FNA Group

Analytical Review of Cyber Threat Intelligence Concerns (ARCTIC)

Weekly report that identifies and analyzes a set of developments or emerging cybersecurity threats to individuals and organizations, including financial institutions and banks. Also included in this briefing is information about threats identified from dark web and clear web sources, including ransomware, hacking groups, and public drop bin sites. 

Cyber Risk Assessment (CYRA)

The Cyber Risk Assessment (CYRA). The CYRA is conducted by gathering official and unofficial data, such as cybercrime data and cyber attacks originating from and threatening a specific country, released for each country along with other reliable sources of information, using a combination of local and national data. The data is then added into our Cyber Risk Assessment algorithm in order to generate a Risk score on a scale of 1 to 5. 

Dark Web/Cyber Threat Monitoring

A team of cybersecurity experts maintains coverage of dark and deep web platforms for potential threats to clients and their sectors. Included in the coverage is identification of vendors on illegal marketplaces selling stolen data and monitoring of encrypted platforms.

Black Mirror Assessment (BMA)

A Black Mirror Assessment (BMA) is an intelligence analysis report that evaluates an individual’s or entity’s online exposure, data vulnerabilities, and potential risks. 

It typically involves: 

 

  1. Open-Source Intelligence (OSINT) – Collecting publicly available information such as social media profiles, professional records, and public databases. 
  2. Dark Web Analysis – Searching for compromised personal data (e.g., leaked emails, breached accounts) on dark web forums and hacker databases. 
  3. Risk Assessment – Identifying potential security risks, such as exposure of personal details, past data breaches, and cyber threats. 
  4. Recommendations – Providing strategies to mitigate risks, such as enhancing privacy settings and improving cybersecurity measures. 

 

The goal of a BMA is to assess digital vulnerabilities that could be exploited by malicious actors, ensuring better privacy and security. 

Reputation Shield Service (RSS)

It is a comprehensive social media scrutiny service tailored for high-profile individuals. It meticulously monitors their social media history, flags potentially risky content, and offers personalized advice for strategic deletion. With confidentiality and discretion as priorities, RSS provides peace of mind, allowing clients to navigate the digital landscape confidently. 

POI/GOI Investigations

Enhanced Background Check (EBCs) Investigations into persons of interest (POIs) or groups of interest (GOIs) that may pose a threat to the client, its assets, and personnel. Enhanced Background Checks – investigations for select POIs, i.e., new hires or applicants.

Database Acquisitions

Acquisition and evaluation of leaked and stolen databases based on predetermined criteria for PII, client-specific information, or sector requirements. The acquisition of databases can be made through various sources, including the Deep and Dark Web, threat actor offerings, cyber forums, and other available offerings. 

Vulnerability Monitoring

Vulnerability monitoring involves the identification of IoT devices accessible on the web, their exposure, and potential risk, allowing clients to understand and address potential vulnerabilities and gaps. Also included is the identification of look-alike sites and domains 

Deep Web System

Deep Web system offers 24/7 monitoring of the dark web and cyber threat actors inaccessible by other systems, with the integration of our Tiger Team analysts to bypass communication and dark web infrastructure limitations. It presents an ever-expanding knowledge base of the ever-changing landscape of the Deep Web, customized to address specific client needs and requirements. 

Geolocation Investigation

Our geolocation investigation utilizes location intelligence datasets in order to gain insights into the behaviour of cities and individuals, which gives the ability to assess, identify, and evaluate potential incidents and threats, or to gain further insight into past incidents and threats in a proactive and reactive threat identification view. These investigative processes can support several key use-cases: 

  • Identification of mobile movement while cross-referencing with known clear web information of threat actors. 
  • Post-incident identification of threat actors based on geolocation and time frame. 
  • Cross-referencing devices in the vicinity of an asset to identify potentially impactful activity. 
Financial Lead Creation

The Financial Lead Creation process involves generating and assessing lead activity every month. 

Some evaluations combine raw UCC (Uniform Commercial Code) records with other assessment methods or measure lead responsiveness. These insights help identify potential leads by analyzing both financial data and database activity to uncover high-value opportunities. 

Raw UCC (Uniform Commercial Code) Records

In each pre-designated period, batches of raw UCC records are collected and processed without any additional evaluations or assessments. These unfiltered records act as a base resource for further analysis, segmentation, or lead generation, but can also be acquired with no additional actions. 

Lead Communication Analysis

Data analysis is performed on communications and their outcomes to identify success rates, message connections, communication volume, duration, and timing. This analysis provides insights into engagement patterns, effectiveness, and potential optimization strategies for improved outreach. 

Reverse UCC Record Collection & Filtering

A reverse collection of UCC records is conducted based on UCC filing activity, allowing for the grouping of individuals or businesses according to specific criteria such as region, age, gender, and role. This approach enables targeted segmentation for deeper insights and strategic lead generation.

Financial and Database Lead Creation

Potential leads are generated based on financial and database activity, assessing patterns and engagement effectiveness. This approach ensures a more strategic and data-driven lead creation process, optimizing outreach efforts.

Big Data Investigations

The Problem

Our big data investigations assist in investigating and analytically working with vast amounts of data. These investigations identify bottom-line and actionable intelligence across a variety of data types, from leaked credentials and databases to industry-specific data variations, such as geo-analytical data, which assists in creating actionable intelligence. 

The Solution

A data-driven, knowledge-based approach provides insight into complex datasets that obscure hidden narratives, threats, and risks. The combination of actionable knowledge across various landscapes and environments, along with an advanced understanding of technology and unique toolsets, helps to exceed limitations and minimize risks. 

The Result

Our big data investigations ensure you receive the actionable intelligence required through the collection, acquisition, and investigation of complex datasets.