Post
Topic
Board Tokens (Altcoins)
Re: 🔥🔥🔥 [ANN][ICO] BITFENCE - REMOVE HACKERS FROM YOUR NETWORK
by
BitFence
on 09/04/2018, 00:08:54 UTC
Q: If Threat actor is using Encrypted Signatures/Malware and counter attack your system, what protection mechanisms have you adopted?

If malicious actor tries to deploy malware on it's victim (our honeypot), we will quarantine it and submit to our threat intel engine. We know the "clean state" of honeypot and if attacker goes in somehow undetected, but changes honeypot state, we know that we got something valuable inside. We will have a fantastic malware/virus data bank very soon. We can further analyze it / match with other available databases of malware and quickly identify and prevent this infestation to a "real" system