Hunter Datasheet

Uncover Threat Actors Faster

Accelerate your cyber investigations and delve deeper into the risks threatening your business.

Today’s cybercriminals are more advanced and well funded than ever before. They operate with a level of anonymity, using underground forums, aliases and cryptocurrency to obfuscate their activities and their identities.

This makes the job of the intelligence analyst increasingly difficult, requiring innovative methods of data scouring and collection to uncover intelligence that will move an investigation forward or disrupt an adversary. In order to disrupt threat actors, you need to know who they are.

Hunter datasheet dashboard

Hunter is an intuitive investigations platform that enables investigators to quickly identify malicious activity and attribute that activity to real world identities. With Hunter, investigators are able to analyze data from multiple sources in one location, collate and compare across sources and identify connections and networks of activity.

How It Works

Hunter delivers real-time and historical real identity intelligence to help investigators solve more cases faster by allowing them to discover hidden connections within sources and tools that fuel criminal activity.

Hunter is designed to improve and simplify the job of an Intelligence Analyst to:

  • Bring together data from a range of complimentary sources

  • Provide control of their investigation

  • Enable the visualization of intelligence in a graphical format

Range of Sources

Hunter utilizes data from multiple sources which complement each other, enabling you to more easily find intelligence of relevance to your investigation. Using the Constella Data Lake™ you will have access to over 25 billion breach records as well as search engines, social media, passive DNS, pastebins and dark web data.

HIGHLIGHTS

  • Targeted Analysis

    Start with an indicator and enrich information within the datalake and other sources to begin making connections.

  • Correlated Data

    Correlate across data sources, including passwords, to identify new accounts and data associated with your target.

  • Data Visualization

    Build data visualizations in a graph format to identify links and conduct network analysis.

  • Integrated Automation

    AI-based classifier automatically create profiles based on commonalities in results to help save time on analysis.

Using a simple and intuitive search bar you can search for over 30 different attributes and keywords across multiple sources either individually or one at a time to focus your search.

Hunter datasheet search bar image
  • Link data from different sources and easily move between them.

  • Search the Constella Data Lake™ to access 25+ billion breach records as well as search engines, social media, Passive DNS, Pastebins and dark web data.

  • Conduct a bulk search, identify related searches, view your search history and investigate domain exposure.

Results will be provided by source with the option to “pivot” on them and investigate in more detail, such as identifying accounts using the same password and searching for social media profiles.

Hunter datasheet Visualizations Image

Visualizations

Using the graph workspace, you can visualize intelligence you have identified from within the platform. Easily add information to the graph, change the shape, view metadata and control how your investigation is viewed.

The graph is fully controlled by the analyst, so you can add, delete, move nodes, as well as change the size of the screen for a more focused view of the graph.

KEY FEATURES

  • Unique, Rich Data Sources

    Discover hidden connections and tools that fuel criminal activity.

  • Attribution, Pivot & Enrich Data

    Break down traditional barriers across data silos; Link real identity information to obfuscated identities & malicious activity: solve investigations 3-5x faster.

  • Relationship Graphing & Investigation Management

    Build and collect evidence and submit to LEA / Dept of Treasury; Decrease losses and reduce risk of future attacks.

  • Team Expertise, Seasoned Threat Hunters & Analysts

    Constella is comprised of intelligence community analysts, infosec pioneers, military veterans and tech entrepreneurs with a single mission: empower organizations to know their adversary and disrupt crime.

See Constella in Action