Cutting edge threat intelligence and research from the Intel 471 team
Leading Ransomware Variants Q3 2022Oct 20, 2022
This report examines the leading ransomware variants related events for Q3 2022 specifically observed by Intel 471.
Rise of Black Basta RansomwareSep 08, 2022
This report uses the analytical technique known as strengths, weaknesses, opportunities, and threats (SWOT) analysis to conduct an assessment of the Black Basta ransomware group.
Crashing the Party: Leverage Threat Intelligence to Mitigate Third Party RiskSep 08, 2022
Learn how cyber threat intelligence has helped to safeguard organizations like yours from third party risk.
Using Cyber Frameworks to Action CTI and Enhance Your Security PostureAug 30, 2022
Learn how NIST, MITRE ATT&CK™ and other cyber frameworks can better leverage your threat intelligence and improve your security posture.
The 471 Cyber Threat Report: 2022-2023 Trends & PredictionsAug 01, 2022
Intel 471 has identified a number of cyber threat trends that will likely dominate the landscape in 2023 and beyond.
Commonly Observed Threats to Telecommunications SectorJun 01, 2022
This report examines threats posing exponential risk to the telecommunications sector observed by Intel 471.
Bulletproof Hosting Services and Cybercrime: Yalishanda Case StudyApr 12, 2022
Intel 471 closely monitors numerous BPH operations, but one has grown in popularity across the underground, Yalishanda.
Initial Access Offers, Ransomware IncidentsApr 05, 2022
Purchasing access to organizations allows threat actors to reduce the time it takes to enter an environment. In 2021, the average time between a network access offer and a ransomware-as-a-service (RaaS) affiliate program breaching the same entity was 71 days.
Ransomware Variants Q4 2021Mar 14, 2022
This report examines the leading ransomware variants related events for Q4 2021 specifically observed by Intel 471.
Overview of Cyber Threat Trends to Beware of in 2022Feb 22, 2022
Cybersecurity increasingly has become a priority for organizations across all sectors as technology continues to advance worldwide. This report aims to provide a high-level overview of these threats, which likely will remain prevalent and worthy of continued focus throughout 2022.
Threat Actors Looking for a Steal: Key Threats Impacting the Retail IndustryFeb 17, 2022
The retail industry is a highly targeted vertical, a trend Intel 471 assesses is certain to continue since defrauding retailers remains a lucrative pursuit for financially motivated threat actors.
Log4j Vulnerability Situation ReportDec 17, 2021
This report aims to provide you with a consolidated update of all of our findings regarding the Log4j aka Log4Shell vulnerability, tracked as CVE-2021-44228, up to December 16, 2021.
451 Research Publishes Intel 471 ReportJul 20, 2021
Intel 471 analysis identifies the most useful among forums and venues of greatest relevance to cyberthreats affecting its clients.
Cobalt Strike - A Toolkit for Pentesters WhitepaperMay 19, 2021
The cybercrime underground’s adoption of Cobalt Strike correlates with the rise in ransomware activity over the past few years.
Frost & Sullivan 2021 Customer Value Leadership Award Intel 471May 18, 2021
For its strong overall performance, Intel 471 is recognized with Frost & Sullivan’s 2021 Customer Value Leadership Award.
Threats Persist Against Financial Services Sector: Products, Goods, Services Continue to Fuel Attack SchemesApr 22, 2021
The financial services sector continues to garner serious interest from underground threat actors, and it is unlikely to change during the following year.
Leveraging Intel 471’s Malware Intelligence Data Using MISP WhitepaperMar 26, 2021
Using Intel 471’s Malware Intelligence with MISP provides clients with constant coverage of top-tier malware families.
Mobile Malware - Underground Perspective WhitepaperFeb 01, 2021
As customers shifted to mobile banking, the focus of mobile malware also changed. Threat actors began to execute attacks on the infected device using overlays to phish data and two-factor authentication (2FA) tokens from victims.
Government Censorship, Surveillance Influence Chinese Cybercrime Underground WhitepaperDec 08, 2020
The underground marketplace functions like any other marketplace, including buyers and sellers with fluctuating supply and demand for different products and services.