As we think about how viruses infect a device and spread laterally within an organization, we can see a number of traits. Firstly, the point of a cyber warfare attack is to steal information, be it financial, personal or intellectual property. If the attacker cannot communicate with command and control (C2) servers or transmit any data, then there is little value in the attack.
BlackFog’s technology focuses specifically on data exfiltration to neutralize the attack. By preventing malware from communicating and isolating the code, it is possible to stop the loss of information and the lateral spread to other devices within the network.
There are many points within the lifecycle of a typical cyberattack where you can target data exfiltration. The illustration provides an example of how BlackFog targets malware using layer 3 packet monitoring.