Use Case

Spyware Detection

Sophisticated spyware exploits zero-day vulnerabilities to deliver zero-click attacks targeting employees and their colleagues working in critical or sensitive sectors. Less sophisticated malware in used in a wide variety of social engineering attacks

Pegasus Spyware in 50 countries

Built-in security protections have proven powerless against sophisticated spyware like Pegasus, Graphite and Predator. Even routine malware can be destructive, tricking users into revealing critical information.

Even routine malware can be destructive, tricking users into revealing critical information.

Telescope on a balcony

How Corrata protects against malware

Corrata defends against malware in multiple ways. By blocking access to malware download servers it reduces the opportunity for infection.  By scanning devices and network traffic for anomalies it can remotely detect even stealthy attacks. And by quarantining impacted devices it limits the damage that malware can cause.

Spyware Dashboard on Corrata platform

Advanced spyware detection and response

  • check-icon

    Advanced malware detection

    Pegasus, Predator and other advanced malware require sophisticated Android and iOS malware detection techniques.

    Corrata is unique in offering a solution that is capable of continuously monitoring for the anomalies in device behaviour which spyware causes. 

  • check-icon

    Incident investigation

    When suspected spyware related anomalies are detected Corrata offers the necessary tooling for incident investigation and response.

    End-users can generate and submit device diagnostic files and packet captures.  This files are vital to confirming infection and understand spyware operation.

  • check-icon

    Quarantining

    Automatic quarantining of devices is an effective response to malware discovery.

    Once infections are identified Corrata provides a protective cordon around the impacted device to ensure that it no longer has access to sensitive corporate data.

Poor Security Score on a phone screen
  • check-icon

    Preventing routine malware infections

    Social engineering is used to trick employees into downloading fake apps and granting dangerous permissions.

    Corrata blocks access to malware download sites, prevents malware installation and monitors for apps which use dangerous permissions.

  • check-icon

    Removal of risky apps

    The Corrata app prompts users to remove apps which are identified as risky

    The Corrata app prompts users to remove apps which are identified as risky.

whitepaper

Guide to Mobile Phishing

85% of phishing attacks on mobile take place outside email on channels such as SMS, WhatsApp and Facebook Messenger. To learn how to combat this threat download our updated guide.

Download

FAQ’s

Mobile malware can be split into two broad categories: commodity malware and advanced malware. Commodity malware, which is found almost exclusively on Android, is very common and uses social engineering techniques to trick users into revealing information and/or providing access to sensitive functions. Advanced malware impacts both iOS and Android. Typically it installs silent, without the need to download an application. This malware relies on vulnerabilities in the security architecture of the underlying operating system and is extremely dangerous.

Corrata relies on two broad approaches to malware detection. The first involves scanning the device to identify apps and flag any which are of concern. This is primarily useful against commodity malware. The second set of techniques go deeper by searching for indicators of compromise within all of the traffic going to and from the device. This is highly effective at identifying advanced malware which is difficult to detect via traditional scanning.

Corrata has a range of features to response to malware infection. Info Sec teams are alerted and impacted devices are automatically denied access to corporate applications. Communications with Command and Control (CnC) servers are intercepted and data exfiltration prevented. Users are alerted to the presence of malware and guided in its removal. Device diagnostic files and Packet Captures are generated to facilitate incident investigation and response. 

We’re on a mission

We’re here to stop every existing and emerging threat to your mobile workforce and business. Explore our Use Cases to find out more about the powerful and proactive protection we provide.

  • Mobile Phishing

  • Spyware Detection

  • Device Trust

  • AiTM Protection

  • Vulnerability management

  • smishing-content-img
    dialog

    use case

    Mobile Phishing

    Every day employees are being targeted with mobile phishing attacks which leverage SMS, QR codes, messaging apps and social media to harvest credentials, steal authentication cookies and more.

    Learn more
  • malware-content-img
    dialog

    use case

    Spyware Detection

    Sophisticated spyware such as the notorious Pegasus and its clones are being used to undermine the built in security of both iOS and Android making sensitive content accessible to bad actors.

    Learn more
  • Man in shirt in a business meeting
    Cloudlogo in green square

    use case

    Device Trust

    It's critical that any device your employees use to access enterprise applications is secure. Having a robust way to achieve device trust for every employee is essential.

    Device Trust
  • wifi-content-img
    dialog

    use case

    AiTM Protection

    In today’s cloud centric world most enterprise data travels over networks which are fundamentally insecure. Corrata provides the protection you need to ensure that your data remains private.

    Learn more
  • security-content-img
    dialog

    use case

    Vulnerability management

    Good device security posture is critical to reducing risk. Corrata monitors the settings and activity on your employees’ devices, assessing their security status and prompting end users to remedy any issues found.

    Learn more