Kela: Bringing Automation And Scalability To Dark Web Threat Intelligence

Follow Kela on :

David Carmiel, CEO, KelaDavid Carmiel, CEO Ever-present cyber security threats have multiplied manifold post COVID. As organisations rushed their on-premises system to the cloud in a mostly haphazard manner to expedite remote work, it left gaping holes in internal security. Amidst this scenario, Dark web– initially starting out as an overlay network within the Internet for private file hosting with end-to-end peering – has gradually transformed into the primary playground for cybercriminals and nation-state hackers to collaborate, communicate, and monetise stolen data. Hiding beneath the veil of anonymity, cybercriminals have sought out the dark web as the ideal marketplace for buying and selling stolen company data and network access and as a launchpad for planning and executing their nefarious online attacks. This translates into substantial financial losses for organisations, not to mention the added serious harm to organisational as well as national security.

This is where KELA, a global leader in actionable threat intelligence, is leading the way in efficiently navigating a cybercrime ecosystem like the dark web. With a novel approach, KELA leverages state-of-the-art automated and scalable threat intelligence tech solutions to drive competent internal security decisions for organisations. “At KELA, we provide contextualized cybercrime intelligence. Our technology accesses and monitors the dark web for organisations’ valuable assets and provides actionable insights from data and discussions within the cybercrime ecosystem,” says David Carmiel, CEO of KELA. KELA brings massively scalable cyber threat intelligence solutions to organisations, law enforcement agencies and managed security services providers (MSSPs) through sophisticated automation, data capture and analysis capabilities, making the complex cybercrime underground accessible and easy to navigate.

Delivering Advanced Actionable Dark Web Threat Intelligence Solutions

KELA’s market-leading cyber threat intelligence end-to-end platform penetrates the hardest-to-reach places to automatically collect, analyse, monitor, and alert on emerging threats coming from the cybercrime underground. It comprises three products, each designed with a unique purpose to serve the organization’s needs. DARKBEAST is KELA’s solution for conducting an in-depth, anonymous investigation, analysis, and advanced research on the dark web.DARKBEAST provides unrestricted access to KELA’s unique and rich security data lake comprising years of data collected from the dark web. It helps organisations gain real-time, contextualized insights into cyber attack trends, and assess the profiles of cyber attackers.


We provide contextualized cybercrime intelligence.Our technology accesses and monitors the dark web for organisations’ valuable assets and provides actionable insights from data and discussions within the cybercrime ecosystem


KELA's monitoring and analysis tool RADARK - takes the intelligence investigation to the next level by enabling custom, real-time dark web monitoring capabilities and providing a clear overview of possible threats, along with tailored threat remediation recommendations. INTELACT, KELA’s automated attack surface intelligence solution for SMBs and MSSPs, further enhances cyber threat detection with efficient real-time alerts and contextualized and actionable intelligence that enables organisations to act on threats and maintain a reduced cyber attack surface

In conjunction, these products act as a personalised SWAT team working together as a complete threat intelligence platform for cyber threat detection, neutralisation and analysis. It empowers KELA’s clients to focus on relevant, organisation-related cyber security threats and relieves organisations from manually detecting them amidst the cybercrime underground chaos and the massive number of false-positive alerts. Additionally, KELA’s products assist organisations in investigating possible cyber attacks by uncovering tactics, techniques and procedures (TTPs) or threat vectors and locating lists of potential ransomware victims and sales of network access information on the dark web.

KELA also takes into account the emerging trend of cybercriminals shifting from text-based to image-based discussions to evade detection by bots that read and analyse online texts on the dark web. To counter this trend, KELA has come up with a cutting-edge OCR technology that in combination with its intelligence solutions captures data from picture-based online discussions from various online spaces like internet forums, Telegram groups and Discord servers. This allows KELA to enhance its delivery of real-time cyber threat detection results to clients.

Going beyond monitoring online discussions, KELA provides an outside-in view of an organisation by creating an overview of the organisation’s appearance to cyber attackers with its Visual Reconnaissance ability. This gives organisations a complete picture of their network issues and external-facing assets that are exposed to hackers and cybercriminals. KELA integrates these findings with the organisations’ internal security measures to fortify their cyber security. This unique feature enables KELA to bring immense value to its clients who gain a proper understanding of their security measures as well as visibility into their attack surface as seen from the eyes of potential attackers.

The Ideal Cybercrime Underground Detection Partner

KELA’s dark web threat intelligence solutions spanning across verticals and tactical areas help organisations identify insider threats and support law enforcement agencies in investigating cybercrimes. For instance, KELA was able to detect an illegal online sale of account access information on behalf of one of their customers. Based on the data captured from the dark web, KELA enabled their customer to identify the particular account within a few minutes and notify the account holder. This led to the implementation of necessary security measures that helped avoid a potential financial loss of more than $1 million. KELA offers similar services to the three major Japanese telecom companies KDDI, NTT and SoftBank Mobile. “We essentially cover more than 90 percent of the Japanese telecommunication industry, help them protect their infrastructure and monitor, understand and identify cybercrime trends in Japan,” informs Carmiel.


Going forward, KELA seeks to bring to fruition its ambitious expansion plans on the business and technology fronts. KELA is currently having prominent business operations in North America, Europe, Asia, and the UAE. “We are also expanding to more countries in Europe and other areas in Asia Pacific, including Australia,” adds Carmiel. Technology-wise, KELA plans to further invest in additional cost-effective, user-friendly, easy-to-implement solutions equipped with automated threat remediation recommendations. The company aims to assist also smaller organisations in fast enhancing their cyber security measures at par with large ones. Commenting optimistically on the future of secured data access at the organisational levels, Carmiel says on a concluding note, “An attack originating in the dark web can bypass all security mechanisms. The danger is real and poses a growing threat to organisations of all sizes. KELA will continue to assist organisations in successfully leveraging data securely with the technology we have released and plan to release on the market.”







Share this Article:
Kela

Company
Kela

Headquarters
Tel Aviv, Israel

Management
David Carmiel, CEO

Description
KELA provides actionable dark web threat intelligence solutions to organizations, law enforcement agencies and MSSPs for neutralizing their most relevant threats observed in the cybercrime underground. With a novel approach, KELA leverages state-of-the-art automated and scalable threat intelligence tech solutions to drive competent internal security decisions for organisations. KELA’s market-leading cyber threat intelligence end-to-end platform penetrates the hardest-to-reach places to automatically collect, analyse, monitor, and alert on emerging threats coming from the cybercrime underground. It comprises three products, each designed with a unique purpose to serve the organization’s needs. In conjunction, these products act as a personalised SWAT team working together as a complete threat intelligence platform for cyber threat detection, neutralisation and analysis