Partner Datasheet

Partner Data Sheet: Ciphertrace

<h2 class="text-center">Anomali and CipherTrace: Cryptocurrency Threat Intelligence</h2> <p>Detect, investigate, and respond to crypto-threats with CipherTrace Sentry and Anomali ThreatStream</p> <h3>CipherTrace and Anomali Joint Solution Features</h3> <ul> <li>Deep Blockchain Insights: CipherTrace Sentry Enrichment for Anomali ThreatStream provides powerful and easy-to-use cryptocurrency de- anonymization and tracing to increase crypto-threat visibility, detection, and response and enhance investigations.</li> <li>Credible Transaction Attribution: With CipherTrace Sentry, Anomali users can leverage CipherTrace’s industry-leading attribution to de-anonymize crypto- addresses and associate them with real-world entities and events, such as criminals, dark markets, ransomware events, terrorist funding, crypto- exchanges and ATMs, and more.</li> </ul> <h3>Immediate Time-to-Value</h3> <ul> <li>Matches Crypto Addresses with IP Addresses: Using the CipherTrace enrichment for Anomali ThreatStream, users can view all the crypto addresses associated with an IP Address of interest, along with their associated owners and events.</li> <li>Investigate Ransomware Payments: Detailed blockchain analytics and cryptocurrency intelligence data to track cryptocurrency payments made to hackers.</li> <li>Comprehensive Tracing of Transactions: Users can easily trace a given address’s input and output transactions via the Anomali ThreatStream user interface.</li> </ul> <h2>Boost Anomali With Superior Crypto-Intelligence</h2> <p>The CipherTrace Sentry integration allows users to work with a vast array of data to enable detailed analysis, without leaving the Anomali ThreatStream platform. CipherTrace does this through a variety of techniques, including running transactions on 1,000 crypto-exchanges. CipherTrace analysts add over 1.5 million attribution datapoints each week.</p> <div class="row"> <div class="col-md-4"> <h4>Detailed Blockchain Analytics and Cryptocurrency Intelligence</h4> <p>Provides an end-to-end audit trail of transactions. With the information, users can distill “big data” into a view of the cryptocurrency risk landscape.</p> </div> <div class="col-md-4"> <h4>Actionable Intelligence for Evidentiary Proceedings & Regulatory Compliance</h4> <p>Trace crypto transactions to ensure compliance with Anti-Money Laundering Regulations.</p> </div> <div class="col-md-4"> <h4>Real-Time, Accurate Risk Reporting</h4> <p>Discover locations and IP Addresses associated with cryptocurrency transactions as they occur so users can respond immediately to threats.</p> </div> </div> <h2><strong>Use Case:</strong> Detecting and Investigating Cryptocurrency Threats</h2> <h3>Target Market:</h3> <p>Leading Financial Institutions and Law Enforcement agencies</p> <h3>Challenge:</h3> <p>The need to identify crypto-activity associated with clients and insider transactions in order to:</p> <ul> <li>Thoroughly understand threats and suspicious activities</li> <li>Perform investigations</li> <li>Execute targeted due diligence activities</li> </ul> <h3>Solution:</h3> <p>CipherTrace and Anomali connected and investigated crypto-addresses, IP addresses, and funds flows, along with their relationships to entities and events of interest.</p> <p>With CipherTrace and Anomali, the security team was able to:</p> <ul> <li>Improve threat hunting by exposing hidden crypto-activity in corporate networks</li> <li>Perform extended due diligence on client activities related to cryptocurrency</li> <li>Assist clients and internal constituents with enhanced investigations into ransomware and malware incidents, dark market activities, and other crypto-related situations</li> <li>Access and correlate crypto-intelligence data for investigations right from the Anomali dashboard</li> </ul> <h3>Customer Benefit:</h3> <ul> <li>Detailed, accurate, graphical reports that can be used as evidence in legal proceedings</li> <li>Better business decision-making: increased time-to-insight for internal investigations</li> <li>Single dashboard view: provides visibility into previously hidden crypto-activities</li> <li>Collate data from multiple sources: Combines crypto-data with other information sources for deeper insights</li> </ul> <h2>Benefits:</h2> <h3>Identify Threats</h3> <p>Identify crypto-activity associated with internal and external IP addresses of interest.</p> <h3>Follow the Money</h3> <p>Trace crypto address transactions via the ThreatStream user interface to follow the money in ransomware, theft, and other investigations and find source and destination of funds.</p> <p>Extend Anomali threat intelligence with seamless integration of real-time contextual crypto-ownership and movement-of-funds data tied to IP addresses and real-world events.</p>