One Strategy, Multiple Use Cases
Deep & Dark Web Data Fuels BRI Products and Solutions
Cybersecurity & emergent malware
Flashpoint’s Approach: Because Flashpoint’s Subject Matter Experts are embedded in illicit Deep & Dark Web communities, we are able to gain insights into malware development as it happens and facilitate a proactive approach to mitigation.
Outcome: Through coordination with various antivirus companies, information about the POS malware was quietly released in a manner that was timed and controlled — with the intent to not only prevent harm, but to prevent the malware’s author and POS customers from reacting.
Physical Security & Executive Protection
Flashpoint’s Approach: In addition to extensive experience engaging with threat actors on the Deep & Dark Web, many of Flashpoint’s Subject Matter Experts have closely honed their physical security skills during time served in the US military and/or with public-sector intelligence agencies. When combined with targeted Deep & Dark Web monitoring, Flashpoint’s expertise helps organizations proactively identify and mitigate physical security risks.
Outcome: This visibility enabled security teams to leverage a threat-based approach by deploying resources in priority areas to protect their executive and reduce risks to physical security.
Third-Party Vendor Risk/incident response
Flashpoint’s Approach: Flashpoint’s expansive coverage of the Deep & Dark Web provides a robust view into a company’s ecosystem and helps rapidly assess the risks posed by third party relationships.
Outcome: In addition to confirming the existence of this data, the company further learned that the leak was much greater in scale than initially thought, totaling over 90 million U.S. records pertaining to hospital patients. Flashpoint analysts assisted the company in obtaining a sample set of the data and worked with the customer to help limit further exposure.
Flashpoint’s Approach: Flashpoint’s multilingual Subject Matter Experts have spent years immersed in the Deep & Dark Web analyzing fraud across various illicit communities that often have complex techniques, tactics, and procedures (TTPs) to engage in fraud. This combination of in-depth expertise with these TTPs and robust intelligence equips organizations with the context and visibility necessary to proactively mitigate even the most complex fraud schemes.
Outcome: Flashpoint’s financial industry customers used this information to get ahead of the threat prior to the US-launch of EMV, enabling them to engage in intelligence-led anti-fraud implementations and tailored go-to-market strategies in order to mitigate the financial loss and damaged brand reputation associated with large-scale fraud.
Flashpoint’s Approach: Flashpoint combines an intimate familiarity with malicious insiders’ techniques, tactics, and procedures (TTPs) with targeted monitoring of the Deep & Dark Web to help organizations proactively mitigate insider threats.
Outcome: Flashpoint immediately alerted the company and helped them complete an internal investigation, work with law enforcement to support the employee’s arrest, prevent the illicit sale, and preserve the company’s intellectual property.