Vectra AI employs advanced threat detection mechanisms to detect and neutralize cyber threats throughout the stages of the attack chain.
After an initial exploit, the malware will contact its Command & Control server from which it will be remotely controlled in an automated fashion or by a human.
The attack usually progresses along the opportunistic path – the malware joins the host to a botnet and the bot herder steals information from the infected host and makes use of your resources to make money by attacking other systems across the Internet (Botnet Activity).
The attack may also have you as its intended target, something that is rarer, but also more threatening – in this case, the infected host will orient itself in your network (Reconnaissance), spread laterally to get closer to your crown jewels (Lateral Movement) and steal your data and send it to an outside system (Exfiltration).