Protect your calm & finance
00days
00hours
00minutes
00second
Protected during ICO
$319 603 020* 10% of all ICO funds since Q3 2017

Our clients

Sep` 17
$30 mln

Blackmoon Crypto successfully secured $30,000,000 in ICO with a comprehensive cyber risk management program and phishing protection from Group-IB.

Oct` 17
$8 mln

Tokenbox is placing a major emphasis on the system’s security and is working with Group‑IB.

Nov` 17
$77 mln

BANKEX is under protection of Group‑IB, during this cooperation Group‑IB protected $77,000,000 in ICO.

Jan` 18
$1,2 bln(сoin market cap)

Group‑IB helped WAVES to protect waves holders from active phishing scam on social networks.

Biggest cryptocurrency hacks and thefts

10% of ICO`s fundsey.com

Was lost in 2017. That means that $225 million was stolen by criminals
 

980,000 BTCreuters.com

Over $10 billion worth of bitcoins have been stolen from exchanges since 2011

Fight against phishing, scam and fakes

24/7 monitoring of 3,000,000+ resources to prevent online brand abuse: phishing and fraudulent websites, social media and messengers, ad networks, mobile app stores, the dark web.

Learn more

Educate your team

Intensive training for your team covering all vectors, followed by social engineering simulation. A clear security checklist, along with do’s and don’ts for accounts, networks and devices usage, as well as recommendations related to cryptocurrencies.

Learn more

Detect threats in your network

Detect malicious incidents in your internal network to prevent intrusions, attacks, data leaks, and espionage.

Learn more

Conduct IT-audit

Get a comprehensive vulnerability analysis and recommendations for protection. We typically audit the smart contract, project infrastructure, web and mobile applications.

Learn more

Monitor leaks

24/7 identification of compromised data, along with information on when, where and how it has been exposed. Stolen data may include your team’s account credentials.

Learn more

Identify risks for key persons

We simulate actions of intruders in order to find weak spots of key persons and provide recommendations on how to enhance security. Deep analysis of an individual’s background helps to protect against information attacks.

Learn more

Keep your team on alert

We continuously simulate targeted attacks on your company using advanced tactics, techniques, and procedures (TTPs) from hackers’ arsenals.

Learn more

Identify user and prevent fraud

Authentication of legitimate users with precision close to that of fingerprint recognition, clientless detection of remote access and malicious activity on a user’s device.

Learn more

Protect home networks

We use miniTDS, solution based on Group‑IB Threat Detection System, to protect the home network of key persons. Our technologies protect your network 24/7 against intrusions, attacks, data leaks, and espionage.

Learn more
+ Prevent of Dos/DDoS attacks and load testingProtect me

EY and Group‑IB joint research

Big risks in ICO market: flawed token valuations, unclear regulations, heightened hacker attention and congested networks

Get the research
Get the research

Ready to get started?

You can request price, learn about personalized protection solutions or get in touch if you have any questions
Moscow+7 495 984-33-64crypto@group-ib.ru
London+44 2036085907crypto@group-ib.com

EY and Group-IB joint research: initial coin offerings (ICOs).

Thank you for your interest in our research. Please fill in the form below and we will send you the Group‑IB report. Please make sure to correctly fill in all fields, we will only provide materials on provision of a valid
corporate email address.

 

Thank you! You’ll receive EY report shortly. Have you any questions, please contact us via crypto@Group‑IB.com.

Contact us to get more information about threats targeting your project

 

Thank you for the inquiry! We will contact you soon.

Fight against phishing, scam and fakes


24/7 monitoring of 3,000,000+ resources to prevent online brand abuse: phishing and fraudulent websites, social media and messengers, ad networks, mobile app stores, the dark web.

Based on unique threat intelligence data and extensive experience in IT incident response. CERT-GIB (Group-IB’s Computer Emergency Response Team)

An incident response team, comprised of top-level experts in combating cyber crime.

Runs Group-IB’s online portal antiphishing.ru, which serves as a hotline to collect information about malicious activities on the Internet.

Collaborates with the Coordination Center of TDL RU (administrator of Top National Domains of .ru, .рф, and .su), that enables CERT-GIB to block dangerous websites in the above domains.

Collaborates with other security and incident response companies and international anti‑cybercrime associations, striving to ensure safety on the Internet around the world.


Educate your team


Intensive training for your team covering all vectors, followed by social engineering simulation. A clear security checklist, along with do’s and don’ts for accounts, networks and devices usage, as well as recommendations related to cryptocurrencies.

Humans are the weakest link in the corporate security system. This intensive course is designed to raise awareness of digital hygiene and security rules for your team and top management.

Our cybersecurity training covers the following topics:
  • Email and phishing
  • Messengers
  • File transfer and reception via file sharing and flash drives
  • Cybersecurity of personal computers
  • Mobile devices
  • Rules of using web services
  • Secure negotiations
  • Data encryption
  • Rules of social media behavior

Training results are reinforced with simulated phishing attacks and post-assessments to ensure that your employees won’t fall a victim to increasingly sophisticated phishing attempts.

Detect threats in your network


Detect malicious incidents in your internal network to prevent intrusions, attacks, data leaks, and espionage.

The efficiency of Threat Detection System is approved by large global financial institutions and critical infrastructure.

Group-IB TDS (Threat Detection System) is an intrusion detection and prevention tool to protect your network. It is a unique product by Group-IB, born out of our incident response expertise, skills in detecting malware and threat intelligence foundation.

Intrusion detection with immediate notifications on all relevant malware families

Identification of infected devices in your organization’s wireless networks

Incident response with manual review of critical incidents by Group-IB experts

Top-tier usability and reporting features on detected threat

Automated daily updates of filter rules and signatures

24/7 support through IT ticketing system

Conduct IT-audit


Get a comprehensive vulnerability analysis and recommendations for protection.

We typically audit the smart contract, project infrastructure, web and mobile applications.

14 years

years of audit experience

86%

of web resources requiring login identification contain at least one critical vulnerability

193 days

it takes averagely to eliminate a vulnerability

1 hour

or less is needed for a criminal to steal information and money

Solid experience

Our company’s experts are involved in more than 80% of high-profile investigations in the field of high-tech cybercrimes. Group-IB auditors learn about threats targeting our clients at first hand.

We understand which vulnerabilities criminals exploit and which tools they use to compromise systems and remove any traces of their activity. This enables us to create threat models with the most realistic parameters.

Cyber intelligence analysis provided by Group-IB’s Intelligence system informs us on new tools and methods of intrusion, fraud, and espionage.

Group-IB’s Computer forensics laboratory analysts provide us with information on the most advanced malware targeting our clients.

By regularly investigating the most recent and advanced incidents we are able to carefully estimate the removal and response speeds of your security service, developers and web administration.

Monitor leaks


24/7 identification of compromised data, along with information on when, where and how it has been exposed. Stolen data may include your team’s account credentials.

Group-IB Threat Intelligence is recognized by top industry researchers (IDC, Gartner, Forrester)

Group-IB has been pioneering incident response and cybercrime investigation practices in Russia since 2003. This experience and understanding of threat actors’ behaviours have evolved from our own investigation tool to intelligence gathering network which now feeds Group-IB Threat Intelligence.


Finished threat intelligence with advanced RFI service
Sources

Human intelligence - incident response, investigations, cybercriminal communication interception

Malware intelligence - network sensors & sandboxing, honeypots, sinkholing, spam traps

Data intelligence - C&C forensics, malware ATS, card shops, compromised data checkers, phishing collection points

Open sources - URL sharing, public sandboxes, blogs and reports, social media, proxy and VPN services

Technologies

Patented algorithms and machine learning for rapid data correlation

Proprietary phishing detection & phishing kit extraction technology

50+ ISP-level network sensors and honeypot network

Automated malware config extraction

Compromised data search and extraction tools

Internet fingerprinting

Machine learning detection engines

Identify risks for key persons


We simulate actions of intruders in order to find weak spots of key persons and provide recommendations on how to enhance security. Deep analysis of an individual’s background helps to protect against information attacks.

Based on 14+ years of incident response and investigations

1000+

successful incident investigations in Russia and Europe

80%

of all high-profile investigation cases in the field of high-tech crime in Russia are supported by Group-IB experts

$110 mln

was returned to a client company as the result of our investigation

1st

DDoS attack investigation in Russia was conducted by Group-IB specialists in 2009

Group-IB is an official Interpol and Europol partner, fighting cybercrime on a global scale

Keep your team on alert


We continuously simulate targeted attacks on your company using advanced tactics, techniques, and procedures (TTPs) from hackers’ arsenals

Full-scale attacks with your security team involved that are designed to answer the following questions:

Are your systems prepared to prevent, detect and respond to real-world incidents?

How does your security team deal with a targeted attack?

How should your approach to security be changed to improve company's defensive capabilities against cyber-attacks?

The term "Red Teaming" comes from the military practice of having a portion of the team during war games play the role of the enemy (the "Red Team") as opposed to the friendly forces (the "Blue Team")

Red Teaming is not limited by time. Our dedicated Red Team, constantly testing to ensure security systems are working optimally, closely mimics a real attacker who can prepare for attacks trying various tools and vectors for months

You will get:

Summary for senior-level management

Technical details with our findings and expert recommendations for improvement of your systems' security

Emergency notifications of critical vulnerabilities

Identify user and prevent fraud


Аuthentication of legitimate users with precision close to that of fingerprint recognition, clientless detection of remote access and malicious activity on a user’s device

Prevent personal information leakage and bank card data theft

Detect purchases paid by stolen cards or comparative advertisement misleading customers, and other fraud

Develop a unique fingerprint for each user in real-time

No installation or investments in IT infrastructure required

Real time API for integration with fraud monitoring systems

Analytical support and consulting by Group-IB specialists

Data collection

User module Secure Portal runs together with the web page without any involvement from the customer. The script functions unnoticeable to the customer and it does not slow page loading speed.

Secure Portal monitors any injection attempts in Internet pages and creates a unique client device fingerprints and monitors for other signatures of malicious activity on the client side.

The anonymized data are transmitted over a secure channel to the Secure Portal server infrastructure.

Data processing

Group-IB then analyses this data for malicious activity by using our databases of information on the activities of fraudsters both in Russia and abroad.

If fraud is detected, Group-IB immediately informs the portal security service for them to automatically take the desired action.

Our API can be used for direct integration with fraud monitoring systems and with other portal IT infrastructure including notifications and established response procedures in real time.

Protect home networks


We use miniTDS, solution based on Group-IB Threat Detection System, to protect the home network of key persons. Our technologies protect your network 24/7 against intrusions, attacks, data leaks, and espionage.

TDS – Advanced Threat Detection

Group-IB TDS (Threat Detection System) is an intrusion detection and prevention tool to protect your network. It is a unique product by Group-IB, born out of our incident response expertise, skills in detecting malware and threat intelligence foundation.

As a component of Group-IB’s early warning system TDS benefits from other products, which contribute to its effectiveness. Group-IB’s SOC team is there for you 24/7 to prevent and remedy any network threats and breaches. Advanced persistent threat detection lowers cyber threats to your organization and ensure your network is protected from the most advanced cyber threats and threat actors.

86%

infected computers in Botnets have anti-virus software installed

1 500 000+

computers became part of the Carberp botnet

3 months

an average time frame to detect a targeted attack

$27+ mln

losses of the banking sector from APT groups in late 2016 - early 2017

Report an incident

24/7 Incident Response Assistance +7 495 984-33-64

Thank you!
We will contact you soon.