Contents
Kaspersky Threat Intelligence Portal
Kaspersky Threat Intelligence Portal delivers all of the knowledge acquired by Kaspersky about cyberthreats and legitimate objects, and their relationships, which are brought together into a single, powerful web service. The goal is to provide your security teams with as much data as possible in order to prevent cyberattacks from impacting your organization. The portal retrieves the latest detailed threat intelligence about web addresses, domains, IP addresses, file hashes, statistical/behavioral data, WHOIS data, etc. The result is visibility of new and emerging threats globally, thus helping you to secure your organization and boost incident response.
Kaspersky Threat Intelligence Portal is available for desktops, tablets, and mobile devices.
Threat intelligence is aggregated from a wide variety of highly reliable sources. Then, in real time, all of the aggregated data is carefully inspected and refined by using several preprocessing techniques and technologies, such as statistical systems, similarity tools, sandboxing, behavioral profiling, allowlist-based verification, and analyst validation.
Every submitted file is analyzed by a set of advanced threat detection technologies, such as reputational services, behavior detection technologies, heuristic analysis, Urgent Detection System, and Kaspersky Cloud Sandbox, to monitor its behavior and actions, including network connections and downloaded/dropped objects. The Sandbox is based on the company’s proprietary and patented technology, which is used internally and allows Kaspersky to detect more than 350,000 new malicious objects every day.
Besides advanced threat detection technologies, information about submitted files, web addresses, IP addresses, and hashes is enriched with the most recent threat intelligence aggregated from fused, heterogeneous, and highly reliable sources, such as:
- Kaspersky Security Network
- Botnet Tracking service
- Proprietary web crawlers
- Spam traps
- APT research findings (thanks to our GReAT team)
- Security partners information
- Technical Intelligence (passive DNS, WHOIS)
- OSINT
Finally, the service analyzes the data for malicious and suspicious activity, and then returns a status report for the submitted objects (files, web addresses, IP addresses, or hashes).
How it works
Files or Indicators of Compromise can be submitted through a web interface or RESTful API. Kaspersky Threat Intelligence Portal lets you submit and retrieve threat intelligence on the following objects:
- Files
- MD5, SHA1, and SHA256 hashes
- IP addresses (IPv4)
- Domains
- Web addresses
Kaspersky Threat Intelligence Portal shows whether an object is in the Good, Bad, or Not Categorized zone, while providing contextual data to help you respond to or investigate objects more effectively.
For users with Premium Access, additional functionality includes access to detailed Threat Lookup and Kaspersky Cloud Sandbox reports, APT Intelligence, Crimeware, and Industrial Threat Intelligence, as well as Digital Footprint Reporting.
Page topPremium Kaspersky Threat Intelligence Portal services
Tracking, analyzing, interpreting, and mitigating constantly evolving IT security threats is a massive undertaking. Companies in every sector lack of the up-to-the-minute, relevant data they need to manage the risks associated with IT security threats. To help these companies access the most relevant threat information, and to support their ongoing struggles against complex cybercrime, Kaspersky offers premium access through our Kaspersky Threat Intelligence Portal—the ultimate web service to help researchers and Security Operation Center analysts work more efficiently while managing thousands of security alerts.
Premium Kaspersky Threat Intelligence Portal services include:
APT Intelligence Reporting
Subscribers to Kaspersky APT Intelligence Reporting receive unique ongoing access to our investigations and discoveries, including threat actor profiles, their TTPs mapped to MITRE ATT&CK, and full technical data provided in a range of formats on every APT as it's discovered, including all the threats that are never made public. The information in these reports helps you to respond quickly to various threats and vulnerabilities—blocking attacks via known vectors, reducing the damage caused by advanced attacks, and enhancing your overall security strategy.
Crimeware Threat Intelligence Reporting
Enables financial institutions to inform their defensive strategies by providing timely information on attacks targeting banks, payment processing companies, insurance companies, etc. Reports include detailed insights into attacks on specific infrastructures, like ATMs and Point-of-Sale devices, and information on tools tailored to attack financial networks, which are used, developed, and sold by cybercriminals on the dark web.
Digital Footprint Intelligence
A digital risk monitoring solution that provides detailed information on attack vectors associated with an organization's entire digital footprint. These include items such as compromised credentials, information leakages, vulnerable services on the network perimeter, and insider threats. By revealing signs of any past, present, or planned attacks, and identifying weak spots vulnerable to exploitation, the solution helps companies to focus their defensive strategy on prime cyberattack targets.
Threat Data Feeds
By integrating up-to-the-minute Threat Data Feeds containing information on not trusted and dangerous IP addresses, web addresses, and file hashes into existing security controls like SIEM systems, security teams can automate the initial alert triage process while providing their triage specialists with enough context to immediately identify alerts to be investigated or escalated to incident response teams for further investigation and response.
CyberTrace
Kaspersky CyberTrace is a threat intelligence fusion and analysis tool that enables seamless integration of any threat intelligence feed you might want to use (in JSON, STIX, XML, and CSV formats) with SIEM solutions and other log sources to help analysts more effectively leverage threat intelligence in their existing security operations workflow. The tool uses an internal process of parsing and matching incoming data, which significantly reduces SIEM workload. By automatically parsing incoming logs and events, and matching them against threat intelligence feeds, Kaspersky CyberTrace provides real-time situational awareness, which helps security analysts make swift, well-informed decisions.
Threat Lookup
Kaspersky Threat Lookup delivers all of the knowledge acquired by Kaspersky about cyberthreats, and legitimate objects and their relationships, brought together into a single, powerful web service. The goal is to provide security teams with as much data as possible in order to prevent cyberattacks from impacting your organization. Threat Lookup retrieves the latest detailed threat intelligence about web addresses, domains, IP addresses, file hashes, detected object names, statistical/behavior data, WHOIS/DNS data, file attributes, geolocation data, download chains, timestamps, etc. The result is visibility into new and emerging threats globally, helping you secure your organization and boost incident response and improve threat-hunting missions.
Basic access to Kaspersky Threat Lookup is available to all users.
Cloud Sandbox
Making an intelligent decision based on a file's behavior, while simultaneously analyzing the process memory, network activity, etc. is the best way to understand current sophisticated targeted and tailored threats. Based on our proprietary and patented technologies, Kaspersky Cloud Sandbox provides detailed reports on the behavior of probably infected files.
It incorporates all of the knowledge about malware behaviors acquired by Kaspersky over 20 years of continuous threat research, which allows us to detect more than 350,000 new malicious objects each day. While Threat Lookup retrieves the latest and historical threat intelligence, Kaspersky Cloud Sandbox allows that knowledge to be linked to the IOCs generated by the analyzed sample, revealing the full scope of an attack and helping you plan effective response measures.
Sandboxing of web addresses is also available.
Basic summary reports are available to all users.
Industrial Threat Intelligence Reporting
The Kaspersky Industrial Threat Intelligence Reporting Service provides the customer with in-depth intelligence and greater awareness of malicious campaigns targeting industrial organizations, as well as information on vulnerabilities found in the most popular industrial control systems and underlying technologies.
These premium services enable companies to run highly effective and complex incident investigations—gaining an immediate understanding of the nature of threats, connecting the dots as you drill down to reveal interrelated threat indicators, and linking incidents to specific APT actors, campaigns, their motivation, and TTPs.
For more information, please visit https://www.kaspersky.com/enterprise-security/threat-intelligence and https://www.kaspersky.com/enterprise-security/apt-intelligence-reporting.
Page topComparison of Kaspersky Threat Intelligence Portal versions
The table below shows the difference between features available for General and Premium Access to Kaspersky Threat Intelligence Portal.
Available features for General and Premium Access to Kaspersky Threat Intelligence Portal
Feature |
General Access |
Premium Access |
---|---|---|
Home page |
||
Worldwide cyber-map |
||
TOPs of threats worldwide and for individual countries |
||
Threat dynamics worldwide and for individual countries |
||
Event list displaying recent events |
||
APT Intelligence and Crimeware Threat Intelligence Reporting |
||
Access to service using web interface |
||
Access to service using RESTful API |
||
Email notifications for new or updated reports |
||
APT Intelligence reports |
||
APT C&C Tracking |
||
Crimeware Threat Intelligence reports |
||
Actor profiles |
||
IoC downloads |
||
Industrial Reporting |
||
Industrial reports |
||
Threat Lookup: Hash investigation |
||
Access to service using web interface |
||
Access to service using RESTful API |
(for registered users, API token required) |
|
Export results to JSON / STIX / CSV formats |
||
Hash report contents: |
|
|
General information |
||
Detection names |
||
File signatures and certificates |
||
Container signatures and certificates |
||
File paths |
||
File names |
||
File downloaded from web addresses and domains |
||
File accessed following web addresses |
||
File started following objects |
||
File was started by following objects |
||
File downloaded following objects |
||
File was downloaded by following objects |
||
Threat Lookup: IP address investigation |
||
Access to service using web interface |
||
Access to service using RESTful API |
(for registered users, API token required) |
|
Export results to JSON / STIX / CSV formats |
||
IP address report contents: |
|
|
General information |
||
IP WHOIS |
||
Threat score |
||
DNS resolutions for IP address |
||
Files related to IP address |
||
Hosted web addresses |
||
Threat Lookup: Web address investigation |
||
Access to service using web interface |
||
Access to service using RESTful API |
(for registered users, API token required) |
|
Export results to JSON / STIX / CSV formats |
||
Web address report contents: |
|
|
General information |
||
Domain/IP WHOIS |
||
DNS resolutions for domain |
||
Files downloaded from requested web address |
||
Files accessed requested web address |
||
Referrals to requested web address |
||
Requested object linked, forwarded, or redirected to following web addresses |
||
Masks (record ID in Data Feeds) |
||
Threat Lookup: Domain investigation |
||
Access to service using web interface |
||
Access to service using RESTful API |
(for registered users, API token required) |
|
Export results to JSON / STIX / CSV formats |
||
Domain report contents: |
|
|
General information |
||
Domain WHOIS |
||
DNS resolutions for domain |
||
Files downloaded from requested domain |
||
Files accessed requested domain |
||
Subdomains |
||
Referrals to domain |
||
Domain referred to following web addresses |
||
Web address masks |
||
WHOIS Lookup |
||
WHOIS Hunting |
||
Cloud Sandbox: Upload and execute file |
||
Custom file execution parameters |
||
Access to service using web interface |
||
Access to service using RESTful API |
(for registered users, API token required) |
|
Export results to JSON / STIX / CSV formats |
||
File analysis report contents: |
|
|
General information |
||
Detection names (including Sandbox detects and Triggered Network Rules) |
||
Execution map |
(limited) |
|
Suspicious activities |
(limited) |
|
Screenshots |
(limited) |
|
Loaded PE images |
(limited) |
|
File operations |
(limited) |
|
Registry operations |
(limited) |
|
Process operations |
(limited) |
|
Synchronize operations |
(limited) |
|
Downloaded files |
(limited) |
|
Dropped files |
(limited) |
|
HTTP(S) requests |
(limited) |
|
DNS requests |
(limited) |
|
Cloud Sandbox: Download and execute file |
||
File download from a web resource |
||
Custom file execution parameters |
||
Access to service using web interface |
||
Access to service using RESTful API |
||
Export results to JSON / STIX / CSV formats |
||
File analysis report contents: |
|
|
File download information |
||
Download request |
||
Download responses |
||
General information |
||
Detection names (including Sandbox detects and Triggered Network Rules) |
||
Execution map |
||
Suspicious activities |
||
Screenshots |
||
Loaded PE images |
||
File operations |
||
Registry operations |
||
Process operations |
||
Synchronize operations |
||
Downloaded files |
||
Dropped files |
||
HTTP(S) requests |
||
DNS requests |
||
Cloud Sandbox: Browse web address |
||
Custom web address browsing parameters |
||
Access to service using web interface |
||
Access to service using RESTful API |
(for registered users, API token required) |
|
Export results to JSON / STIX / CSV formats |
||
Web address analysis report contents: |
|
|
General information |
||
Detection names (including Sandbox detects and Triggered Network Rules) |
||
Connected hosts |
(limited) |
|
WHOIS |
(limited) |
|
HTTP(S) requests |
(limited) |
|
DNS requests |
(limited) |
|
Screenshots |
(limited) |
|
Digital Footprint Intelligence |
||
Digital Footprint Intelligence reports |
||
Digital Footprint Intelligence notifications |
||
Threat notifications |
||
Export threat notifications |
||
Viewing and changing organization's information |
||
Data Feeds |
||
Threat Intelligence Data Feeds |
||
Incident Response Tools |
||
Threat Data Feeds Supplementary Tools |
||
SIEM Connectors |
||
Related Materials |
||
User account management |
||
View all group accounts |
||
Manage group accounts (create, edit, delete) |
||
Configure email notifications |
Software requirements
Kaspersky Threat Intelligence Portal has the following hardware and software requirements:
Desktop version
Minimum general requirements:
- 2 GB of free disk space on hard drive
- Internet connection for working with Kaspersky Threat Intelligence Portal online
- Open 443 (HTTPS) and 80 (HTTP) ports
- Monitor that supports a display resolution of 1366x768
Minimum hardware requirements:
- Intel Pentium 1 GHz (or a compatible equivalent) for a 32-bit operating system
- Intel Pentium 2 GHz (or a compatible equivalent) for a 64-bit operating system
- 1 GB of free RAM
Supported browsers:
- Mozilla Firefox
- Google Chrome
- Microsoft Edge
- Safari
Mobile version
Minimum general requirements:
- For mobile version: mobile devices that support a minimum screen resolution of 320x568
- For tablet version: tablets that support a minimum screen resolution of 1024x768
Minimum and recommended hardware requirements:
- CPU 1.2 GHz (recommended 1.5 GHz)
- 50 MB of free RAM
- 50 MB of free disk space on hard drive
Supported operating systems:
- Android 10 or later
- iOS 14.0 or later
- iPadOS 14 or later
Supported browsers:
- Google Chrome
- Safari
We recommend that you always use the latest version of the supported browsers. You can download the latest versions from their vendors' official websites:
Mozilla Firefox Google Chrome Microsoft Edge Safari
If you use an unsupported browser, the functionality of Kaspersky Threat Intelligence Portal may be limited.