Based on malware listed on dark web file-sharing sites, market places, and more, you can now automate your malware research and IOCs blacklisting. Data received includes the Virustotal link that appeared on a dark web site that shows undetected malware, malware available for download from file-sharing sites, as well as the hash attributed to the malware that was discovered on the dark and deep web. Users will also receive essential context, including the post title, threat actor, source and more. The use of Cybersixgill’s data is subject to the terms of the following EULA
https://secureaccess.cybersixgill.com/auth/resources/9juj5/login/keycloak-sixgill/docs/EULA-with-API-reference.pdf
Sample Tables:
A table that consists of Virustotal links that appeared on a dark web site to show undetected malware, malware available for download from file-sharing sites
Hash attributed to malware that was discovered in the dark and deep web
Fields Included:
-created
-description
-external_reference
-id
-labels
-lang
-modified
-pattern
-sixgill_actor
-sixgill_confidence
-sixgill_feedid
-sixgill_feedname
-sixgill_post_virustotallink
-sixgill_postid
-sixgill_posttitle
-sixgill_severity
-sixgill_source
-valid_from
-stix
Disclaimer - As Cybersixgill product consists of publicly available information from the deep and the darkweb, we provide a confidence score, see sixgill_cofidence field.