Company type | Private |
---|---|
Industry | Computer software |
Founded | November 6, 2001 |
Founder | Florin Talpeș |
Headquarters | Bucharest, Romania Santa Clara, California |
Area served | Worldwide |
Key people | Florin Talpeș (CEO) |
Products | Cybersecurity software |
Services | Computer security |
Revenue | €296 million (2022) [1] |
Number of employees | 1,800+ (2023) |
Website | www |
Bitdefender is a multinational cybersecurity technology company dual-headquartered in Bucharest, Romania and Santa Clara, California, [2] with offices in the United States, Europe, Australia and the Middle East. [3]
The company was founded in 2001 by the current CEO and main shareholder, Florin Talpeș. Bitdefender develops and delivers cybersecurity products and services, including antivirus software, endpoint security, identity protection and online privacy for consumers and enterprises.
Bitdefender products are distributed through partners in over 150 countries [4] and the US market is estimated to generate more than 40% of its revenues. As of 2023, the company employed more than 1,800 people worldwide. [4]
Bitdefender software was originally developed by SOFTWIN, a company founded in 1990 in post-communist Romania. It was originally sold as AVX (Antivirus Expert) from 1996 until 2001, when the Bitdefender subsidiary was created, and AVX was rebranded under the Bitdefender name. [5]
In 2007, Bitdefender became a separate business entity with external capital entry, with Axxess Capital Investment Fund as a key shareholder.
From 2004 to 2015, the company expanded with offices in the United States, Germany, United Kingdom, Denmark, and the Middle East. [6]
In 2017, the company acquired French partner Profil Technology. [7] British fund Vitruvian Partners would then buy a 30% stake in the company, putting its valuation over $600 million. [8]
In 2018, Bitdefender opened a new subsidiary in Australia, through acquisition of assets from SMS eTech. [9] That year, the company also acquired behavioral and network security analysis company RedSocks. [6]
Bitdefender opened its own Security Operations Center in San Antonio, Texas in 2019. Bitdefender signed a multi-year partnership deal with Scuderia Ferrari on September 28, 2022. [10] [11]
In April 2024, Bitdefender announced the launch of Bitdefender Voyager Ventures, a corporate venture capital unit. [12]
Bitdefender's original product was sold as Antivirus Expert until 2001, when it was rebranded under the Bitdefender name. [5]
Since 2011, Bitdefender has expanded to include consumer and enterprise security products, and in 2021, an extended detection and response (XDR) platform. [13] Like most security suites, Bitdefender's consumer services are managed through an online portal, called Bitdefender Central. [14]
In December 2023, Bitdefender launched Scamio, a free AI-powered scam detector. [15] [16] Bitdefender and NinjaOne announced a partnership in May 2024 to integrate their security software into a single product suite. [17]
The company also releases free decryption tools for victims of ransomware attacks, including the BitLocker-abusing ShrinkLocker ransomware in 2024. [18]
Bitdefender joined the No More Ransom initiative in 2016, releasing free decryption tools for victims of ransom attacks to decrypt their devices without having to pay to do so. [19] [20] In 2018, Bitdefender joined the Cybersecurity Tech Accord,. [21] [22] In 2019, Bitdefender provided operational support to Europol's European Cybercrime Centre, helping shut down the Sipulimarket and Silkktie darknet markets. [23]
Bitdefender's 2020 research into the Interplanetary Storm botnet proxy network was provided to law enforcement ahead of the FBI dismantling the network in November 2023. [24]
In May 2024, Bitdefender was a supporting partner for Europol's Operation Endgame, which Europol called the largest operation ever against bots. It led to the takedown of over 100 servers, and four arrests worldwide. [25] [26]
On March 20, 2010, computers running Bitdefender under 64-bit versions of Windows were affected by a malfunctioning update that classified every executable program as well as DLL files as infected. These files were all marked as 'Trojan.FakeAlert.5' and were moved into quarantine. This action led to software and systems malfunctions that affected users globally. [27] Bitdefender representatives announced the removal of the faulty update and a workaround for the users affected, [28] except for those using the 2008 version. [29]
In 2020, hacker group DarkSide switched their main encryption ransomware product over to an "affiliate" model wherein other attackers could download and use their software in exchange for a portion of the profits. However, they introduced a bug in the process where affiliate hackers would all use the same private RSA key - meaning that a decryption package for a single target who paid the ransom would work on any target that had the ransomware installed. Security researchers noticed and were quietly already helping victims of the software, but with no public notice, making it so that the attackers would only see an inexplicable decrease in ransom payments that could be written off as chance.
Months later, Bitdefender publicly released a decryptor of their own development and issued a blog post describing the flaw, a move criticized in the MIT Technology Review . The article wrote that Bitdefender's program was flawed and could "damage" files decrypted with it. Second, the blog post tipped off DarkSide as to the nature of the flaw, leading to the group sarcastically thanking Bitdefender and patching the bug.
Security researchers studying the Colonial Pipeline cyberattack in May 2021 criticized Bitdefender for using the bug as a brief burst of publicity, though they acknowledged that DarkSide would’ve eventually noticed and fixed the issue. [30] Bitdefender defended their actions, saying they only wished to notify as many organizations as possible, [31] triggering a discussion among cybersecurity professionals about the pros and cons of publicly disclosing such vulnerabilities in malware. [32]
Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types.
ESET, s.r.o., is a software company specializing in cybersecurity. ESET's security products are made in Europe and provides security software in over 200 countries and territories worldwide. Its software is localized into more than 30 languages.
Avast Software s.r.o. is a Czech multinational cybersecurity software company headquartered in Prague, Czech Republic, that researches and develops computer security software, machine learning, and artificial intelligence. Avast had more than 435 million monthly active users and the second largest market share among anti-malware application vendors worldwide as of April 2020. As of 2018, the company had approximately 1,700 employees across its 25 offices worldwide. In July 2021, NortonLifeLock, an American cybersecurity company, announced that it was in talks to merge with Avast Software. In August 2021, Avast's board of directors agreed to an offer of US$8 billion.
Ransomware is a type of malware that encrypts the victim's personal data until a ransom is paid. They commonly use difficult-to-trace digital currencies such as paysafecard or Bitcoin and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult. Sometimes the original files can be retrieved without paying the ransom due to implementation mistakes, leaked cryptographic keys or a complete lack of encryption in the ransomware.
Webroot Inc. is an American privately-held cybersecurity software company that provides Internet security for consumers and businesses. The company was founded in Boulder, Colorado, US, and is now headquartered in Broomfield, Colorado, and has US operations in San Mateo and San Diego, and globally in Australia, Austria, Ireland, Japan and the United Kingdom.
AVG Technologies B.V. is a brand of cybersecurity, privacy, performance and utility software applications for desktop computers and mobile devices developed by Avast, a part of Gen Digital. AVG was a cybersecurity software company founded in 1991 and it merged into Avast following an acquisition in 2017. It typically offers freeware, earning revenues from advertisers and from users that upgrade to paid versions for access to more features.
Malwarebytes Inc. is an American Internet security company that specializes in protecting home computers, smartphones, and companies from malware and other threats. It has offices in Santa Clara, California; Clearwater, Florida; Tallinn, Estonia; Bastia Umbra, Italy; and Cork, Ireland.
Kaspersky Lab is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky and Alexey De-Monderik. Kaspersky Lab develops and sells antivirus, internet security, password management, endpoint security, and other cybersecurity products and services.
Bleeping Computer is a website covering technology news and offering free computer help via its forums that was created by Lawrence Abrams in 2004. It publishes news focusing heavily on cybersecurity, but also covers other topics including computer software, computer hardware, operating system and general technology.
Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for its Avira Free Security antivirus software. Although founded in 2006, the Avira antivirus application has been under active development since 1986 through its predecessor company H+BEDV Datentechnik GmbH. Since 2021, Avira has been owned by American software company NortonLifeLock, which also operates Norton, Avast and AVG. It was previously owned by investment firm Investcorp.
The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014. The attack utilized a trojan that targeted computers running on Microsoft Windows, and was believed to have first been posted to the Internet on 5 September 2013. It propagated via infected email attachments, and via an existing Gameover ZeuS botnet. When activated, the malware encrypted certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displayed a message which offered to decrypt the data if a payment was made by a stated deadline, and it threatened to delete the private key if the deadline passes. If the deadline was not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin. There was no guarantee that payment would release the encrypted content.
Operation Tovar was an international collaborative operation carried out by law enforcement agencies from multiple countries against the Gameover ZeuS botnet, which was believed by the investigators to have been used in bank fraud and the distribution of the CryptoLocker ransomware.
Norton is a brand name that was founded in 1982 by Peter Norton Computing and acquired by Symantec in 1990. It is now used by the American company Gen Digital for some of its software.
Linux.Encoder is considered to be the first ransomware Trojan targeting computers running Linux. There are additional variants of this Trojan that target other Unix and Unix-like systems. Discovered on November 5, 2015, by Dr. Web, this malware affected at least tens of Linux users.
Marcus Hutchins, also known online as MalwareTech, is a British computer security researcher known for stopping the WannaCry ransomware attack. He is employed by cybersecurity firm Kryptos Logic. Hutchins is from Ilfracombe in Devon.
REvil was a Russia-based or Russian-speaking private ransomware-as-a-service (RaaS) operation. After an attack, REvil would threaten to publish the information on their page Happy Blog unless the ransom was received. In a high profile case, REvil attacked a supplier of the tech giant Apple and stole confidential schematics of their upcoming products. In January 2022, the Russian Federal Security Service said they had dismantled REvil and charged several of its members.
Emsisoft Ltd. is a New Zealand-based anti-virus software distributed company. They are notable for decrypting ransomware attacks to restore data.
DarkSide is a cybercriminal hacking group, believed to be based in Russia, that targets victims using ransomware and extortion; it is believed to be behind the Colonial Pipeline cyberattack. The group provides ransomware as a service.
Hive was a ransomware as a service (RaaS) operation carried out by the eponymous cybercrime organization between June 2021 and January 2023. The group's purpose was to attack mainly public institutions to subsequently demand ransom for release of hijacked data.
Surfshark Antivirus is a cybersecurity software developed by a company known for Surfshark VPN and internet security services. Surfshark Antivirus provides protection against malware, viruses, and other cyber threats.