Malware and Analysis
Octopi Labs INK and the Blacklist Collective
INK: Identify – Neutralize – Kill
Join the Black List Collective and access INK, a solution designed to provide IT departments and MSPs with insights into specific attacks on their organization and robust intelligence to protect themselves from attacks seen by others.
IT organizations are currently alone at war fighting battles in the digital wilderness with minimal intelligence, multiple fronts and little to no support. They are attempting to defend against unseen attackers and are sorely outnumbered.
Spear phishing emails are now the most common vector for a cyber-security breach. Users can be trained to not click suspicious links, but with the right message, timing or just sheer quantity of messages it is likely a link or attachment will eventually be opened.
What if there was a way to preemptively analyze the threats your organization faces and shut down bad guys before they can establish a foothold in your network? Now there is…
By leveraging our IT community to help you man the battlements we enable organization to move up the kill chain and cut out the heart of the hydra.
HOW DOES IT WORK?
Octopi INK leverages Blacklist Collective members to crowd source data on attackers. Using our proprietary analysis solution INK leverages small pieces of information collected by members to create a formidable defense against malicious spear phishing attacks through a three-step process
IDENTIFY – Malware is uploaded to the INK portal by members this can be done either manually or automatically. Octopi conducts an analysis of the payload or link and gathers threat intelligence such as IP addresses, characteristics, vectors of attack, command and control infrastructure, as well as the network of related IP addresses and domains being used for the hack.
NEUTRALIZE – A report on defensive measures is provided to the uploader covering what can be done to ensure the network is safe from future attacks.
KILL – Intelligence gathered from discrete encounters is aggregated, analyzed, and disseminated to the collective via IP blacklists, spam filter updates, and other sources. INK updates the collective defenses with new intelligence continuously and blocks attackers at the C2 level. This effectively removes the ability of future spear phishing and C2 centers to continue to operate, regardless of the attack vector. The end result of the INK process is to force cyber criminals to abandon their current attack infrastructure.
As the collective grows, so too does our ability to protect ourselves.
Join the fight.
Identify – Neutralize – Kill
Once you submit your details, our team will be in touch with next steps.