Protecting Critical Information From Cyber Attacks
ThreatConnect: Cloud Based + Crowd Enabled
Cyber Squared was founded on the fact that working together with trusted community partners is critical in mounting a predictive cyber-defense. Great potential is possible, however, today the community has inadequate technical solutions to work as a team. Not anymore!
ThreatConnect, Cyber Squared’s flagship product gives clients a tailored, yet affordable, cloud-based or on-premise threat intelligence analysis and sharing platform. Security professionals can now analyze threats and share what they learn with whom they want. Imagine the day when threat intelligence communities are created based on quickly evolving malicious adversary efforts. That day is today with ThreatConnect. Click here to learn more
How Much Risk Can You Afford?
Answer the questions on this page to find out what type of sensitive data your company may be at risk of losing in case of a cyber attack. Click here to read more
Cyber Espionage: Why Act Now?
Some cyber attacks generate a great deal of media attention, but most, don’t make headlines. And in many cases, the organization being victimized does not even know it is happening. Why is this important to you? Click here to read more.
Project Enlightenment, A Modern Cyber Espionage Case Study
The case study covers the 6-month investigation which uncovered over 20 victims internationally across multiple industries, all tied to Chinese strategic interests. Included are two specific victim stories. The first details a Senior Mining Executive whom was targeted, and the second example describes an attack on a Canadian government network.
Download the Case Study
News and Events
April 30, 2013 - Dark Reading: Chinese Cyberespionage: Brazen, Prolific, And Persistent
- The APT1/Comment Crew appears to have done little to change its tactics and methods of attack even after it was unmasked with key intelligence from Mandiant. Cyber Squared last week unveiled new evidence
of the group targeting the defense and aerospace community using many of the same techniques and command-and-control (C&C) capabilities as before.
April 29, 2013 - The Register: Chinese cyber-spook crew back in business, say security watchers
- Cyber Squared has been tracking numerous Chinese cyber espionage threat groups within ThreatConnect.com and crowd-sourcing threat intelligence with nearly 400 global security researchers. All signs suggest that “Comment Crew" and other Chinese APT threat groups are still conducting exploitation operations. In fact, there has been little change detected within "Comment Crew" operations.
April 26, 2013 - USA Today: Cyberspying from North Korean IP addresses spike
- Speaking of which, security start-up Cyber Squared on Thursday reported that the "Comment Crew" also known as "APT1" is back in action. You may recall this spy gang with ties to the Chinese military grabbed headlines a couple of months ago when forensics firm Mandiant released a detailed report of how the gang's day-to-day activities.
to attend Cyber Squared’s Threat Intelligence quarterly update webinar. Spend your lunch hour with our intelligence team on Wednesday, April 17th as they review noteworthy events, case studies, and ThreatConnect updates from the first quarter.
April 13, 2013 - CSO: Targeted social media attacks said to be underreported
- Security company Cyber Squared reported this week how three Chinese political activists in and outside of the country were sent tweets from Twitter that contained links to two compromised websites.
April 10, 2013 - ThreatPost: Rogue Twitter Account Used in Targeted Attacks Against Free Tibet Supporters
- Researchers at Cyber Squared, an Arlington, Va.-based security company, published their findings this week. The links in the tweets, analyst Wes Hurd wrote, led to a Tibet WordPress blog and a Chinese-language forum; both served up Adobe Flash exploits used in the past to attack aerospace companies as well as an online payroll provider.
March 21, 2013 - Alienvault Labs: New Sykipot developments
- Cyber Squared Sykipot research was mentioned in this Alienvault Labs blog post. In the post, Alienvault Labs exposes several campaigns and new versions of the backdoor they have used to access the compromised systems.
March 21, 2013 - The Register: Cyberspies send ZOMBIES to steal DRUGS from medical research firms
- Cyber-espionage crews have been targeting the lucrative medical and life science industries using custom malware and spear-phishing, according to new research. Security intelligence firm Cyber Squared said that at least three distinct groups have targeted the industry for more than two years since 2010.
March 14, 2013 - Dark Reading: Medical Industry Under Attack By Chinese Hackers
- Multiple gangs of Chinese cyberespionage hackers are now targeting the healthcare and medical/life sciences industries. Most every industry is fair game for cyberespionage these days -- so it's no surprise that the healthcare and medical industry would come up on the list -- but, to date, it has been a field more abused by cybercriminals motivated by medical identity theft and other financial fraud.
March 15, 2013 - Tenable Blog: Searching for Custom Malicious File Hashes with Nessus
- Cyber Squared mentioned in Tenable blog on Nessus malicious process detection plugins were recently enhanced to allow for searching with custom file hash lists. This allows organizations to add their own sources of malicious file hashes into Tenable's set of cloud-based hashes and botnet checks.
February 27, 2013 - USA Today: Security tools reveal cyberintruders' trickery
- Cyber Squared, for one, has built openness into its business model. The security start-up recently launched ThreatConnect.com, an online exchange where some 150 security researchers and 45 organizations convene around the clock to share data and brainstorm.
February 27, 2013 - The Register: APT1, that scary cyber-Cold War gang: Not even China's best
- Shanghai hackers APT1 - outed this month in a high-profile report that linked them to the Chinese military - may not be China's top cyber-espionage team despite its moniker. Security experts say the team is more prolific than leet.