ROBUST & FLEXIBLE
CYBERCRIME INTELLIGENCE INVESTIGATION

DARKBEAST provides incident responders, threat hunters, investigators, and intelligence analysts with a robust technology to dive into the cybercrime underground and investigate through KELA’s cybercrime data lake. Gain visibility into underground operations and stay ahead of attackers, all while maintaining anonymity and abiding by any security restrictions.

REAL-TIME DATA COLLECTION

DARKBEAST automatically and continuously collects information from hard-to-reach, dynamic sources in the cybercrime underground. Real-time information collection ensures that you are always investigating the most up-to-date data. All data is securely stored and made accessible for later reference.

dark web forums icon Cybercrime Forums
illicit markets icon Illicit Marks
instant messaging icon Instant Messaging
paste sites icon Paste Sites
ransomware blog icon Ransomware Blog
compromised database icon Compromised Database

IN-DEPTH RESEARCH CAPABILITIES

DARKBEAST offers user-friendly search functionality with advanced features that empower you to easily research anything in the cybercrime underground. Uncovering the right data for your organization means you can quickly pivot to focus on specific threats, minimise the risk exposure of sensitive data, accelerate incident response and profile threat actors. The only limitation is your imagination.

hacking discussion icon Hacking Discussions
instant messaging icon Instand Messaging
leaked credentials icon Leaked Credentials
breached server icon Breached Servers
compromised accounts icon Compromised Accounts
finished intelligence icon Finished Intelligence

UNIQUE IMAGE ANALYSIS FEATURES

DARKBEAST collects text, images, and other metadata from the sources crawled, and uses a unique image analysis capability to allow users to extract critical intelligence from images. Images are instantly made searchable, ensuring that you will never miss threats hidden behind them.

FEATURED QUERIES & SUBSCRIPTIONS

DARKBEAST allows you to deepen your investigation with pre-defined queries on the latest ransomware attacks, Initial Access Brokers, common vulnerabilities and exposures (CVEs) and other currently trending subjects. Continually be notified on these or any other topics that you want to keep up with, using pre-configured search queries and tailored alerts.

ACCESS TO FINISHED INTELLIGENCE

Finished Intelligence, available through DARKBEAST, ensures that users gain full access to ongoing research and insights developed by KELA’s Cyber Intelligence Center. Browse through DARKBEAST’s Finished Intelligence Feed to gain insights from KELA’s experts about recent ransomware events, network accesses, database leaks, and other cybercrime threats.

COMPLETE ANONYMITY AND SAFETY

DARKBEAST serves as an anonymous proxy so that you can search the cybercrime and other hidden sources without leaving a trace or attracting unwanted attention. Safely access and analyze information stored in the cybercrime underground without breaking any existing security policies.

Looking to automatically identify threats that are specifically targeting your organizations?

Read more about RADARK – KELA’s automated and targeted threat intelligence technology.

Explore RADARK

ILLUMINATE HIDDEN THREATS

The cybercrime underground ecosystem is constantly mutating and evolving. Its most harmful operations are hidden in its darkest corners. KELA penetrates these hard-to-reach corners to automatically collect and analyze this information. KELA’s data lake, the hub where all of this information is securely stored, is the source of all of our intelligence operations. Built with cybercriminal methodologies in mind, KELA’s technologies make all of this information accessible in a number of ways. Based on our customers’ organizational requirements, KELA’s products are each designed with a unique purpose to ensure that most critical intelligence is available to them in the most scalable and accessible way possible.