Cyber Investigation Services | Uncover Threat Actors Faster

Accelerate your cyber investigations and delve deeper into the risks threatening your business. Identify real world identities behind critical threats across multiple data sources, spotting connections and identifying networks of activity. Unmask threat actors faster.

Read how leading cyber investigative journalist Brian Krebs used Constella’s Hunter platform to fight against cybercrime:
Constella’s Role in Fighting Cybercrime: Supporting Investigative Journalism and Law Enforcement


Simple, targeted threat analysis and search

Empower users to simply start with an attribute search and pivot, enriching information, making correlations across data sources and collating intelligence in one place. Search multiple attributes at once with our bulk search feature.


Comprehensive, intuitive visualizations

Visualize collected data in a dedicated, controlled workspace to easily identify links and conduct network analysis for a complete investigative picture—incorporating multiple sources and manual entries, downloading, saving and uploading, as needed.


Automated data correlations and target packs

Save time and resources by producing actor summaries through automated breach data correlations, and build comprehensive profiles by recording targeted intelligence in dedicated target areas.


Fluid investigation management

Create multiple investigations and share with colleagues for collaborative working—building case-specific results, graphs, target packs, notes—archiving for future access or auditing—and deleting when no longer needed.

"With Hunter, we uncovered the real identity of a bad actor that led us to a criminal group selling credentials from our financial institution in a matter of hours, saving us +$100M from identifying fraudulent credit cards.”
Top 5 Global Bank

Password pivoting

Improve real identification by identifying additional accounts using passwords collected from breaches

Malicious scores

Use ML-produced scoring of entities associated with malicious breaches to gain context into how malicious search terms might be

Total privacy

Completely protect searches from outside detection using our proprietary encryption methods—not even our teams can view which searches are conducted


Configure the platform to provide proxies to obfuscate your investigations, and use strong audit capabilities to monitor what searches are conducted