
Handala Threat Group
An Iranian aligned threat group conducting destructive and espionage focused cyber operations against organizations in Israel and Western countries.

Organizations today defend an ever-expanding attack surface. The rapid integration of technology, including software as a service (SaaS) and customer-facing digital services, has created more opportunities for threat actors to exploit vulnerabilities than ever before. Misconfigured services, vulnerable suppliers and spoofed login pages can all serve as entry points into larger intrusion campaigns.
Compromised identities are today the primary method for gaining initial access. Credential-based intrusions accounted for 48.5% of techniques our Adversary Intelligence team observed in threat actor engagements during 2025. Rather than exploiting unpatched vulnerabilities, attackers obtain valid credentials on underground markets and log in to remote access gateways, corporate portals, and virtual private networks (VPNs). Additionally, easy-to-use phishing platforms now go beyond credential theft to bypass multi-factor authentication using fake authentication pages that mimic trusted brands. All these tactics bypass traditional detection methods at the perimeter, but can be mitigated by proactively monitoring your internet-facing assets, critical third parties, and digital brand abuse on the internet.
To empower organizations against the growing complexity of their attack surface, Intel 471 is introducing the Cyber Threat Exposure Bundle. This offering brings the core solutions of our Cyber Threat Exposure solution together into a single package. It’s designed to help security teams and leaders understand, prioritize and respond to external risks faster across three critical exposure domains: owned infrastructure, third party risk and brand exposure. Together, these domains provide a comprehensive view of points in the attack surface attackers exploit to gain initial access and more.
The Cyber Threat Exposure Bundle includes the three core solutions from our Cyber Threat Exposure Portfolio. These are available as dedicated modules within Exposure Mode on the Verity471 Cyber Intelligence Platform. The three solutions are:
Once viewed primarily as fraud prevention or reputation management, brand protection has today become increasingly important for cyber threat intelligence (CTI) teams. Brand abuse often serves as an early indicator of a broader security incident.
Modern threat actors are shifting initial access tactics away from purely technical exploitation towards social engineering and trust-based attacks. They increasingly weaponize brand familiarity and user trust through techniques such as typosquat domains, fake login pages and malicious mobile applications.
In late January 2026, Mandiant reported an expansion in ShinyHunters-branded extortion operations that leveraged voice phishing (vishing) and victim-branded credential-harvesting infrastructure to compromise SSO credentials and enroll unauthorized devices into MFA systems. Rather than exploiting a vendor vulnerability, the campaigns bypassed identity controls through social engineering.
Campaigns like this reinforce a critical reality: impersonation infrastructure and brand-themed lures often surface before defenders see clear intrusion signals in their own environment. As adversary tactics evolve, Brand Exposure helps security teams close this gap by detecting and disrupting brand impersonation early — turning external signals into prioritized findings with raw evidence and trusted Intel 471 CTI context.
Because these campaigns often target users of third-party SaaS platforms, we can see the interplay between the different modules of the Bundle. While Third-Party Exposure monitors your SaaS providers and routes automatic breach alerts from Adversary Intelligence when a provider is compromised, Brand Exposure surfaces the brand-themed credential-harvesting and impersonation infrastructure that frequently appears before those incidents — so teams can act earlier and with clearer context.

Image shows a dashboard within a brand monitor, within the new module
Brand Exposure continuously monitors for indicators of brand abuse and impersonation across the open web, social platforms and underground sources. Key capabilities include:
With the inclusion of the new Brand Exposure solution — the bundle provides a coordinated approach to managing exposure risk through a threat-informed lens. It provides organizations with a single operational framework for managing external cyber exposure across infrastructure, supply chains and brand trust. The separate module that corresponds to each solution within Verity471 shares a consistent design, structured workflows and easy-to configure rules, providing security teams with a unified operational experience.
As well as having access to all three modules separately, the Bundle also introduces a Global Risk Dashboard. This consolidates insights across brand, infrastructure and Third-party risk into a single view. It surfaces key metrics like overall exposure scores, finding over time graphs and newly opened issues, replacing the need for manual roll-ups so executives can understand their overall exposure risk at a glance.

Global Dashboard, providing always-on, decision-ready visibility of external exposures
Security teams need a clear path from finding to closure. Structured workflows exist separately within each module, enabling users to assign findings, track investigation history and, in the case of Brand Exposure, swiftly initiate domain disruption requests. What’s more, the Cyber Threat Exposure Bundle introduces the Findings Workbench — a workspace where analysts can investigate and remediate exposure findings across all three modules within a single view.
From this prioritized view, analysts can quickly use filters to focus on what’s assigned, what’s new and what really matters. From there, it streamlines remediation with a built-in task assignment workflow and simple status tracking, giving managers real visibility into progress and ownership. It also preserves investigation context by letting teams add notes and link findings to any internal ticketing systems in use, creating a durable audit trail. And to cut noise long-term, analysts can confidently dismiss false positives or accepted risks with an “ignore” flag. The centralized workflow ensures that findings move efficiently from detection to remediation, while giving security leaders visibility into ownership and progress.

Findings Workbench: A centralized queue of Brand Exposure findings with risk rating, status and assignment. View relationship mapping to support fast investigation and validation.
A key differentiator of our Cyber Threat Exposure solutions is their deep integration with Intel 471’s CTI. Across every Exposure module, findings are enriched with CTI insights that reveal if the exposure is actively associated with threat actor activity. When a finding features the “threat” indicator icon, the user can pivot into the related intelligence report for additional context. For example, if a lookalike domain is detected, users could pivot directly into a malware report to see if that domain is actively being targeted by threat actors using keyloggers, webinjects or DDoS attacks. Threat-informed prioritization allows teams to prioritize their response based on real-world threat actor activity.Comprehensive view of external risk, across one cyber intelligence platform.
Cyber Threat Exposure Bundle brings together attack surface management, third-party monitoring and brand protection into a single operational framework.
The combination of these exposure domains, enriched with Intel 471 CTI, allows organizations to detect risks earlier, prioritize remediation and preempt attackers before their attack escalates.
At the same time, the Bundle brings new features such as the Global Risk Dashboard and Findings Workbench, give organizations a single view of external exposures and a streamlined path from risk identification to resolution. It helps teams to better understand, prioritize and respond to threats.
Cyber Threat Exposure Bundle is now available to purchase. Just reach out to organize a demo or talk to us further:

An Iranian aligned threat group conducting destructive and espionage focused cyber operations against organizations in Israel and Western countries.

CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

DevMan Ransomware is a newly emerging ransomware operation observed in 2025 that has been assessed as a derivative of the DragonForce ransomware family.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.