Missing: Wasp's Product Demo & Case Studies
Promote your product offering to tech buyers.
Reach 1000s of buyers who use CB Insights to identify vendors, demo products, and make purchasing decisions.
Missing: Wasp's Product & Differentiators
Don’t let your products get skipped. Buyers use our vendor rankings to shortlist companies and drive requests for proposals (RFPs).
Expert Collections containing Wasp
Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.
Wasp is included in 1 Expert Collection, including Y Combinator W21 Demo Day.
Y Combinator W21 Demo Day
W21 YC Cohort - Demo Day Company List
Latest Wasp News
Nov 18, 2022
The latest campaign According to Checkmarx researchers , the latest WASP campaign has features to ensure persistence in a compromised PC and evade cybersecurity tools. The attackers are using polymorphic malware (the payload changes with every installation), steganography to hide code inside packages, reboot persistence, and building a fake GitHub reputation with the Starjacking technique. They are either using already-made user accounts on PyPi and other open-source projects to upload malicious packages, or creating legitimate-looking fake user accounts on Github or Steam while stealing the profile description from popular user accounts. Further, they are creating different and unoccupied package names with slight modifications. So far, according to its Discord server, WASP has infected hundreds of victims. More about WASP WASP is an info-stealing malware that steals all the victim’s Discord accounts, passwords, crypto wallets, credit cards, and other interesting files on the victim’s PC. It sends the stolen data back to the attacker through a hard-coded Discord webhook address. WASP operators claim that it is fully undetectable. They are selling it for $20 to other criminals, with payment coming in cryptocurrency or gift cards. Earlier campaigns Earlier this month, Phylum researchers found that dozens of newly published PyPi packages were delivering WASP Stealer onto Python developer’s machines by hiding malicious code. In addition, Check Point researchers disclosed that several malicious PyPi packages were using image base code obfuscation (steganography) and infecting through open-source projects on Github. Checkmarx’s recent report connects both of these campaigns to the same attacker. It says the operator is still releasing malicious packages and launching campaigns, just by changing GitHub usernames and package names. Conclusion Attacks of this kind are too difficult to stop as whenever the team behind PyPI deletes discovered malicious packages, threat actors quickly maneuver and create a new identity or simply use a different name. The involvement of polymorphic malware highlights the importance of sharing threat intel in the open-source ecosystem to better protect against the growing number of such threats.
Wasp Web Traffic
Wasp Frequently Asked Questions (FAQ)
When was Wasp founded?
Wasp was founded in 2019.
Where is Wasp's headquarters?
Wasp's headquarters is located at Zagreb.
What is Wasp's latest funding round?
Wasp's latest funding round is Seed VC.
How much did Wasp raise?
Wasp raised a total of $1.63M.
Who are the investors of Wasp?
Investors of Wasp include HV Capital, Acequia Capital, Lunar Ventures, 468 Capital, Tokyo Black and 4 more.
Discover the right solution for your team
The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.