Threat Analysis Stories: Defending Against a Gootloader Malware Attack

Cyber-attackers used Gootloader malware in an attempt to compromise the network of an American company. Gootloader can download additional malicious payloads, allowing threat actors to steal information or encrypt files for ransom.

Darktrace’s network security tools detected the unusual activity of the compromised device, including beaconing, SMB scanning, and downloading suspicious files. Using AI in cyber security allowed Darktrace to identify and neutralize Gootloader, protecting the company’s network.

Video

Video

Threat Analysis Stories: Defending Against a Gootloader Malware Attack

Threat Analysis Stories: Defending Against a Gootloader Malware Attack

Cyber-attackers used Gootloader malware in an attempt to compromise the network of an American company. Gootloader can download additional malicious payloads, allowing threat actors to steal information or encrypt files for ransom.

Darktrace’s network security tools detected the unusual activity of the compromised device, including beaconing, SMB scanning, and downloading suspicious files. Using AI in cyber security allowed Darktrace to identify and neutralize Gootloader, protecting the company’s network.

No Details required
Oops! Something went wrong while submitting the form.

This white paper includes

This resource includes

This case study includes

This data sheet includes

9000+
Companies trust Darktrace
Share this resource