Automated Defense Against Evolving Malware Attacks

Malware Carries Attacker’s Secrets

Malware Carries
Attacker’s Secrets

We Turn It Into Actionable Intelligence.

Attacker's Achilles Heel

Cyber attackers have an Achilles Heel too. Economics of malware development forces reuse of code. The reused code provides intelligence to connect attacks and actors.

Cybersecurity Asymmetry

Cybersecurity offense-defense have an asymmetry that disadvantages defense. Current cyber defenses are generic, whereas attacks are specialized.

Cythereal Advantage

We automatically transform code shared between malware into Yara rules for hunting variants of the same, and even other, malware families.

Introducing Cythereal MAGIC™

Rewriting The Rules For Hunting Malware

Cythereal MAGIC™ Rewrites The Rules For Hunting Malware Variants.

 

Instead of laboriously chasing IoCs to catch variants, you upload a sample on MAGIC™, download Yara rules, and Hunt.

MAGIC™ generates Yara rules directly from shared malicious code, not strings. The rules are resilient against packing and polymorphism, and generate very low FP.

MAGIC™ Is Driving New Innovation

MAGIC™ Is Driving
New Innovation

Can There Be A Higher Compliment Than Researchers Using Your Product As A Foundation For Their Research?

Testimonial

“Working with Cythereal, we have developed systems that identify malware families, determine the lineage of each family, and predict the future evolution of a family. These systems require a deep understanding of the common characteristics shared by different members of the same family so that we can identify them as all belonging to a common family. Traditional features such as n-grams of code don’t provide this understanding, because they can easily be changed by a malware author. Cythereal’s Malware Genome concept solves this problem by identifying core characteristics of malware that don’t change when the code changes. The Malware Genome is robust to many kinds of code transformations, such as those performed by polymorphic malware. Our tests have shown that our methods are significantly more accurate using [Cythereal’s] malware genome than using raw code.” 

~Dr. Avi Pfeffer, Principal Scientist | Charles River Analytics

Testimonial

“Over the past three years, I have used MAGIC for the identification of Zeus and Citadel malware, the extraction of malware secrets, and the identification of inlined functions. I am amazed by its power.”

~Paul Black, Researcher, Internet Commerce Security Lab | Melbourne, Australia

Contact Cythereal

Please choose a subject to direct your request

Office

Lafayette, LA 70506

Call Us

(504) 615-4491

Email Us

info@cythereal.com