Uncover Threat Actors Faster
Accelerate your cyber investigations and delve deeper into the risks threatening your business.
Today’s cybercriminals are more advanced and well funded than ever before. They operate with a level of anonymity, using underground forums, aliases and cryptocurrency to obfuscate their activities and their identities.
This makes the job of the intelligence analyst increasingly difficult, requiring innovative methods of data scouring and collection to uncover intelligence that will move an investigation forward or disrupt an adversary. In order to disrupt threat actors, you need to know who they are.
Hunter is an intuitive investigations platform that enables investigators to quickly identify malicious activity and attribute that activity to real world identities. With Hunter, investigators are able to analyze data from multiple sources in one location, collate and compare across sources and identify connections and networks of activity.
How It Works
Hunter delivers real-time and historical real identity intelligence to help investigators solve more cases faster by allowing them to discover hidden connections within sources and tools that fuel criminal activity.
Hunter is designed to improve and simplify the job of an Intelligence Analyst to:
Range of Sources
Hunter utilizes data from multiple sources which complement each other, enabling you to more easily find intelligence of relevance to your investigation. Using the Constella Data Lake™ you will have access to over 25 billion breach records as well as search engines, social media, passive DNS, pastebins and dark web data.
Using a simple and intuitive search bar you can search for over 30 different attributes and keywords across multiple sources either individually or one at a time to focus your search.
Results will be provided by source with the option to “pivot” on them and investigate in more detail, such as identifying accounts using the same password and searching for social media profiles.
Using the graph workspace, you can visualize intelligence you have identified from within the platform. Easily add information to the graph, change the shape, view metadata and control how your investigation is viewed.
The graph is fully controlled by the analyst, so you can add, delete, move nodes, as well as change the size of the screen for a more focused view of the graph.