Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?


Malware & Threats

Seculert Launches Free Cloud-based APT Detection Service

Seculert, a malware detection company in Israel, has released a free version of its cloud-based flagship product, which promises to protect organizations from advanced threats on their network.

Seculert, a malware detection company in Israel, has released a free version of its cloud-based flagship product, which promises to protect organizations from advanced threats on their network.

The free APT detection service comes with unlimited IPs, administrators and domains, as well as detection of up to 25 attacks for various types of users and devices, including internal and remote employees, partners and customers. Web-based, the dashboard promises to be easy to understand, while offering an expansive overview of the platforms network analysis. Paid users gain access to a RESTful Web API, full attack details, and complete criminal server lists.

The service itself is designed to enhance an organization’s existing security infrastructure, by offering additional malware detection, which loops augmented data back to other on-premise security products.

“If you take a look at some of the recent attacks that have made headlines, like Mahdi or Shamoon, the common thread is not the advanced nature of the attack, but rather the attack’s persistence,” said Dudi Matot, co-founder and CEO of Seculert.

“For this reason, we have decided to make a free version of our product available with no time constraint. Users will have unlimited time to access the service and be alerted when unknown malware is discovered.”

Earlier this month, Seculert discovered a malware family that they named “Magic”, as it connects to a remote Command and Control (C&C) server using a custom-made protocol called “Some_magic_code1” to verify that the compromised system is legit.

In one case, Seculert CTO, Aviv Raff, wrote on the company blog, the malware asks the C&C what to do.

“The C2 server responds with a command to add a new backdoor user — Username: WINDOWS, Password: MyPass1234 — which enables the attacker to remotely access the infected machine or network.” Raff adds that the malware itself remained undetected on targeted systems for 11 months, but unfortunately the malware’s overall objective isn’t clear.

Advertisement. Scroll to continue reading.

The free protection from Seculert is available now. More information is available here

Written By

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.


People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...


An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.