Skip to the main content.

1 min read

Start triage with already set YARA rules for SUNBURST

Featured Image

3 weeks ago, one of the biggest breaches happened where FireEye uncovered a malicious campaign that gained access to victims via trojanized updates to Orion, SolarWinds’ IT monitoring and management software. Being aware of the nationwide damages this breach will produce, Binalyze released an initiative where we decided to give support to SUNBURST damaged entities by releasing a version of Binalyze AIR with the codename SUNBURST that will enable anyone to identify their exposure to the attack and pinpoint their network vulnerability in under an hour.

This version is FREE of charge for 15-days and 25,000 endpoints.

Binalyze is the fastest evidence collection, triage, and IR investigation platform that now also contains the YARA Rules for SUNBURST thanks to our colleagues at FireEye. In the below lines you will find instructions how to perform a triage with already set YARA rules for SUNBURST in less than an hour.

Now it is time to showcase how easy it is.

  1. Select an endpoint

    yara-rules-air

  2. Click on “Triage” button

    sunburst-yara

  3. Select both SUNBURST YARA rules and click on “Save”.

    yara-rules-sunburst

  4. Triage is now in processing.

    yara-sunburst

  5. As said it is done in less than an hour or to be exact in 34 minutes.

    yara-rules

  6. To see full view of the investigation results click on “View”.

New call-to-action

macos forensics

Binalyze AIR Product Release 2.7.0

We are excited to announce the release and general availability of Binalyze AIR 2.7.0

Read More
digital-forensics

Why It Is Time To Rethink How You Are Using Digital Forensics

Digital Forensics is a vital part of a mature cybersecurity stack but the field of digital forensics is more than 40 years old, and so are the...

Read More
binalyze-cooperation-eu

Join us at the virtual roundtable carried out by GLACY+ Project in cooperation with APWG.EU

We are living in an era, where the volume and sophistication of cyberattacks have increased as a result of overflowing data and increased attack...

Read More