Blog: Stay Ahead of Cyber Threats | Intel 471 Skip to content
Resources

Intel 471 Blog

Cutting edge threat intelligence and research

Homepage Hero
To Deliver Malware, Attackers Use the Phone
Cyber Attacks// Oct 08, 2024

To Deliver Malware, Attackers Use the Phone

Underground call center services are aiding threat actors in delivering malware through callback phishing and negotiating ransoms. Here's a briefing about different attack scenarios and tips for defense.

Cybersecurity Is Every Employees’ Responsibility
Threat Intelligence// Oct 03, 2024

Cybersecurity Is Every Employees’ Responsibility

Cybersecurity Awareness Month is a chance to remind everyone, including employees and customers, that there are simple, effective ways to keep yourself safe online, protect your personal data, and help secure our world.

Are Telegram's New Policies Spooking Cybercriminals?
Cybercriminals// Malicious Actors// Oct 01, 2024

Are Telegram's New Policies Spooking Cybercriminals?

Telegram will now divulge IP addresses and phone numbers in response to valid legal requests. Some cybercriminals are planning to leave Telegram. We assess the impacts of this on visibility into the cybercriminal underground.

Detecting Malware Abusing Google for Command-and-Control
Security Operations// Oct 01, 2024

Detecting Malware Abusing Google for Command-and-Control

Malware often abuses cloud services for command-and-control. It's not a new technique but has been used recently by the Voldemort malware. In this post, we describe two different threat hunts that can detect this activity.

Intel 471 Earns Frost & Sullivan’s 2024 Enabling Technology Leadership Award
Threat Intelligence// Sep 25, 2024

Intel 471 Earns Frost & Sullivan’s 2024 Enabling Technology Leadership Award

Leading industry analyst recognizes Intel 471 for world-class performance as leading global CTI and threat hunt provider for driving growth and impact of operationalized threat intelligence .

Why Russia is a Hotbed of Cybercrime
Geographies// Sep 24, 2024

Why Russia is a Hotbed of Cybercrime

In this Studio 471, Alec Jackson discusses how deep, institutional corruption ties Russian IT professionals, organized criminal groups and the state together and how Russia leverages this to its advantage.

A Look at the Residential Proxy Market
Threat Intelligence// Sep 16, 2024

A Look at the Residential Proxy Market

Cybercriminals proxy connections through residential IP addresses to avoid geoblocks and other security controls. Here's a look at the thriving market for this underground service.

Threat Hunting Case Study: Uncovering FIN7
Threat Intelligence// Sep 10, 2024

Threat Hunting Case Study: Uncovering FIN7

FIN7 is one of the most persistent and capable financially motivated threat actor groups. Here's how to threat hunt for signs of a FIN7 intrusion.

Hunting for RansomHub and Antivirus Killers
Cybercriminals// Malicious Actors// Sep 09, 2024

Hunting for RansomHub and Antivirus Killers

Threat actors always seek new techniques and tools that make it easier to infiltrate an environment, persist, and perform malicious activity. One of the obstacles to this is antivirus or Endpoint Detection and Response (EDR)....

A Briefing on Malware Crypting Services
Threat Intelligence// Sep 04, 2024

A Briefing on Malware Crypting Services

Crypting malware hides it from security tools. There’s rising demand for crypter services. Here’s a look at this underground market.