Blog
/
/
September 21, 2020

The Rise of Stealthy Malware in Public Organizations

Gain insights into how malware attempts to infiltrate public organizations to steal data and the defenses needed to combat these threats.
Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Max Heinemeyer
Global Field CISO
Default blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog imageDefault blog image
21
Sep 2020

Cyber AI was recently deployed at a government organization in the EMEA region, where it was protecting over 10,000 devices by learning a sense of ‘self’ for each unique device in order to detect anomalous behavior. Just a week into the Darktrace trial, the AI detected a device which had been infected with malware beaconing to C2 endpoints via HTTP and SSL before downloading a suspicious file.

The attackers were using a strain of Glupteba malware in an attempt to steal sensitive information from browsers such as passwords and credit card information, as well as email account credentials. Given that this was a government agency, the consequences had the attackers been able to gain access to an employees’ account credentials could have been severe.

Darktrace’s Autonomous Response technology, Antigena, would have taken action to contain the threatening behavior, enforcing the device’s ‘pattern of life’ for five minutes and escalating its response as the severity of the threat escalated.

The attack occurred over the course of an hour on a Sunday, meaning the security team’s response time was likely slower than it would have been during a weekday.

Figure 1: A timeline of events

Details of the attack

Darktrace detected a device initiating encrypted connections to an external domain never seen before across the organization. The device had likely been infected before Darktrace was deployed, most likely through a malicious email attachment or link.

Newer strains of Glupteba also use malvertising which directs the user to a rare endpoint and forces an anomalous file download.

Darktrace’s AI detected the device downloading an executable file, atx777.exe, which appears to be associated with the stealer Taurus, accredited to the cyber-criminal group ‘Predator the Thief’.

Following this file download, the device initiated further encrypted connections to suspicious endpoints over unusual communication channels. At the same time, the device downloaded another executable file from a domain with an unusual user agent, ‘CertUtil URL Agent’.

A stealthy stealer

Malicious actors are using more sophisticated techniques to avoid traditional security tools. The Glupteba malware framework, which has seen a resurgence over the past few months, utilizes several evasion techniques, including sandbox detection.

Shortly after the payload is dropped, the malware examines the environment where it has been installed and will not execute any further processes if it detects the host machine is a sandbox. The malware is able to further conceal itself by excluding Glupteba files from Windows Defender, altering Firewall rules to allow command and control traffic, and by ‘Living off the Land,’ using tools preinstalled on the device such as CertUtil.

Despite these attempts at evasion, Darktrace’s Cyber AI easily detected the suspicious activity, which fell outside the ‘pattern of life’ for the device and the wider organization. Darktrace identified the activity as suspicious at the first stages of the attack, and the Cyber AI Analyst investigated the incident in full, revealing some crucial metrics, including the endpoints contacted.

Figure 2: AI Analyst’s detection and summary of the command and control traffic

Antigena responds

In this case, the malware had been installed on the device before Darktrace started monitoring the environment, however had Antigena been active it would have taken a precise response at every stage of the attack. At the beginning of the attack, Antigena would have blocked connections to the suspicious domain, zvwxstarserver17km[.]xyz for two hours, preventing any additional malicious downloads.

As the activity escalated, Antigena would have enforced a ‘pattern of life’ on the infected device and stopped any malicious command and control communications by blocking all outgoing traffic for one hour.

Concluding thoughts

As the race between cyber-criminals and security analysts continues, malware authors are employing increasingly sophisticated techniques to avoid detection. Although the Taurus stealer utilizes a number of these evasion techniques, Darktrace’s AI technology was able to not only alert and act on the malicious activity without disrupting business continuity, but did so despite the malware already being present on a device before the customer began leveraging Darktrace for cyber defense.

Had Antigena been deployed in active mode during this incident, it would have stopped the malware in its tracks at the initial stages, preventing any sensitive data from being removed from the government network. Critically, Antigena updated and escalated its actions in light of the evolving activity, and yet was still precise enough to ensure normal business operations were allowed to continue.

Despite Antigena being in passive mode, this case study demonstrates the power of Autonomous Response in intelligently acting to stop cyber-threats when human security resources are limited, or when the team is out of office. As both public and private organizations continue to be targeted with ransomware and other fast and stealthy threats, the need for Autonomous Response is greater than ever.

Thanks to Darktrace analyst Tom Priest for his insights on the above threat find.

Learn more about Darktrace Antigena

Darktrace model detections

  • Device / New Failed External Connections
  • Device / New User Agent and New IP
  • Antigena / Network::External Threat::Antigena Suspicious File Block
  • Anomalous File / EXE from Rare External Location
  • Antigena / Network::Significant Anomaly::Antigena Controlled and Model Breach
  • Antigena / Network::External Threat::Antigena File then New Outbound Block
  • Anomalous Connection / Application Protocol on Uncommon Port
  • Device / Long Agent Connection to New Endpoint
  • Antigena / Network::Significant Anomaly::Antigena Breaches Over Time Block
  • Anomalous Connection / Lots of New Connections
  • Device / Large Number of Model Breaches
  • Antigena / Network::Significant Anomaly::Antigena Significant Anomaly from Client Block
  • Device / Initial Breach Chain Compromise
  • Antigena / Network::External Threat::Antigena Suspicious Activity Block
  • Compliance / CertUtil External Connection

Inside the SOC
Darktrace cyber analysts are world-class experts in threat intelligence, threat hunting and incident response, and provide 24/7 SOC support to thousands of Darktrace customers around the globe. Inside the SOC is exclusively authored by these experts, providing analysis of cyber incidents and threat trends, based on real-world experience in the field.
Written by
Max Heinemeyer
Global Field CISO

More in this series

No items found.

Blog

/

Network

/

June 2, 2025

Darktrace Recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Network Detection and Response

Man using darktrace security software on computerDefault blog imageDefault blog image

Darktrace has been recognized as a Leader in the first ever Magic Quadrant™ for Network Detection and Response (NDR).

A Gartner Magic Quadrant is a culmination of research in a specific market, giving you a wide-angle view of the relative positions of the market’s competitors. CIOs and CISOs can use this research to make informed decisions about NDR, which is evolving to offer broader threat detection. We encourage our customers to read the full report to get the complete picture.

Darktrace has also received accolades in other recent NDR leadership evaluations including IDC named as market share leader, and  KuppingerCole’s heralding us as an Overall Leader, Product Leader, Market Leader and Innovation Leader. We believe we have continued to be identified as a Leader due to the strength of our capabilities in NDR, driven by our unique application of AI in cybersecurity, continuous product innovation, and our ability to execute on a global scale to meet the evolving needs of our customers.

We’re proud of Darktrace’s unrivaled market, and ability to execute effectively in the network security market, reflecting our commitment to delivering high-quality, reliable solutions that meet the evolving needs of our customers.

Why is Darktrace the market share leader and undisputed force in NDR?

Transforming network security and shifting to an AI-led SOC

Darktrace’s Self-Learning AITM understands normal for your entire network, intelligently detecting anomalies and containing sophisticated threats without historical attack data. This approach, based on advanced, unsupervised machine learning, enables Darktrace to catch novel, unknown and insider threats that traditional tools miss and other NDR vendors can’t detect. Darktrace has identified and contained attempted exploits of zero-day vulnerabilities up to 11 days before public disclosure.

We change SOC dynamics with our Cyber AI AnalystTM, which eliminates manual triage and investigation by contextualizing all relevant alerts across your environment, including third-party alerts, and performing end-to-end investigations at machine speed. Cyber AI Analyst gives your team the equivalent of 30 extra full time Level 2 analysts without the hiring overhead2, so you can shift your team away from manual, reactive workflows and uplift them to focus on more proactive tasks.

When combined, Darktrace Self-Learning AI and Cyber AI Analyst go far beyond the capabilities of traditional NDR approaches to completely transform your network security and help your teams operate at the speed and scale of AI.

Coverage across the extended IT enterprise and all-important OT devices

We believe the report validates the business-centric approach that Darktrace uses to deploy AI locally and train it solely on each unique environment, giving our customers tailored security outcomes without compromising on privacy.

This contrasts with other NDR vendors that require cloud connectivity to either deliver full functionality or to regularly update their globally trained models with the latest attack data. This capability is particularly sought after by organizations who are no longer just on-premise, have operational technology (OT) networks, or those that operate in classified environments.

Darktrace serves these organizations and industries by extending IT and unifying OT security within a single solution, reducing alert fatigue and accelerating alert investigation in industrial environments.

With Darktrace / NETWORK you can achieve:

  • Full visibility across your modern network, including on-premises, virtual networks, hybrid cloud, identities, remote workers and OT devices
  • Precision threat detection across your modern network to identify known, unknown and insider threats in real-time without relying on rules, signatures or threat intelligence,
  • 10x accelerated incident response times with agentic AI that uplifts your team and enables them to focus on more proactive tasks
  • Containment of threats with the first autonomous response solution proven to work in the enterprise, stopping attacks from progressing at the earliest stages with precise actions that avoid business disruption

Going beyond traditional NDR to build proactive network resilience

Darktrace does not just stop at threat detection, it helps you prevent threats from occurring and increase your resiliency for when attacks do happen. We help discover and prioritize up to 50% more risks across your environment and optimize incident response processes, reducing the impact of active cyber-attacks using an understanding of your data.

Attack path modeling: By leveraging attack path modeling and AI-driven risk validation, customers can close gaps before they’re exploited, focusing resources where they’ll have the greatest impact.

AI-driven playbooks and breach simulations: With AI-driven playbooks and realistic breach simulations, Darktrace helps your team practice response, strengthen processes, and reduce the impact of real-world incidents. You’re not just reacting; you’re proactively building long-term resilience.

Continued innovation in network security

Darktrace leads innovation in the NDR market with more than 200+ patents and active filings, covering a range of detection, response and AI techniques. Our AI Research Center is foundational to our ongoing innovation, including hundreds of R&D employees examining how AI can be applied to real-world problems and augment human teams.

Trusted by thousands of customers globally

Our commitment to innovation and patented Self-Learning AITM has protected organizations in all industries from known and novel attacks since 2013, bolstering network security and augmenting human teams for our 10,000 active customers across 110 countries. These organizations place a great deal of trust in Darktrace’s unique approach to cybersecurity and application of AI to detect and respond to threats across their modern network.

A new standard for NDR

Darktrace / NETWORK is not just another NDR tool; we are the most advanced network security platform in the industry that pushes beyond traditional capabilities to protect thousands of organizations against known and novel threats.

From real-time threat detection and autonomous response to proactive risk management, we’re transforming network security from reactive to resilient.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved.

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

References

1, 3 Gartner, Magic Quadrant for Network Detection and Response, by Thomas Lintemuth, Esraa ElTahawy, John Collins, Charanpal Bhogal, 29 May, 2025

2 Darktrace Cyber AI Analyst fleet data, 2023

Continue reading
About the author
Mikey Anderson
Product Marketing Manager, Network Detection & Response

Blog

/

Email

/

May 29, 2025

Why attack-centric approaches to email security can’t cope with modern threats

Default blog imageDefault blog image

What’s the problem with an attack-centric mindset?

For decades, traditional email security strategies have been built around an attack-centric mindset. Secure Email Gateways (SEGs) and other legacy solutions operate on the principle of identifying and blocking known threats. These systems rely heavily on predefined threat intelligence – blacklists, malware signatures, and reputation-based analysis – to filter out malicious content before it reaches the inbox.

While this approach was sufficient when email threats were relatively static and signature-based, it’s increasingly ineffective against the sophistication of modern attacks. Techniques like spear phishing, business email compromise (BEC), and supply chain attacks often bypass traditional SEG defenses because they lack obvious malicious indicators. Instead, they leverage social engineering, look-alike domains, and finely tuned spoofing tactics that are designed to evade detection.

The challenge extends beyond just legacy SEGs. Many modern email security providers have inherited the same attack-centric principles, even if they've reimagined the technology stack. While some vendors have shifted to API-based deployments and incorporated AI to automate pattern recognition, the underlying approach remains the same: hunting for threats based on known indicators. This methodology, though it’s undergone modernization using AI, still leaves gaps when it comes to novel, hyper-targeted threats that manipulate user behavior rather than deploy predictable malicious signatures. Attack-centric security will always remain one step behind the attacker.

By the way, native email security already covers the basics

One of the most overlooked realities in email security is that native solutions like Microsoft 365’s built-in security already handle much of the foundational work of attack-centric protection. Through advanced threat intelligence, anti-phishing measures, and malware detection, Microsoft 365 actively scans incoming emails for known threats, using global telemetry to identify patterns and block suspicious content before it even reaches the user’s inbox.

This means that for many organizations, a baseline level of protection against more obvious, signature-based attacks is already in place – but many are still disabling these protections in favour of another attack-centric solution. By layering another attack-centric solution on top, they are effectively duplicating efforts without enhancing their security posture. This overlap can lead to unnecessary complexity, higher costs, and a false sense of enhanced protection when in reality, it’s more of the same.

Rather than duplicating attack-centric protections, the real opportunity lies in addressing the gaps that remain: the threats that are specifically crafted to evade traditional detection methods. This is where a business-centric approach becomes indispensable, complementing the foundational security that’s already built into your infrastructure.

Introducing… the business-centric approach

To effectively defend against advanced threats, organizations need to adopt a business-centric approach to email security. Unlike attack-centric models that hunt for known threats, business-centric security focuses on understanding the typical behaviors, relationships, and communication patterns within your organization. Rather than solely reacting to threats as they are identified, this model continuously learns what “normal” looks like for each user and each inbox.

By establishing a baseline of expected behaviors, business-centric solutions can rapidly detect anomalies that suggest compromise, such as sudden changes in sending patterns, unusual login locations, or subtle shifts in communication tone. This proactive detection method is especially powerful against spear phishing, business email compromise (BEC), and supply chain attacks that are engineered to bypass static defenses. This approach also scales with your organization, learning and adapting as new users are onboarded, communication patterns evolve, and external partners are added.

In an era where AI-driven threats are becoming the norm, having email security that knows your users and inboxes better than the attacker does is a critical advantage.

Why native + business-centric email security is the winning formula

By pairing native security with a business-centric model, organizations can cover the full spectrum of threats – from signature-based malware to sophisticated, socially engineered attacks. Microsoft 365’s in-built security manages the foundational risks, while business-centric defense identifies subtle anomalies and targeted threats that legacy approaches miss.

Layering Darktrace on top of your native Microsoft security eliminates duplicate capabilities, costs and workflows without reducing functionality

Rather than layering redundant attack-centric solutions on top of existing protections, the future of email security lies in leveraging what’s already in place and building on it with smarter, behavior-based detection. The Swiss Cheese Model is a useful one to refer to here: by acknowledging that no single defense can offer complete protection, layering defenses that plug each other’s gaps – like slices of Swiss cheese – becomes critical.

This combination also allows security teams to focus their efforts more effectively. With native solutions catching broad-based, known threats, the business-centric layer can prioritize real anomalies, minimizing false positives and accelerating response times. Organizations benefit from reduced overlap, streamlined costs, and a stronger overall security posture.

Download the full guide to take the first step towards achieving your next-generation security stack.

Continue reading
About the author
Carlos Gray
Senior Product Marketing Manager, Email
Your data. Our AI.
Elevate your network security with Darktrace AI