Cyber security experts, trusted partners.

Combining expertise and innovation, we defend your digital infrastructure and your success.

About us

Cyber security pioneers since 1998

RJ45Lab Laboratory for Cyber Security has established solid experience and extensive expertise in the field over time. For over two decades, we have been providing our clients with our know-how and passion to ensure the protection of digital infrastructure and the success of businesses. Our history and dedication in the field of cyber security make us the ideal partner to meet the challenges of the present and the future together.

We build secure systems

Our Cybersecurity Services

Offensive Security Services

RJ45Lab's offensive security services aim to identify and exploit vulnerabilities in your systems before attackers do. Our team of experts conducts penetration testing, vulnerability assessments, and targeted attack simulations to reveal weaknesses and gaps in your security. Through this proactive offensive strategy, we help you strengthen your defenses, minimizing risks and protecting your most valuable assets.

Research and development in cybersecurity

RJ45Lab's cybersecurity research and development is dedicated to continuous innovation in cybersecurity. Our team of experts collaborates with technology and academic partners to explore new solutions and methodologies, anticipating emerging threats and improving the protection of our customers. Our investment in research and development allows us to offer increasingly advanced services and maintain our position as a leader in the cybersecurity industry.

Cybersecurity Consulting

RJ45Lab's cybersecurity consulting focuses on identifying vulnerabilities and risks your company may face. Through an in-depth analysis of your infrastructure and security policies, we offer customized recommendations to improve your protection and resilience. Our team of experts will guide you in adopting best practices and regulatory compliance, ensuring a secure and reliable environment for your organization.

Design of security solutions

RJ45Lab's security solution design is focused on developing customized strategies to protect your business. Our team of experts carefully analyzes your needs and designs tailored solutions, integrating cutting-edge technologies and optimizing your existing infrastructure. We are committed to creating a secure and resilient environment, adapting to the specific challenges your organization faces in the cybersecurity landscape.

Offensive Security Services

We build SECURITY SOLUTIONS

Our Cybersecurity Products

SPAGHETTI RANSOMWARE
simulator

The tool consists of an exfiltration server and a client agent, both written in the Go language. When the agent is executed (double click) on the device (Windows), it initiates a series of processes typical of an authentic ransomware, including:

  • Controlled Replication – the executable self-copies within the filesystems of all reachable machines within the limits of execution privileges and the previously declared scope;
  • "Stealing" – the malware searches for potentially sensitive files and data on the infected machine and exfiltrates them as a Stealer would;
  • Controlled Data Encryption – the extracted files are not deleted, but instead are encrypted with a key that will be deposited in the ransom TXT file on the machine's filesystem; the client can also choose the option of performing a "safe" encryption operation, preventing the replacement of potentially useful files on the systems in scope.

At the end of execution, the system is cleaned of all remnants left by the Spaghetti Ransomware simulator (such as executables and archives) except for the ransom file, which is left on the system as proof of its infection. On the remote exfiltration server, an archive containing all the sensitive files extracted and a timeline of the operations performed by the malware regarding each of the infected systems will be deposited.

Based on these timelines, the security team can generate a report that includes a graphical infection map and all the operations performed, divided by system.    

STOLEN

STOLEN, acronimo di STealer and Osint Logger for Early Notification, si riferisce alla raccolta e all’analisi di informazioni provenienti da fonti accessibili al pubblico. Queste fonti possono includere siti web, social media, database pubblici, blog, forum, notizie e altre risorse online. STOLEN sfrutta la vastissima quantità di dati disponibili su Internet per estrarre informazioni rilevanti e utilizzabili e gioca un ruolo cruciale nella sicurezza informatica moderna, offrendo alle organizzazioni la capacità di:

  • Identify emerging threats and trends in real-time
  • Gathering information on potential attackers and their techniques
  • Monitoring the presence of publicly exposed sensitive corporate or personal data
  • Prevent attacks by predicting malicious behaviors based on public data analysis
 
VIP ASSESSMENT
Through an in-depth analysis of online sources, our team of experts gathers and analyzes publicly accessible information on subjects of interest. Using advanced tools and specialized techniques, we provide our clients with an accessible attack surface that can potentially be exploited by threat agents to compromise their image and personal data. Our service includes:
  • Research and correlation of personal information
  • Analysis of online activities
  • Background information research
  • Identification of online threats
  • Creation of intelligence reports
Security incidents

Significant Cyber Incident

By significant cyber incident we mean "state sponsored" actions, espionage, and attacks with losses exceeding $1 million

0 +

2023

0 +

Q3 2024

Source: www.csis.org

Generic Cyber Incident

By generic cyber incident we mean a cybersecurity event involving the compromise, breach, or loss of data

0 +

2023

0 +

Q1 2024

Source: www.hackmageddon.com

our leader

People make companies

We would like to emphasize the importance of the people working behind the scenes. Let us introduce you to our leader, the core of our team of experts dedicated to cybersecurity.

Stefano Chiccarelli

Co Founder & CEO

© 2024 RJ45LAB S.r.l. – P.I. C.F 02374240683 – ALL RIGHTS RESERVED