Lemonsoft’s Cybersecurity
Lemonsoft’s cybersecurity planning and implementation are guided by the cybersecurity principle. The purpose of the cybersecurity principle is to actively prevent and detect cyberattacks against Lemonsoft and to limit the potential impacts of realized attacks. The APT13m04 threat model, which is kept up to date with various threat intelligence sources, is used in cybersecurity planning. The details of the cybersecurity implementation are confidential and not disclosed to outsiders.
Lemonsoft’s cybersecurity is continuously developed and consists of the following components:
- Reducing the attack surface through vulnerability management and hardening
- Early detection of attacks
- Rapid and as automated as possible response
- Limiting the impacts of realized attacks and recovery
- Producing legally admissible evidence and cooperating with authorities
We have an internal Bug Bounty program to actively search for vulnerabilities in our infrastructure before attackers do. We also conduct OSINT tests and vulnerability scans to find potential weaknesses.
Lemonsoft has 24/7 incident management and monitoring. We use various technologies to detect attacks and attack attempts. Through threat hunting, we search for traces of potential attackers in our network. Lemonsoft has its own CSIRT team that regularly practices for cyberattacks with various purple teaming and red teaming exercises. We also conduct DFIR cooperation with external suppliers and authorities as needed.
We use encryption and data masking in databases and files to prevent the exploitation of potentially leaked data for criminal purposes. In addition to encryption, we use various honeypots, accounts, machines, networks, and vulnerabilities to deceive and detect attackers.
Continuity planning and recovery practice are documented and regular to ensure our resilience to various disruptions, such as ransomware attacks. As in the 2023 ransomware attack, we do not negotiate with attackers, do not pay ransoms, and do not have insurance for paying ransoms.
Our verified logs collect information about the attacker. We cooperate with the Cybersecurity Center, where we report detected attack attempts and indicators of compromise (IOC) to be shared with other authorities. We also upload suspicious files to VirusTotal for analysis by the security community, as well as various suspected phishing site IP addresses. We do not impose any restrictions on sharing threat information internationally or with NATO countries.
If necessary, we file a police report with a low threshold and transfer the investigation responsibility to the police.