Phishing Infrastructure
Phishing Infrastructure
Hunt offers an independent collection and heuristic analysis of weaponized, not-yet-weaponized and benign websites.
Hunt offers an independent collection and heuristic analysis of weaponized, not-yet-weaponized and benign websites.
Automated phishing site analysis
Automated phishing site analysis
Through analyst written signatures, sites are categorized and broken apart to track threat actors and TTPs. Default pages and takedown pages are measured multiple times to understand the lifecycle of the attack.
Through analyst written signatures, sites are categorized and broken apart to track threat actors and TTPs. Default pages and takedown pages are measured multiple times to understand the lifecycle of the attack.
©2024
Hunt Intelligence, Inc.
©2024
Hunt Intelligence, Inc.
©2024
Hunt Intelligence, Inc.