Congressional Report Concludes CylancePROTECT® Played a Pivotal Role in Discovering, Stopping and Remediating Malware that Caused OPM Data Breach

IRVINE, CALIFORNIA, September 7, 2016 – Cylance® Inc, the company that is revolutionizing cybersecurity through the use of artificial intelligence to proactively prevent advanced persistent threats and malware, was named in a report today released by Chairman Jason Chaffetz (R-UT) with the House Committee on Oversight and Government Reform as having played a critical role in discovering, halting and remediating the data breach at the United States Office of Personnel Management in 2015. The report says that the company’s CylancePROTECT product was first used following discovery of the compromise to positively identify and stop the APT attack attributed to “Shell Crew” and/or “Deputy Dog” hacker teams, commonly associated with Chinese origin, and says, “The significance of the cutting edge preventative technology offered by Cylance in responding to the OPM data breach cannot be understated.”

“We consider it an honor to have been able to help stop and clean up this vicious attack,” said Stuart McClure, founder, president and CEO at Cylance. “The OPM breach, and countless others like it, is exactly why we were compelled to apply artificial intelligence to fighting hackers, whether state actors, rogue hackers, organized criminal groups, or cyber terrorists. Our mission is to protect everyone under the sun and we are just getting started.”

“We knew at Assurance Data that CylancePROTECT was game-changing technology when it was first released,” said Matthew Morrison, president and CEO at Assurance Data, a long-time channel partner of Cylance and a leading information security consultant for the federal government. “Seeing for ourselves how advanced malware was slipping past traditional endpoint security products, we recommended CylancePROTECT to the Office of Personnel Management and recommended its use on all computers and servers.”

US-CERT issued a report on April 24, 2015, stating that OPM discovered suspicious activity on its networks on April 16, 2015. On April 17, 2015, Jeff Wagner emailed OPM’s then Chief Information Officer Donna Seymour to report that Cylance officials were “coming in to help with the forensics” because “it was their tool that found the malware.” Today’s report notes that “CylancePROTECT was the first tool that OPM used after the agency learned its network was compromised, and the tool immediately found malware and set about cleaning OPM’s enterprise.”

The report quotes OPM’s IT Security Officer Jeff Wagner as saying that Cylance was able to find things that other tools could not “because of the unique way that Cylance functions and operates. It doesn’t utilize a standard signature of heuristics or indicators, like normal signatures in the past have been done, it utilizes a unique proprietary method.” For more information about how CylancePROTECT helped OPM and how it can help prevent future data breaches, visit

About CylancePROTECT

CylancePROTECT is true next-generation antivirus for endpoint security in the age of advanced persistent threats and rapidly mutating malware that signature-based antivirus tools can’t identify. At the core of Cylance’s unprecedented malware identification capability is a revolutionary machine-learning research platform that harnesses the power of algorithmic science and artificial intelligence. It analyzes and classifies hundreds of thousands of characteristics per file, breaking them down to study their “DNA” in order to discern whether an object is “good” or “bad” in real time.