Complete the form below to get started with CRINTEL LITE Today
Your Privacy is protected.
Protect Your Brand
Protect Your Customers
Protect Your Cashflow
Cyber Threat Intelligence is the process of searching for and keeping track of personal information found on a portion of the internet not accessible via normal means - the dark web.
Hackers leverage the dark web to create multiple ecosystems where they can buy and sell credentials - contact information: name, emails, phone, credit cards, etc.
Even the best cyber security defences can easily be breached. How? By 'Trusted' staff, client and supplier emails. Which is why businesses small and large should invest in cyber intelligence solutions.
What is the Dark Web?
The dark web is made up of sites that are not indexed by search engines and are only accessible through specialty networks such as The Onion Router (ToR). Often, the dark web is used by website operators who want to remain anonymous. The ‘Dark Web’ is a subset of the ‘Deep Web’.
The first step towards protecting your business reputation is knowing who's targeting you.
CRINTEL - Cyber Risk Intelligence provides SMEs with real-time, human vetted Cyber Threat Intelligence that enhances your existing cybersecurity initiatives. Our membership is available to strengthen and support your existing cybersecurity initiatives.
We work as a co-managed solution to support and provide your internal team and external IT cyber security advisors with 24/7 live monitoring of the dark web.
How do we work with your team?
We monitor your business domain, email addresses and key suppliers - looking for exposed credentials that we can find about your business and suppliers - that are up for sale on the dark web. Unlike some other security providers who rely on old outdated static data, that has been collected over time to search for credentials - essentially they use old lists.
Our enterprise-level cyber intelligence systems, supported by human operatives, collect live dynamic data that is scanned or sourced from live dark web forums leveraging multiple sources in real-time 24/7, 365 days per year.
Any exposure found on the dark web is then verified by real humans. We then alert you if your information is compromised - to allow you to take the appropriate action to protect any accounts compromised in a breach. For example, change your password, notify your team, suppliers or clients.
This is key for all businesses to reduce the risk of potential wild data intrusion and ransomware attacks.
As human error (internal team, suppliers and clients) is the number 1 cause of cyberattacks, a live 24/7 Cyber Intelligence solution must be in place - regardless of your business size to support your present cybersecurity initiatives.
Most importantly. You can be assured of CRINTEL's absolute discretion, and confidentiality will be observed at all times.
We monitor your email addresses, plus those of your key suppliers 24/7.
All compromised credentials found are sent for human vetting and provided a risk rating.
We alert you any time a monitored address is identifed as breached.
The dark web is made up of sites that are not indexed by search engines and are only accessible through specialty networks such as The Onion Router (ToR). Often, the dark web is used by cyber criminals who want to remain anonymous. The ‘Dark Web’ is a subset of the ‘Deep Web’.
By using phishing or spear phishing techniques a bad actor or hacker from the wild (outside your security perimeter), may compromise your staff or suppliers credentials. Using this covert access method the cyber-criminal can then easily infiltrate your perimeter via trusted emails, to insert unknown wild data. When wild data enters your perimeter defences via a trusted staff member or suppliers email it takes longer to detect, and is more likely to succeed in its malicious intent.
Phishing is the fraudulent attempt by dark web hackers to obtain sensitive information or data, such as usernames, passwords, credit card numbers, or other sensitive details by impersonating oneself as a trustworthy entity in a digital communication. Hackers typically use methods including email spoofing, instant messaging, and text messaging. A phishing attack often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site.
Spear-phishing is a targeted attempt by hackers to steal sensitive information such as account credentials or financial information from a specific victim - CEO, Business Owner, High Net-Worth Individuals - for company data access, financial gain or malicious reasons. This is the most successful form of acquiring confidential information on the internet, accounting for 91% of attacks.
For the purposes of exploitation, a cybercriminal will sell your ID credentials for a value based on the following four criteria:
1. PERSONAL STATUS - Are you a server gatekeeper, low-level or senior staff member?
In ‘bad actor’ hacker speak are you a ‘Whale’ - that is, a director, business owner, or Executive VIP within a business.
2. TARGET VALUE – Is your workplace a lucrative target for inserting ‘wild data®’ inside your security perimeter. This may be for immediate data extraction purposes or as a back door sleeper code for future infiltration. Data extracted is saleable for fullz lists and future ransoms. eg Non-Profit Organisations, Accountants, Lawyers and Service-Based businesses are well-proven as vulnerable and valued targets
3. RANSOM POTENTIAL - Is the business a ransom prospect using ‘off the shelf’ automated ransomware providing at arm’s length, fast and untraceable cryptocurrency returns.
4. FULLZ STATUS - What personal information is currently attached to your fullz eg full name including middle name, date of birth, email address, password (cracked or hashed), credit card details, credit report, workplace name, workplace email domain, position in the business.
Once your compromised ID credentials are published on the Dark Web you become considered as a ‘soft’ target and a commodity for sale - You end up on what is commonly referred to as a ‘Fullz’.
To increase your sale value more information about you is researched by cybercriminals and added. At various stages of completion, your fullz (personal information data file) is resold as part of a fullz List to the highest bidder. Either as an “Exclusive List” or to multiple buyers. Different versions of your fullz will be resold again and again over time.
The actual infiltration breach of your workplace using the fullz may occur well after the first signs of your initial compromised credentials become available for sale. This is where CRINTEL - Cyber Risk Intelligence can in many cases provide early detection which will make a difference to the outcome by helping you and your workplace, avoid or mitigate losses.
The incentive for a cybercriminal is significant.
Step 1. Infiltration - The first step is for a ‘bad actor’ to purchase and use a good fullz from the Dark Web, to identify an easy way to break into your workplace system. This may take an hour or less spread over a day or two.
Step 2. Ransom Notification - Using an automated ransomware system, a ransom attack is made on your workplace systems. This step can take less than 5 minutes of data entry work to encrypt your files and deny access with a pop-up surprise message.
Step 3. Ransom Payment - Most effective ransomware systems are designed to be target friendly, providing help files and Chat Support to assist with your payment of the ransom in Bitcoin and how to use the released key to decrypt your files. This will reward a cybercriminal, with a ransom amount generally anywhere from $20,000 to $200,000.
Suppliers of ransomware usually partner with cybercriminals and retain a percentage of the take in return for use of their ransomware. To encourage payment of ransoms, it is in the interests of the actors to allow the return of all files in good order.
But unfortunately, in reality, the decryption does not always work seamlessly and files are often lost. Once you pay, you are tagged as a reliable ransom payer and chances are very high that you will be breached again.
Usually prior to the ransom request being made, a backdoor sleeper code has already been inserted to allow for faster re-entry. To confuse your IT consultant tasked with securing your system, often multiple instances are inserted with some playing a sacrificial role to ‘trick’ the consultant into thinking he has found all the backdoor sleeper codes.
It is worthwhile and recommended to use an experienced ransomware expert for all aspects of the ransom process to best protect your interests. CRINTEL - Cyber Risk Intelligence can suggest specialist consultants for you if the need arises.
Dark web monitoring is the process of searching for and keeping track of personal information found on a portion of the internet not accessible via normal means - the dark web. There are many forms of Dark Web Monitoring. Some companies use old outdated static data that has been collected over previous years to search for credentials. At Cyber Risk Intelligence, we use live dynamic data that is collected and scanned in real time 24/7, 365 days per year.
Even the best cyber security defences can easily be breached by 'Trusted' staff, client and supplier emails. Early Dark Web detection of compromised credentials is the new prevention. CRINTEL - Cyber Risk Intelligence deploys a double check approach to cyber security. We work as a co-managed solution to support your internal team and external IT security advisors to provide you with 24/7 live monitoring of the dark web. Our enterprise-level dark web monitoring solutions are best in class and we have three subscription models our members can choose from.
Since partnering with CRINTEL's dark web monitoring solution we have been alerted of 42 cyber threats. We have so much more confidence in our cyber security initiatives now.
We were looking for a way to protect our data and those of our members. CRINTEL has helped us do just that. We get alerts anytime they find our email credentials on the dark web.
Our business has grown. CRINTEL alerts us anytime they identify we are exposed to the dark web. They also help train our team - reducing the risk of additional exposure.
CRINTEL - Cyber Risk Intelligence specialise in providing Cyber Threat Intelligence and Dark Web monitoring solutions for key markets across the SME landscape including - Non-Profit Organisations, Law Firms, Accountants, and Service-Based SME's. We work as a co-managed solution to support your internal team and external IT security advisors to provide you with actionable threat intelligence via 24/7 live monitoring of the dark web. Our fully managed services are available for Members only, on a cost-effective subscription basis, to strengthen and support existing cyber security initiatives.
CEO, Managing Director
John is an experienced, successful and well-known marketing specialist.
Passionate about Cyber Security solutions, John drives the strategy behind Cyber Risk Intelligence, ensuring we help our key markets across the SME landscape including - Nonprofit Organisations, Law Firms, Accountants, and Service-Based SME's to bolster their defences against dark web hackers.
A noted and highly regarded speaker at Australian and International conferences, John has the experience to ensure our Members receive the level of support they require.
Founder, Director Strategic Intelligence
As an experienced senior technology executive, Roger has 25+ years of practical hands-on cybersecurity knowledge. He is one of the few pioneers of secured eCommerce for the pre-browser internet. Exercising proactive security practices since 1994 along with innovative concepts has played a big role in his success.
As a cybersecurity and cyber intelligence veteran, Roger's global intelligence connections, coupled with his knowledge and experience, has driven his focus towards providing cost-effective cyber risk intelligence support, for Nonprofit Organisations, Law Firms, Accountants, and Service-Based SME's.
Director, Finance and Administration
Tim manages the administration side of Cyber Risk Intelligence. Tim brings over 25 years of accounting, taxation and commercial experience.
With a wealth of experience across a diverse range of commercial fields, Tim has specialist skills in facilitating complex business transactions (that is, sales/purchases/business mergers) as well as client engagements in the leadership/planning / strategic direction and vision space.
Tim is a Chartered Accountant and has an Accounting Degree from the University of Queensland.
Even the best cyber security defences can easily be breached by 'Trusted' staff, client and supplier emails. CRINTEL provides early advanced cyber threat intelligence via the detection of compromised credentials. Get started today with 24/7 Live Protection on the Dark Web with CRINTEL.