Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Five Cool TTPs for Autumn
These TTPs have been included in the CouterCraft TTP library and are continually being added to based on findings from open-source Threat Intel and idata from our own in-house deception deployments, investigation and research Read more
-
Cyber CEOs Talk Confluence Server Exploits
The founders of CounterCraft talk about the attacks they are seeing in the wild around the Atlassian Confluence exploit. Watch the video. Read more
-
Real World Cases: Threat Intel to Detect Lateral Movement in the Banking Industry
See the success our clients have found using a deception-powered threat intelligence platform to detect lateral movement within a network. Read more
-
Malicious Docker Images Still Used for Mining Purposes
Malicious docker images are part of the latest technique. Our deception technology has detected evidence of the use of malicious Docker images available at Docker Hub Read more
-
Escaping Docker Privileged Containers for Mining Crypto Currencies
TeamTNT is abusing open Docker daemons and they are using a neat trick to escape from the container and install the crypto miner in the real host. Read about it here. Read more
-
Docker Daemon Worms Are Still Kicking Around
In this post, we focus on ‘Cetus’, a worm that compromises open Docker daemons with two goals: cryptocurrency mining, and to propagate itself. Read on. Read more