Intel471-Logo-white.png
Company

News & Press Releases

Intel-471-Logo-2024.png
Krebs on Security//

A Closer Look at the DarkSide Ransomware Gang

The FBI confirmed this week that a relatively new ransomware group known as DarkSide is responsible for an attack that caused Colonial Pipeline to shut down 5,550 miles of pipe, stranding countless barrels of gasoline, diesel and jet fuel on the Gulf Coast. Here’s a closer look at the DarkSide cybercrime gang, as seen through their negotiations with a recent U.S. victim that earns $15 billion in annual revenue.

Read Article
Intel-471-Logo-2024.png
Data Breach Today//

DarkSide's Pipeline Ransomware Hit: Strictly Business?

Affiliate-Driven Ransomware-as-a-Service Operations Keep Generating Big Profits. "It's not personal, Sonny. It's strictly business." That immortal line from "The Godfather" encapsulates the mindset of criminals who extort businesses using ransomware and other tools: It's all about profits.

Read Article
Intel-471-Logo-2024.png
Homeland Security Today//

Here’s What We Know About DarkSide Ransomware

With the ransomware incident that shut down a major fuel pipeline in the United States, another well-known variant on the cybercrime underground has been thrust into the international spotlight.

Read Article
Intel-471-Logo-2024.png
TechStrong TV//

Cybersecurity – Military Appreciation Month

Cybersecurity has long been a part of the job description for these former servicemen. This Military Appreciation Month we talked with J.C. Vega, Jason Passwaters, and Barett Darnell about how their military experiences and skillsets transferred into the world of cybersecurity.

Read Article
Intel-471-Logo-2024.png
Security Ledger//

Episode 212: China’s Stolen Data Economy (And Why We Should Care)

In this episode of the podcast (#212), Brandon Hoffman, the CISO of Intel 471 joins us to discuss that company’s latest report that looks at China’s diversified marketplace for stolen data and stolen identities.

Read Article
Intel-471-Logo-2024.png
Security Boulevard//

China’s Cybercriminals Profit From Underground Data Monetization

Cybercriminals are using big data technology to make money from data obtained on the Chinese-language underground. Quelle surprise. An analysis of open source information and data drawn from a variety of closed forums showed a cycle that included multiple layers of cybercriminals, the use of insider information and unwitting victims, according to researchers at Intel 471.

Read Article
Intel-471-Logo-2024.png
Duo Security//

China's Big Data Boom Spurs a Flourishing Underground Economy

China is increasingly becoming a "global epicenter" for big data analytics - but the country's lack of regulation is also cultivating a thriving underground economy centralized around the illegal sale of big data.

Read Article
Intel-471-Logo-2024.png
SC Media//

Chinese Threat Actors Extract Big Data and Sell it on the Dark Web

Researchers on Monday reported that cybercriminals are taking advantage of China’s push to become a leader in big data by extracting legitimate big data sources and selling the stolen data on the Chinese-language dark web.

Read Article
Intel-471-Logo-2024.png
Bleeping Computer//

QBot Malware is Back Replacing IcedID in Malspam Campaigns

Malware distributors are rotating payloads once again, switching between trojans that are many times an intermediary stage in a longer infection chain. In one case, the tango seems to be with QBot and IcedID, two banking trojans that are often seen delivering various ransomware strains as the final payload in the attack.

Read Article
Intel-471-Logo-2024.png
Help Net Security//

The Benefits of Cyber Threat Intelligence

In this Help Net Security podcast, Maurits Lucas, Director of Intelligence Solutions at Intel 471, discusses the benefits of cyber threat intelligence. He also talks about how Intel 471 approaches adversary and malware intelligence.

Read Article
Intel-471-Logo-2024.png
RSA Conference//

A Tribute to a Cybersecurity Maven, Angela Nichols (1969-2021)

Angela was not a cybersecurity startup founder, chief information security officer or a network security engineer. She wasn’t the creator of all the powerful cybersecurity products, threat dashboards or advanced AI technology algorithms used by the products that ArcSight, RedSeal, Anomali, Intel 471 and Analyst1 produced.

Read Article
Intel-471-Logo-2024.png
Bank Info Security//

Attackers Using Malicious Doc Builder Called 'EtterSilent'

Researchers at the security firm Intel 471 report cybercriminal gangs are using a newly discovered malicious document builder called "EtterSilent" to create differentiated, hard-to-discover, malicious documents that can be deployed in phishing attacks.

Read Article

Sign up for our Executive Intel Update

Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.