Deep Instinct is revolutionizing cybersecurity with its unique Deep learning Software – harnessing the power of deep learning architecture and yielding unprecedented prediction models, designed to face next generation cyber threats.
Demo Area

Taidoor RAT

A report by The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has revealed that the Chinese government is leveraging TAIDOOR malware to launch remote access trojan attacks. Taidoor is installed on a target’s system as a service dynamic link library (DLL) and is comprised of two files. The first file is a loader, which is started as a service. The loader decrypts the second file, and executes it in memory, which is the main Remote Access Trojan (RAT). Watch this video to see how Deep Instinct successfully detects the attack and prevents it from launching.

Taidoor RAT

A report by The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has revealed that the Chinese government is leveraging TAIDOOR malware to launch remote access trojan attacks. Taidoor is installed on a target’s system as a service dynamic link library (DLL) and is comprised of two files. The first file is a loader, which is started as a service. The loader decrypts the second file, and executes it in memory, which is the main Remote Access Trojan (RAT). Watch this video to see how Deep Instinct successfully detects the attack and prevents it from launching.

WastedLocker Ransomware

A nasty variant of ransomware that has successfully stolen millions of USD through their ransom demands. Associated with Evil Corp which is widely recognized and represents one of the biggest malware operations. It targets Windows Shell copies and back-ups, making it very difficult to recover from. Watch how Deep Instinct can protect your organization from the devastating effects of WastedLocker Ransomware.

Maze Ransomware Infection

Along with Snake, DopplePaymer, Ako, and others, Maze is another in the lucrative group of ransomware families that target corporations. Watch this video as we demonstrate how Deep Instinct successfully prevents Maze ransomware. The ransomware is prevented pre-execution, using Deep Instinct’s deep learning-based static prevention engine, and during on-execution, using advanced ransomware behavioral protection.

Snake Ransomware Infection

Ransomware attacks have become more sophisticated, crews operating them have learned how to take better advantage of their presence in the victim’s network and new ransomware strains were brought into the world to run havoc and make their creators rich. One such ransomware is Snake (aka Ekans) which over the past few months has been deployed in a series of targeted and devastating attacks. This demo video shows how Deep Instinct successfully prevents all versions of Snake ransomware. The ransomware is prevented pre-execution, using Deep Instinct’s deep learning-based static prevention engine, and during on-execution, using advanced ransomware behavioral protection.

Ryuk and Sodin Ransomware

The first quarter of 2020 recorded an increase in the average amount ransomware operators demand from their victims. Compared to the previous quarter, a 33% swell was noted, driven by the Sodinokibi and Ryuk ransomware operators. In this demo video, we demonstrate how Deep instinct successfully blocks Sodinokibi and Ryuk preemptively by our deep learning algorithm in static analysis and in run time with our behavioral analysis engine.

Ragnar Locker Ransomware

Steve Salinas, Head of Product Marketing at Deep Instinct explains how the Deep Instinct agent successfully detects and prevents Ragnar Locker Ransomware. The ransomware which is known for being highly elusive is first prevented by our static analysis engine and then also by using our dynamic behavioral analysis engine. Both of which are part of our multi-layer deep learning security solution.

Cryptbot Attack

Cryptbot combines complex evasion techniques and a rather simple social-engineering based distribution strategy to produce an interesting method of attack that manages to stay relatively hidden in the current malware landscape. Watch this demo video to see how the Deep Instinct agent detected the malware pre-execution and prevented it on the spot.

Fileless Powershell Attack

Deep Instinct prevents a ransomware based on a fileless attack. Deep Instinct predicts, detects and prevents any malicious file or fileless before it is accessed or executed on the endpoint. The solution supports any kind of file-less attack vector, starting from script-based attacks, dual-use tools and code injection techniques.

 

APT Office Macro Attack

Deep Instinct prevents an info-stealer attack. In this example, an email sent to an HR employee that includes an attachment of a word doc containing a malicious macro which is actually a data theft attack, that can steal several files from the HR employee computer. Deep Instinct predicts, detects and prevents any malicious file or fileless before it is accessed or executed on the endpoint. The solution supports many file types due to the agnostic implementation of deep learning, including PE, OLE, PDF, Macros, Fonts, Images, Flash and many more.

First Seen Ransomware Attack

Deep Instinct prevents an unknown ransomware attack. In this demonstration, we will showcase how Deep Instinct is able to prevent an attack of an unknown ransomware before any damage happens (pre-execution).

Mobile Ransomware Attack

Deep Instinct prevents a mobile attack. Deep Instinct predicts, detects and prevents zero-day malicious apps from running on the mobile device, with and without a network connection.

Protection Against Banking Trojans

In this video, we will demonstrate how Deep Instinct’s multi-layered pre, on and post execution cyber security solution protects against a file-less macro based attack that seeks to inject banking Trojan malware. This malware will attempt to steal all the passwords saved in the end-user’s browser related to banking websites.

Protection Against a Ransomware Attack

In this video, we will demonstrate how Deep Instinct’s multi-layered pre, on and post execution cyber security solution protects against a ransomware attack.

Protection Against a Dual Use Attack

In this video, we will demonstrate how Deep Instinct’s multi-layered pre, on and post execution cyber security solution protects against a fileless ransomware attack generated by a script and dual-use tool.

Chrome OS Protection From Malicious Apps

See how Deep Instinct’s security solution comes into action once a malicious app has been downloaded on to Chrome OS, alerting the user that not all is well and prompting them to uninstall.

Isolating a Device from a Network
In this video we will demonstrate the ability to isolate a device from a network in the case of malicious activity. Isolating the network gives the security administrator the opportunity to investigate threats and ascertain that no additional harm can be done on an infected device.