Intel 471 Blog
Cutting edge threat intelligence and research
What malware to look for if you want to prevent a ransomware attackMay 12, 2022
Ransomware attacks start way before ransomware is placed onto a network. Here is the malware you need to watch out for.
Cybercrime loves company: Conti cooperated with other ransomware gangsMay 05, 2022
Conti kept a close eye on other ransomware groups and borrowed some of their techniques and best practices for their own operations.
Conti and Emotet: A constantly destructive duoApr 26, 2022
The Conti Leaks show just how crucial Emotet has been to Conti’s ransomware schemes.
Move fast and commit crimes: Conti’s development teams mirror corporate techApr 05, 2022
By mirroring the corporate culture of most technology companies, it changes the paradigm for organizations that need to protect themselves.
Source code leaks a key cog in malware development life cycleMar 29, 2022
By examining what happened in the aftermath of past leaks, organizations can better formulate security strategies to defend against future attacks.
Conti puts the ‘organized’ in organized crimeMar 23, 2022
We are now able to understand how Conti operates, often mirroring processes used by countless legitimate businesses.
Biometric security beginning to pique cybercriminals’ interestMar 08, 2022
Threat actors are becoming increasingly aware of the value associated with access to biometric data.