The research and development division of WetStone Technologies, WetStone Labs, performs malware research and develops a suite of advanced digital forensic and incident response tools that support a wide range of investigative needs that include:
- Performing security audits
- Assessment of vulnerability
- Discovering the presence of malicious applications
- Exposing Steganography usage
- Collecting evidence from live systems
WetStone’s solutions provide customers with the tools to better understand a cyber threat, and assist them in profiling the intent, sophistication, capabilities and communications of an attacker.
STEGANOGRAPHY AND DATA HIDING
Malware Research and Product Development:
WetStone Labs maintains a repository of malware segmented into twenty-five categories. The datasets in this repository are utilized by the Gargoyle Investigator™ family of malware discovery tools to detect and identify known malicious software and potentially unwanted applications.
Steganography and Encryption datasets are provided to WetStone StegoHunt™ and StegoCommand™ users to detect and identify known data hiding programs.
Gargoyle Dataset Categories
- Denial of Service
- Exploit Kit
- Exploit Scanner
- Fraud Tools
- Password Cracking
- Remote Access
- Web Threats
- Wireless Tools
StegoHunt/StegoCommand Dataset Categories
Steganography, or the practice of data hiding, is commonly utilized by bad actors to either exfiltrate data or embed malicious programs, such as malware, in seemingly-innocent images and other media files.
Utilizing state of the art steganography detection algorithms, StegoHunt and StegoCommand can detect the presence of hidden data in a variety of different file types. These products can also identify the presence of tools commonly used to embed hidden data in files.
WetStone is the industry leader in steganalysis tools.
For more information please contact us.