If you have questions about our reports or services please use the Contact Us page to get in touch. Thank you.
You’re a security researcher who wants to analyze case artifacts for learning and/or fun and is not doing so on behalf of an organization. This service receives access to all artifacts and IOCs from our environments as well as access to our threat intelligence platform.
This includes everything from the above service (ransomware files, beacons, PCAPS, event logs, memory images, etc.) but for organizations. This includes reported and unreported cases, access to artifacts and threat intel from our environments. This service also includes access to the TIP’s API to pull IOCs/events. Includes email Q&A as time permits.
We track infrastructure related to Cobalt Strike, Qbot/Qakbot, PoshC2, Covenant, Metasploit, Empire, Meterpreter stagers and more.
This threat feed is made available using our threat intel platform (MISP) which can be accessed via a GUI, API, or Sync. The feeds can be exported to txt, csv, STIX, MISP, etc. as needed to import into your IDS, SIEM, etc. We can provide a script (ps or bash) if needed to download the feed from our API.
We have two options for this service, internal use and commercial use. Please Contact Us for pricing.
This service includes all of the above plus long term infrastructure tracking, Cobalt Strike config & Beacons, OSINT linking, malware tagging, ransomware association, and other curated intel. Please Contact Us for pricing.