Intel 471 Blog
Cutting edge threat intelligence and research
Here’s how the cybercriminal underground has reacted to Log4jDec 22, 2021
Given that attackers often race to take advantage of vulnerabilities in any way they can, Intel 471 wants to explain what we have observed on the underground.
A reset on ransomware: Dominant variants differ from prior yearsDec 15, 2021
While law enforcement around the world has gotten more aggressive, the RaaS groups currently dominating the ecosystem are completely different than just a few months ago.
How the new Emotet differs from previous versionsDec 08, 2021
Intel 471 researchers have found distinct differences in the newly re-emerged malware.
Emotet is back. Here's what we know.Nov 16, 2021
This marks the first time we observed Emotet malware activity after a takedown was announced in January.
How cryptomixers allow cybercriminals to clean their ransomsNov 15, 2021
A thorough understanding of these mixing services' operational underpinnings is key to comprehending how criminals are laundering the money.
Cybercrime underground flush with shipping companies’ credentialsNov 01, 2021
The actors responsible for selling these credentials range from newcomers to the most prolific network access brokers that Intel 471 tracks.
Cybercriminals cash in on black market vaccine schemesOct 19, 2021
Cybercriminals and the forums where they gather online will take on any scheme, no matter how technical, in order to make money.
The public sector is a juicy target for cybercriminalsSep 30, 2021
Intel 471 has observed a greater number of compromises in government institutions at the regional, local and municipal level.