assurance. HORNE Cyber is a wholly owned subsidiary of HORNE LLP, an accounting and advisory firm. Our Threat Runner product is managed out of Nashville, Tennessee, and supported by offices across the mid-Atlantic and Southeast. HORNE Cyber is committed to not only being the best cybersecurity partner for businesses and organizations of all sizes, but to aiding the world as much as it can by innovating with products like Threat Runner that will help the greater good and shore up cyber defenses for anyone who downloads the software.

For more information visit HORNECyber.com.

IoT For All
IoT For All
IoT For All is an initiative to build a valuable resource for all stakeholders in the IoT industry. Our goal is to bring together the smartest minds in IoT to share knowledge through various forms of content, all aimed at educating the people who are implementing and enabling IoT.

Trending

A streetlight and a trash can with a colorful city background

7 IoT Platform Vendors to Watch Out For

We look at the IoT platform vendor landscape, analyse which are the companies to watch out for in the enterprise smart city solutions which cover waste management, smart street lighting, energy and water metering and utility management.
Two elderly people with the landscape of a city in the backdrop

Aging in the City: How Smart Cities Are Improving Accessibility

Smart technology can help make a city more accessible for the elderly and disabled, enabling them to live independently.
The text "Wireless IoT Sensors" on a colorful background

What Are Wireless IoT Sensors and Why Are They Useful?

This article provides a high-level overview of how wireless sensors work, how networks are arranged, and how they serve real-world IoT applications.
Colorful graph overlaying pattern

The Role of Data Analytics in IoT

Advanced data analytics are no longer a fancy add-on but an integral part of any IoT solution. They can help you find the signal in the noise.
Two beers on a bright background

Continuous Measurement: Making Better Beer With IoT

Manual methods of measuring specific gravity have been around for ages. We wanted to explore ways to make continuous measurements with internet-connected devices.