Intel 471 Blog
Cutting edge threat intelligence and research
The 7 common traits among highly successful cybercriminals: Part IJun 21, 2022
By pinpointing common behaviors , organizations can develop mitigation efforts by anticipating threat actors’ specific characteristics.
The relationship between access brokers and ransomware crews is growingJun 02, 2022
Ransomware crews need access to launch their attacks. This is who is selling it to them.
What malware to look for if you want to prevent a ransomware attackMay 12, 2022
Ransomware attacks start way before ransomware is placed onto a network. Here is the malware you need to watch out for.
Cybercrime loves company: Conti cooperated with other ransomware gangsMay 05, 2022
Conti kept a close eye on other ransomware groups and borrowed some of their techniques and best practices for their own operations.
Conti and Emotet: A constantly destructive duoApr 26, 2022
The Conti Leaks show just how crucial Emotet has been to Conti’s ransomware schemes.
Move fast and commit crimes: Conti’s development teams mirror corporate techApr 05, 2022
By mirroring the corporate culture of most technology companies, it changes the paradigm for organizations that need to protect themselves.
Source code leaks a key cog in malware development life cycleMar 29, 2022
By examining what happened in the aftermath of past leaks, organizations can better formulate security strategies to defend against future attacks.