

SERVICES
-
Threat
IntelligenceTI quickly detects various leak information by reviewing and analyzing DDW threat data and protects customers from external threats.
-
Digital Abuse
IntelligenceDI analyzes brand/digital abuse occurring by studying transaction data on digital platforms and detects abnormal transaction users.
-
Virtual Asset
IntelligenceVI with AI-based detection technology, conducts in-depth analysis of virtual asset transactions and monitor illegal transactions.
WE WORK WITH
01 | 00
INTELLIGENCE
@S2W
01 | 00
-
Highlights of the Darkpedia newsletter published in August W1
Deep/dark web weekly highlights about a confidential leak of Swedish automotive company by Lockbit ransomware and a leaked personal information from a Korean chat website on the famous hacking forum
-
S2W published 'Dark Web Language Analysis' paper to the world's prestigious Natural Language Processing (NLP) conference, NAACL
S2W published a paper on dark web language analysis at the 'NAACL 2022' (2022 Annual Conference of the North American Chapter of the Association for Computational Linguistics), the world's prestigious NLP Academy in Seattle.
-
Two Copycats of LockBit Ransomware: SolidBit and CryptOn
The copycat groups that imitate LockBit ransomware’s logo or the chat site was discovered, and they are operating under the names of “SolidBit” and “CryptOn”, respectively.
-
Highlights of the Darkpedia newsletter published in July W4
Deep/dark web weekly highlights about ransomware of Japan's National Institute of Science and Technology (RIKEN) and credential leak of W*****, a famous Korean online game company
-
Evolution of LockBit to 3.0
LockBit ransomware was previously known as ABCD ransomware and belonged to the Maze ransomware cartel, but started independent activity in September 2019 as the Maze gang announced its retirement.
-
变脸, Teng Snake (a.k.a. Code Core)
The “Teng Snake” team has created Telegram channels and group chats from October 2021. At the time, the team consisted of 4 core members and 7 sub-teams, and systematically operated channels and group chats. They claimed that they were APT-C-61, promoted provocatively, operated study teams, and recruited team members.
-
Highlights of the Darkpedia newsletter published in July W3
Deep/dark web weekly highlights about credential leak of users who play StarCraft Remastered and customers of Huawei
-
Carding market “BidenCash” disclosed 7.9 million cards
Dark Web Carding market "BidenCash" sells and promotes roughly 7.9 million card information from all over the world.
-
Raccoon Stealer is Back with a New Version
On March 25, 2022, the operator of Raccoon Stealer, who was active on the dark web forum, temporarily suspended his activities since a key developer died in the Russia-Ukraine War.