Sekyr logo

Defence in depth

Detect and respond to malicious activities in real-time with our advanced beacon technology.

Learn more
illustration of red beacon light

Beaconized binaries

Modified binaries for common utilities that send a discreet alert to a central alerting service when executed by a malicious party.

Discover Attackers in your Network

Sekyr's solution is designed to mitigate against a variety of common attacks that involve the use of binaries or utilities typically leveraged by attackers. These attacks include, but are not limited to:

Lateral movement

Attackers often use tools like netcat, grep, sed, and awk to navigate through a compromised network, collect data, and access other systems. Sekyr's beaconized binaries will alert security teams when such tools are executed, indicating possible lateral movement by an attacker.

C2 Communication

Malicious actors may use binaries like netcat to establish C2 communication channels with compromised systems. Sekyr's solution helps detect such activities by alerting security teams when these binaries are executed.

Data Exfiltration

Attackers frequently use utilities like grep, sed, and awk to search for and extract sensitive information from compromised systems. By monitoring the execution of these binaries, Sekyr's solution can help identify potential data exfiltration attempts.

Privilege Escalation

Malicious actors often employ tools like sed and awk to modify system configurations or exploit vulnerabilities, enabling them to escalate their privileges on compromised systems. Sekyr's beaconized binaries can alert security teams to such activities, indicating potential privilege escalation attempts.

Persistence

Attackers may use common utilities to establish persistence on compromised systems, ensuring that they maintain access even after a system reboot or other changes. Sekyr's solution can help detect such attempts by monitoring the execution of these utilities and sending alerts when they are executed.

By monitoring the execution of common binaries used in these attacks, Sekyr's solution provides an additional layer of security to help businesses detect and respond to threats that have bypassed traditional security measures. Keep in mind, however, that Sekyr's solution is not designed to replace existing security tools and practices, but rather to complement them and enhance a company's overall cybersecurity posture.

Meet the team

This is some text inside of a div block.
Portrait of Sondre
Sondre
CSO
portrait of Jostein
Jostein
CTO
Portrait of Anders
Anders
CEO
Portrait of Cato
Cato
COO