Bad Packets® Cyber Threat Intelligence
The cybersecurity landscape is constantly evolving as emerging threats continue to target enterprise networks, internet of things (IoT) devices, and cloud computing environments. Monitoring and identifying these threats is a critical task to mitigate the damage done by threat actors.
We detect active botnets, including variants of Mirai malware, that are scanning the internet and engaging in malicious activity. We locate command-and-control (C2) servers and report them to the affected network providers, CERT teams, and law enforcement agencies. IoT devices infected with malware are typically used for conducting DDoS attacks – making it an important task to locate and remediate compromised hosts quickly.
We provide curated threat intelligence data feeds for malicious activity targeting:
- Consumer routers/modems
- Embedded systems
- IP cameras
Content Management Systems
Distributed computing platforms
Microsoft Windows endpoints
- BlueKeep CVE-2019-0708 scans
- EternalBlue exploits
Enterprise-grade VPN servers
Our enterprise dataset is tagged with the targeted device/service, vulnerability exploited, and the location of malware payload (binaries) used by threat actors. Our feeds are continuously updated with indicators of compromise (IOCs) as new threats are detected. New unique Mirai-like botnet detections are added to mirai.badpackets.net hourly. Paid plans provide faster update intervals and include technical support.
Visit our pricing page to learn more about our threat intelligence offerings.