Bloomberg Businessweek (North America)

A Sentinel That Cuts Through Clutter �Jeremy Kahn

Startups ▶ Darktrace’s software studies a network’s pattern of life ▶ It “helped us understand what exactly was happening”

-

It could have taken months for the systems administra­tors at a large bank in Rome to figure out that one of their servers was talking to Facebook, a red flag given that networks in banks don’t need to know how many “likes” they’ve received. And they might not have noticed the streams of data the server then sent to an array of unknown computers. This kind of threat—coming from inside the network, not from outside its firewall—is difficult to detect. According to IT researcher Gartner, it can take an average 229 days for a business to figure out it’s been compromise­d this way.

What tipped off the bank’sk’s IT department was a little blackack box containing software fromrom Darktrace, a U.K. startup founded in 2013 by a groupp of former British spooks and Cambridge University Ph.d.s. After two minutes, the software issued a preliminar­y alert, color-coded amber. After three minutes, as it became more confident something was seriously amiss, it switched to red.

Guarding a network’s perimeter or scanning for known varieties of malware—the two buckets into which almost all cybersecur­ity programs can be lumped—doesn’t cut it anymore, says Nicole Eagan, Darktrace’s chief executive officer. Hackers have become increasing­ly sophistica­ted, changing just enough of an attack’s code to elude establishe­d defenses. Cybercrimi­nals are also increasing­ly using “spear phishing”— e-mails that seem to come from trusted sources but contain malicious links—to worm into networks. Says Eagan, “No matter how good you think your firewall is, attackers are still getting in.”

Dave Palmer, Darktrace’s director of technology, says his company’s approach to cybersecur­ity was inspired by the way spies conduct surveillan­ce. He should know: Palmer once guarded the networks of MI5, the U.K.’S domestic spying agency, and General Communicat­ions Headquarte­rs, the equivalent of the U.S. National Security Agency. Darktrace’s software employs more than a dozen machine-learning techniques to study a network’s socalled pattern of life—everything from the devices that usually talk to one another to what sort of data they normally transmit to whom and when. Once a baseline has been establishe­d, the program alerts systems administra­tors to irregulari­ties, color-coding each alert depending on how serious a threat it might pose. Amber means the company’s IT chief should probably be informed, Palmer says. Red means it’s time to wake up the CEO.

Martin Whitworth, a security analyst at Forrester Research, says the behavioral analytics honed by Darktrace and rivals such as Anomali and Deep Instinct are necessary because IT executives are drowning in data, w with lots of potential for false alar alarms. That was the case at Dr Drax Power, a U.K. utility that in installed Darktrace’s software in 2013. “It very quickly got r rid of that noise and helped u us understand what exactly was happening—what was getting through our firewall, how it was getting through, how it was defeating our antivirus,” says Martin Sloan, Drax’s security chief.

Darktrace has more than 200 customers, about a quarter of them in financial services and the rest in sectors including energy, retail, and travel. The monthly subscripti­on starts at $10,000. The startup is backed by more than $50 million in venture capital. Among its biggest supporters is Invoke Capital, a $1 billion venture fund headed by Mike Lynch, the onetime CEO of Autonomy, a U.K. software firm bought in 2011 by HP for $11 billion. Lynch and HP are embroiled in a legal battle over allegation­s that Autonomy’s management inflated the company’s revenue, which Lynch has denied.

Installing Darktrace takes about an hour, Palmer says. The self-learning system reaches 80 percent of its capabiliti­es within one month and continues to improve gradually.

In early March, Darktrace released an add- on called Antigena that automates many of the responses to a breach that once required humans, such as isolating a server from the Internet. That’s in part to address a manpower shortage. In the U.S. alone, there are 260,000 openings for cyberthrea­t analysts. Says Eagan, “There are not enough people trained to deal with all the major breaches.”

As an investigat­ion found out, the attack on the Italian bank wasn’t particular­ly sophistica­ted. A systems administra­tor had accidental­ly downloaded the malware that enslaved the bank’s server in a botnet—an army of infected machines controlled by hackers—used to mine bitcoin. The Facebook page was where the botnet’s zombie machines went to get their instructio­ns.

In the past year, Darktrace has encountere­d far more ominous threats—hackers using machine learning to penetrate networks. At a conference in London in January, Lynch painted a chilling scenario of cybersecur­ity’s future: One artificial­ly intelligen­t piece of software silently trying to outwit and infiltrate another.

The bottom line A U.K. startup run in part by ex-spies is using artificial intelligen­ce to guard against network breaches.

Edited by Cristina Lindblad Bloomberg.com

 ??  ??

Newspapers in English

Newspapers from Canada