Read how Todyl helped one of our partners stop an in-progress ransomware attack.
“Todyl makes up shine like a hero. The solution is easy to implement, easy to use, and clients trust us even more with recommendations I make in the future.”
Of CMMC Maturity Level 2 controls met using Todyl
From multiple new contracts and avoidance of regulatory fines
In a 30-day period, supporting the remediation of detected threats within 29 minutes
On a Sunday afternoon, Justin Mirksy, Managing Partner at DBT, received a critical alert from Todyl’s detection engineers for one of his clients. DBT was not utilizing Todyl's Managed eXtended Detection and Response (MXDR) or Endpoint Security (EDR+NGAV) modules in place at the time, however the MXDR team periodically reviews critical alerts for accuracy and immediately reached out to DBT as a courtesy due to the severity.
Todyl’s detection engineers identified an unknown threat actor attempting to exfltrate user credentials and data from DBT’s client, which is an indication that ransomware was about to be deployed.
Todyl’s MXDR team immediately launched an investigation covering multiple areas of concern: logon activities, credential dumping, lateral movement, and the attempted loading of several malicious binaries. The team identified the compromised account by looking at a multitude of failed logon attempts, followed by a successful logon from the public internet in an IP block not used by the client.
Download the full case study to learn more about how Todyl helped DBT become the hero who saved the day.
Subscribe to our newsletter to get our latest insights.