Cyber deception is the most effective way to identify threat actors in any organization’s network. CounterCraft delivers actionable threat intelligence across industries.
-
Categories: Threat Intelligence
A Step-by-step BPFDoor Compromise
During the last few days there have been many articles describing BPFDoor, a UNIX backdoor allegedly used by Chinese threat actors. BPFDoor is a smart backdoor that does not need to open additional ports when the attacker wants to connect to the compromised host. It is able to hijack current open ports, sniff the traffic,… Read more
-
What is MITRE Engage and How to Use It | Founder Chat
The founders of CounterCraft talk about MITRE Engage: what it is, what it does, and how to use it strategically. Watch the video now Read more
-
Categories: Company News
Visit Us at V2 SECURITY 2022 and the e-Crime & Cybersecurity Congress Nordics
CounterCraft will be at two events in the Nordics this month, V2 Security and the eCrime and Cybersecurity Congress Nordics Read more
-
Categories: Deception Technology
What We’re Reading
Cybersecurity news in March. Click through to find out what our team of experts was reading and talking about this month Read more
-
Mapping ATT&CK techniques to Engage activities
If you have been following our blog, you already know that we are big fans of the MITRE ATT&CK framework. ATT&CK has become the de-facto framework for describing attacker tactics, techniques and procedures (TTPs). Another MITRE framework that we really love is MITRE Engage, a framework built to describe the different approaches and activities for engaging with adversaries.… Read more
-
Categories: Deception Technology
Stopping Sophisticated Threat Actors: 3 Things You Should Be Doing
Visibility is key to stopping sophisticated threat actors. Here are the three strategic points you should cover to ensure you can detect attackers and protect your network from them. Read more