Back to Resources

SentinelOne Demo: SentinelOne VS Knight Ransomware – Detection and Mitigation

In this video demonstration, we show how the SentinelOne Singularity XDR Platform detects and responds to Knight ransomware.

Knight ransomware (aka Knight Lite) emerged in August of 2023 as an evolution or rebrand of Cyclops ransomware. Knight ransomware operates as a multi-extortion group, hosting a TOR-based blog to list victim names along with any exfiltrated data. Victims are aggressively coerced into payment so as to avoid having their data leaked publicly. Knight has been actively advertised and sold on the RAMP forum.

Knight ransomware is delivered primarily through phishing and spear phishing campaigns. Some early examples include those masquerading as messages from TripAdvisor. Individual threat actors (affiliates) have multiple options available through the Knight RaaS program. Encryptor payloads are available for Windows as well as Linux/ESXi and macOS.

Knight operates as a RaaS (Ransomware-as-a-Service). Individual ransomware operators do not discriminate when it comes to victimology outside of targeting enterprise and SMB environments. The same holds true for the previous iteration of this ransomware, Cyclops.

The SentinelOne Singularity XDR Platform can return systems to their original state using either the Quarantine or Repair.

Watch Now

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform harnesses the power of data and AI to protect your organization now and into the future.