Rahul Sharma (Editor)

Cymmetria

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit
Type
  
Private company

Products
  
MazeRunner

Headquarters
  
Palo Alto

Founded
  
2014

Industry
  
Computer security

Website
  
Cymmetria.com

Motto
  
Who Dares Wins

Cymmetria httpsd1qb2nb5cznatucloudfrontnetstartupsi5

Founder
  
Gadi Evron, Dean Sysman, Imri Goldberg, Irene Abezgauz

Key people
  
Gadi Evron(CEO) Dean Sysman(CTO) Imri Goldberg(VP R&D) Irene Abezgauz(VP Product)

Cymmetria, Inc. is a private American cyber security company that provides deception based cyber security solutions against advanced cyber threats, such as advanced persistent threats. The company uses proprietary deception technology to detect and disable hackers and cyber threats.

Contents

Timeline

Cymmetria was founded in 2014. Major core investors include Sherpa Capital Felicis Ventures, Lumia Capital, Seedcamp and Y Combinator. In 2015 the company took part in the Y Combinator Accelerator program. Cymmetria was responsible for the discovery of the 2016 advanced persistent threat, 'Patchwork', which infected 2,500 high-value targets worldwide. Cymmetria released a community version of their platform, MazeRunner, in July 2016.

Technology

Cymmetria's product, MazeRunner, gives organizations a platform for creating deception stories. The organization creates realistic environments for hunting cyber attackers, and Cymmetria puts decoy virtual machines on its networks which house real software and real information. They also leave "digital breadcrumbs" in other places like passwords and documents that might lead the hacker to the MazeRunner platform. If an attacker accesses a decoy or breadcrumb, the client can immediately see them and their toolset.

Patchwork APT

In July 2016, Cymmetria researchers discovered and revealed the cyber attack dubbed 'Patchwork,' which compromised an estimated 2500 corporate and government agencies using code stolen from GitHub and the Dark Web. Examples of weapons used are an exploit for the Sandworm vulnerability (CVE-2014-4114), a compiled AutoIt script, and UAC bypass code dubbed UACME. Targets are believed to be mainly military and political assignments around Southeast Asia and the South China Sea.

References

Cymmetria Wikipedia