How TRAPMINE Threat Prevention Works?

Phases of the Intrusion Kill-Chain

According to the figures, %55 of spear-phishing campaigns targeting employees and %61,2 of exploits that drop malware onto a targeted computer.

  • Exploit contained in a DOCX sent by 'attacker'.

  • Employee opens the DOCX file that is attached in the Email.

  • Malicious code has been run to exploit vulnerability in MS Office.

  • Exploit bypasses AVs and downloads malware.

  • Malware runs in memory and got infected!

All these apps are potential exploitation
and attack path for hackers.

These applications are potential target of attackers. Cyber criminals find security holes in widely-deployed applications and exploit them for targetting end users.

  • Exploits specific to target environment.

  • Exploit and macros could be used maliciously to drop malware

  • APT is a targeted multi-step attack that uses zero-day or one-day exploits to achieve its objectives.

  • APT attacks armed with Zero-Day and One-Day exploits.

Mitigating Exploitation of Multiple Techniques
with Multiple Layers.

We simply block attack techniques instead of identifying exploits. TRAPMINE doesn’t try to identify and detect exploit, our solution focuses on attack vectors and block exploitation of the application vulnerabilities.

  • TRAPMINE EBM doesn’t rely on sandboxing, signature, heuristic etc.

  • TRAPMINE EBM doesn't care about type of vulnerability whether zero-day or not!

  • TRAPMINE doesn't need any prior knowledge of the vulnerability.

  • If TRAPMINE failed to prevent first exploitation technique, TRAPMINE EBM loads the other mitigation modules.

Exploit Mitigations
  • DLL Protection
  • Data Execution Prevention (DEP)
  • Packed DLL Protection
  • DLL Hijack Protection
  • Exception Heap Spray Check
  • Heap Corruption Mitigation
  • Memory Limit Heap Spray Check
  • Periodic Heap Spray Check
  • ROP Mitigation
  • Shellcode Preallocation
  • ShellLink Protection
  • Null Dereference Protection
  • Hot Patch Protection
  • Random Preallocation
  • SEH Protection
  • SysExit
  • Thread Injection
  • CPL Protection
  • Font Protection
  • GS Cookie
  • JIT Mitigation
  • Library Preallocation
  • Suspend Guard
  • Network DLL Protection
  • Code Execution in Stack
  • Check Caller Address

Whitepapers and Datasheets
Learn More

Success Stories
Success stories from our customers.
Learn More

Contact Sales
Contact the our sales team.
Learn More

Copyright © 2017. All Rights Reserved