"Loading..."

Threat Actor Intelligence

Welcome to Intel 471

Our Process

How we operate

We Deliver

Unmatched visibility into actors and their TTPs, planning, marketplaces, and communication networks.

Unique Approach

Researchers globally deployed, close to adversaries, with native language and cultural understanding. Active in deep web, underground marketplaces, forums and social media. Intelligence collection based on customers' intelligence requirements.

Unprecedented Data

Over 10,000,000 actor handles and linked data. Information reports capture raw data to add to customers' own information with deep contextual insight provided. Track actors across marketplaces. Provides understanding of trends, enhances attribution and supports investigations.

Product Reliability

Access through online portal that provides full text searching, monitoring actors across forums and social network analysis. API allows automated queries by handle, IP address, etc. Intel 471 employs specialists located globally who are experts in their region and is incorporated in the United States.

Our People

The best in the business

Mark Arena
Chief Executive Officer
Jason Passwaters
Vice President of Intelligence
Maksym Mikheienko
Vice President of Technology

Our Partners

Partnerships, Memberships and Integrations

Our Products

Focusing on the who, what, where, when, how and why

“What” Is Not Enough – We Need the “Who” and “Why"

When a cyber attack is detected, the standard incident response is to locate and mitigate the malware, and then try to determine the campaign, and then assess the attribution of the attack. Intel 471 turns this approach on its head and helps companies identify who is responsible for the attack, and what the motivation of the attack is. This enables companies to become proactive by locating the likely attackers in advance of a perceived threat.

 

A Force Multiplier

Our subscription based approach brings customers in-depth information for a fraction of the cost of a cyber threat analyst or collector. Unlike other cyber threat analysis offerings, Intel 471 brings a capability that allows customers to integrate our collection with their own unique information sources to enhance operational protection and mission success.

 

Cyber Crime

Our cyber crime coverage focuses on cyber threat actors involved with financially motivated cyber crime and its supporting elements. It will allow your organization to understand the latest tools and techniques available in the criminal underground as well as understand who the actors are, enablers used, what they are motivated by and how they fit into the cyber crime ecosystem.

 

HACKTIVISM

Our hacktivism coverage focuses on politically or issue motivated hacking groups, actors, and supporting elements and the cyber threat operations and campaigns that they are involved with. It allows organizations to better understand current targeting, leadership trends, hacktivist groups/movements, motivations and the tools, techniques and procedures (TTPs) related to this threat activity. This product focuses on the cyber threats from hacktivism groups/movements and is not intended for brand protection, physical security or monitoring of legitimate activists or groups.

News

Latest News, Press and Events

careers

Hiring humble experts and quiet professionals

Cyber Threat Researcher
[EASTERN EUROPE PREFERRED]

Proactively monitor, track and attribute cyber threat actors predominantly who speak Russian or Ukrainian languages.

Duties & Responsibilities:

  • Monitor the criminal underground where cyber criminals congregate and speak Russian/Ukrainian;
  • Research specific actors to determine who they are, their motivation and their criminal tactics, techniques and procedures (exploit kits, malware kits, cash out procedures, bulletproof hosting etc.);
  • Produce written reports of research findings and work collaboratively to identify knowledge/information gaps


More Info

 

Cyber Threat Researcher
[PUNE, INDIA]

Proactively monitor, track and attribute cyber threat actors predominantly who speak English or Hindi.

Duties & Responsibilities:

  • Monitor the criminal underground where cyber criminals congregate and speak English/Hindi;
  • Research specific actors to determine who they are, their motivation and their criminal tactics, techniques and procedures (exploit kits, malware kits, cash out procedures, bulletproof hosting etc.);
  • Produce written reports of research findings and work collaboratively to identify knowledge/information gaps


More Info

Contact Us

Get in Touch
Global Locations
Dallas - New York - Kiev - Pune
Amsterdam - Bogota
Call Us
(800) 833-1471