Monday, November 25, 2024
HomeCyber AttackOdix - An Enterprise-Grade File-Based Cyber Attack and Malware Protection to SMBs

Odix – An Enterprise-Grade File-Based Cyber Attack and Malware Protection to SMBs

Published on

Cybersecurity solutions provider odix has set its sights on bringing enterprise-grade cybersecurity to small to medium businesses (SMBs). The company specializes in file-based attack and malware protection which can greatly benefit smaller organizations, especially in today’s security landscape. SMBs are often susceptible to cyberattacks since they lack access to enterprise-grade solutions.

Fueling odix’s effort is the €2 million grant that the company recently received from the European Commission (EC). The EC, through its Horizon 2020 initiative, funds novel ideas that can support SMBs in order to boost growth and prosperity in Europe. The funding would allow odix to offer its solutions through the cloud as Software-as-a-Service (SaaS), making them more affordable and accessible to these companies.

“We are very excited to be finally making this move to serve SMBs. Despite the emergence of more complex threats, SMBs continue to lack access to capable solutions that can protect them. The grant would enable us to continue development on our platform and make our malware disarm technology available to these smaller organizations,” odix CEO Dr. Oren Eytan remarked.

- Advertisement - SIEM as a Service

Next-Generation Solutions are Emerging

While there are now a variety of attack methods that threaten businesses, companies continue to be vulnerable to file-based attacks. Almost every office and workplace today work with digital documents enabling hackers to use office files to conceal malware. Unfortunately, employees are prone to downloading and launching files without subjecting them to the necessary security checks.

Some of these documents may seem legitimate but they can actually house malware. When such a file is opened, the malware can execute, perform its designed hack, and spread throughout the network. The payload can destroy other important data or provide hackers ways to breach networks.

Fortunately, more specialized and sophisticated solutions such as malware disarming tools have emerged to mitigate such attacks. odix is an emerging leader in this file-based attack protection segment. Malware Protection removes malicious code and exploits contained in files. When the file has been stripped away from the malware, it is then rebuilt into a safer version ready for execution. Next-generation solutions can counter threats that antiviruses and sandboxes have trouble detecting or eliminating.

“Today’s file-based attacks and malware have become quite sophisticated. Polymorphic malware, for example, constantly changes its code and characteristics. This makes it hard for antiviruses and malware Protection which rely on file signatures to detect and remove these threats. Our malware disarm technology is capable of accurately identifying malicious code within files and cleaning them,” Dr. Eytan added.

odix also features proprietary True CDR (content disarm and reconstruction) algorithm which ensures that files remain usable after the sanitization process. Through this approach, odix ensures that all files retain their type and only the malicious code is removed.

( Click to Enlarge )

SMBs are Now Prime Targets

SMBs have become popular targets of cyberattacks largely due to their weak security measures.43% of cyberattacks target SMBs. In 2017,61% of data breach victims were companies with less than 1,000 employees. Falling victim to attacks can have dire consequences. SMBs not only can suffer losses due to downtime and corrupted data but also 60% of SMBs that get hacked are unable to sustain their businesses after six months.

File-based attacks are expected to increase over the coming years. Recently, ransomware has been among the most common payloads in malicious files. Ransomware encrypts and denies access to important files or documents unless a ransom is made.

Hackers figured that SMBs are more likely to pay the ransom since these companies have more to lose should they get locked out of their files. Most ransomware can encrypt thousands of employee and customer data and even project files and work output. In 2018, the average ransom demand was more than $116,000.

odix’s core technology, which has already been used by larger enterprises, successfully protected its users from popular ransomware outbreaks. None of odix’s clients were affected by Wannacry, Gandcrab, and Petya.

Conventional Measures Are Not Enough

SMBs usually dedicate their resources to other business areas such as sales and marketing. As such, they tend to overlook their cybersecurity and prefer to use free solutions such as antiviruses and personal firewalls. Unfortunately, most free antiviruses lack the ability to detect modern and complex malware.

Antiviruses typically rely on signature detection which assumes that a previously detected malware in its database will look the same in the future. This approach is now rendered almost useless by hackers that use polymorphic code that allows malware to change its appearance.

Another conventional cybersecurity measure that attempts to address file-based attacks is sandboxing. It uses an isolated environment where one can execute files to ensure that they will not harm other devices on the network.

However, sandboxing still has limitations. Advanced malware can detect a sandbox and, when it does, the malware can temporarily stop its execution.

In addition, cybercriminals can package malware into large files or different formats that a sandbox can’t process. Sandboxes also require dedicated personnel with technical knowledge which most SMBs lack.

Malware disarming is considered to be a large improvement upon these solutions as it can capably cover areas that antiviruses and sandboxes sorely lack. As SaaS, these solutions are expected to become easier to use especially for smaller organizations with limited budgets and technical knowledge.

Conclusion

As SMBs become the primary target of cybercrimes, making file-based attack protection available to these organizations cannot be timelier. When a small business is hit by a malware attack or data breach, not only is its operations jeopardized but its employees and clients are also put in danger.

Breaches can result in more damaging crimes such as identity theft and fraud. By providing enterprise-grade security for SMBs, odix can help create a safer business ecosystem where everyone’s data is kept secure.

“We believe that security is a shared responsibility. We want to do our part by bringing our solutions to a wider base. By serving SMBs, we are able to help their customers and stakeholders as well,” Dr. Eytan concluded.

Latest articles

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting...

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ...

Nearest Neighbor Attacks: Russian APT Hack The Target By Exploiting Nearby Wi-Fi Networks

Recent research has revealed that a Russian advanced persistent threat (APT) group, tracked as...