Intel 471 Blog
Cutting edge threat intelligence and research
The 7 common traits among highly successful cybercriminals: Part I
Jun 21, 2022By pinpointing common behaviors , organizations can develop mitigation efforts by anticipating threat actors’ specific characteristics.
The relationship between access brokers and ransomware crews is growing
Jun 02, 2022Ransomware crews need access to launch their attacks. This is who is selling it to them.
What malware to look for if you want to prevent a ransomware attack
May 12, 2022Ransomware attacks start way before ransomware is placed onto a network. Here is the malware you need to watch out for.
Cybercrime loves company: Conti cooperated with other ransomware gangs
May 05, 2022Conti kept a close eye on other ransomware groups and borrowed some of their techniques and best practices for their own operations.
Conti and Emotet: A constantly destructive duo
Apr 26, 2022The Conti Leaks show just how crucial Emotet has been to Conti’s ransomware schemes.
Move fast and commit crimes: Conti’s development teams mirror corporate tech
Apr 05, 2022By mirroring the corporate culture of most technology companies, it changes the paradigm for organizations that need to protect themselves.
Source code leaks a key cog in malware development life cycle
Mar 29, 2022By examining what happened in the aftermath of past leaks, organizations can better formulate security strategies to defend against future attacks.