The Industry's Most Robust Compromised Credentials Data Source

 

"Remarkable high-fidelity data granularity."

 

Cavalier™ is based on forensic technologies and operational knowhow developed at the IDF's 8200 Unit to counter nation-state adversaries and professional threat-actors. It is a unique cybercrime intelligence data source composed of millions of machines compromised in global malware spreading campaigns.

Our high-fidelity data is sourced directly from threat actors and augmented monthly with hundreds of thousands of new compromised machines. Cavalier's™ high-fidelity data protects employees, partners, customers, and digital assets with unprecedented granularity of threat vectors including Ransomware, Business Espionage, Breaches & Network Overtakes.

33,064,596
Compromised Machines
5,019,815
Compromised Employees

Download Resources

Get detailed insights into Cavalier's capabilities with our comprehensive resources.

Brand Protection

Comprehensive protection to your brand from cybercrime threats and compromised credentials.

Data Enrichment

Learn how Cavalier's threat intelligence data can enrich your security operations and investigations.

Data Spans these Sectors:

Cavalier™ Data:

  1. Compromised Employees
  2. Compromised Customers & Users
  3. Compromised Vendors
  4. Compromised Android Users
  5. Compromised Leaked Databases
  6. Compromised CXO's & Family Members

Access Methods:

  1. Web
  2. API
  3. JSON
  4. Email
  5. Custom

Integration Options:

  1. SIEM

  2. SOAR

  3. EDR

Cavalier™ Data Includes:

Cookies

Allows hackers to use existing sessions of victims by importing their cookies and bypass 2fa and other security measurements.

 
IP Address

The IP address of the compromised computer.

 
Infection Date

The date in which the computer was infected.

 
Computer Name

The username of the computer that was infected assists in identifying which computer was infected as sometimes employees share credentials, complicating attribution.

 
AI Infostealer Analysis

Advanced AI-powered analysis of infostealer behavior patterns, attack vectors, and malware family classification to provide deeper insights into the infection methodology.

 
Browsing History Intelligence

Comprehensive analysis of victim's browsing patterns, visited websites, and online behavior that may have led to the compromise or reveals sensitive information.

 
Credentials

URL accessed by the victim, their login credentials and plaintext passwords, are used by hackers to hack into employee and user accounts. The credentials are retrieved directly from the browsers of the victims and are therefore almost always valid.

 
Malware Path

The path on the computer in which the infostealer malware was installed on.

 
Operating System

Which operating system was installed on the infected computer.

 
Installed Anti-Viruses

A list of the anti-viruses running on the computer at the time of the infection.

 
Infection Cause Analysis

Detailed forensic analysis identifying the root cause of infection, including entry points, vulnerable applications, and attack chain reconstruction.

 
Files

Sensitive files that were stolen from the computer at the time of the infection, including documents, credentials, and other critical data.