Falcon Threat Intelligence Recon Infographic
Falcon Threat Intelligence Recon Infographic
the
Criminal
Underground
DISTRIBUTION
2 N
1 3
TI O
SE
IZ A
RV
I CE
ET
ON
S
Services:
Advanced tools and a network of affiliates help enable
cybercrime and drive the underground economy.
Distribution:
Although methods largely remain the same,
criminal actors are finding novel ways to
bypass security measures.
Monetization:
Ransom payments and data extortion are the
most popular avenues for monetization.
1.
3.
2.
55,000+
unique sites on the deep, dark web
8+ billion
files, posts and messages
500+ million
posts to social media
1+ million
unique data sources
Encrypted messaging apps
Adversary infrastructure
Real-time Integrated
Monitoring Threat
Intelligence
Accelerate incident
investigations
Use
Falcon Intelligence Recon for:
Brand Protection
Monitors fraudulent interactions associated with
the customer’s brand including fake social media
sites and phishing sites
Executive Protection
Monitors threats to ensure the safety of VIPs and
executives, including the identification of fake
accounts and impersonations
Fraud Detection
Detects counterfeit items, fake apps and
intellectual property infringement on social media,
web marketplaces and criminal forums
Supply Chain
Monitors fraud, impersonation and fraudulent
interactions of partners in the customer’s supply
chain