
Join our BETA waitlist
Sign up for our waitlist and be one of the first to access exclusive features
CyTest LockBit-NG-Dev Attack Emulation
Find out if you are safe against LockBit-NG-Dev in less than 15 minutes!
LockBit has remained among the most common ransomware families since at least 2022. The group regularly releases new versions of its encryptor which is optimized to evade security products such as EDRs.
A next-gen version of LockBit dubbed LockBit-NG-Dev has been found and contains a number of features that may be effective at evading even the most sophisticated AI-enabled EDRs.
Top security practitioners know that validating their security controls is an essential practice in ensuring security resilience. Today, you already have your basics covered, and you believe that your security controls are working and all your configurations are in place. You want to level up your confidence and know with certainty how effective their defensive tools truly are against LockBit’s evasive developments.
You may be tired of putting too much faith in your security controls (and their sales and marketing)? At the end of the day, you would be the one up at night responding to a ransomware infection. No one will have your back better than you. Trust but verify. Join our waitlist today.
Validate your controls now before the bad guys get access to your data
Here's how CyTest LockBit-NG-Dev Emulation works:
Test your protection against LockBit’s latest techniques with CyTest’s attack emulation software. CyTest is a security control validation platform that enables security defenders to validate the effectiveness of their security program from the inside out. Our LockBit-NG-Dev ransomware emulation software mimics specific LockBit-NG-Dev behaviors using the same encryption techniques, IO patterns, note writes, programming language and other elements to properly test this ransomware family.
No malware is used in this emulation test
We take care to emulate the behaviors used by each ransomware in their attempt to evade today’s best security solutions. All test emulation activities are performed within the safety of our sandbox directories. Once completed and we know how well your protection performed, we remove all traces of the emulation, and provide you with the results of whether the test was detected and blocked, or if the test activities ran undetected. You don't need to wait weeks to get a report - you'll find out immediately after the test has completed.
