
Cyber Threat Intelligence
Threat intelligence are fueled by frontline incident response intel and elite analysts to effectively hunt and respond to threats.
Utilizing frontline threat intelligence from handling thousands of cyber incidents every year, our team can deliver more visibility against emerging threats and offer actionable steps to minimize risk and protect against operational and reputational damage. Our experts bring their combined experience in the U.S. Secret Service, the FBI, Fortune 100 and the National Cyber Forensic Training Alliance (NCFTA) to follow even the most obfuscated or opaque data trails.
Our analysts can determine the digital footprint of an organization based on intel gathered and analyzed from millions of data sources. We provide detailed insight into an organization’s digital exposure, which allows stakeholders to make better-informed business decisions. This includes:
How Threat Intelligence can Enhance Your Business




Digital Footprint Intelligence
- Would-be impact analysis of an incident for client and counsel
- Identify breach exposure and provide witness testimony as part of litigation
- Bespoke threat landscape briefings with actionable advice
- Cyber risk assessments and due diligence reports
- Social media and due diligence investigations
Kroll cyber threat intelligence analysts cross-correlate a variety of open source, private feeds and dark web data with frontline data collected from thousands of annual incidents worked on by Kroll experts, filtering out false positives, duplicates and general noise. This unique formula enables timely, meaningful and actionable intelligence that empowers more efficient hunting, improves threat detection, provides domain monitoring, helps in complex litigation, and can preserve organizations’ operations and reputations.
Example Engagement: Digital Footprint Intelligence
The Kroll team conducted a cyber security assessment and ran due diligence reports for a retail company that was looking to understand the cyber risks associated with the expansion of its digital footprint in a new market. Kroll helped the company identify region-specific threats, local litigation challenges and regulatory requirements. The insights were then used to inform decision-making, including risk mitigation strategies such as insurance policies.
Digital Threat Response
Unique intelligence powers our rapid detection, response and remediation capabilities during a cybersecurity event. We utilize data from our thousands of incident response engagements to help determine how to best respond. We provide:
- Investigative support to provide insight during an active cyber incident
- Client data preservation services if confidential data is leaked or exposed
- Real-time intelligence curation to report on new and emerging tactics, techniques and procedures (TTPs)
Example Engagement: Digital Threat Response
A financial institution was targeted in a ransomware attack. Kroll was engaged for digital threat response, where our experts analyzed threat actor downloads, confirmed that the data was unique to the organization and assisted the company in understanding the access the threat actor obtained in their network and the data that was exfiltrated. This intelligence triggered further investigative action and public notification.
Digital Risk Protection
Example Engagement: Dark Web Monitoring
A manufacturing company identified unauthorized access to its systems and engaged Kroll for a forensics investigation. Using dark web monitoring, the Kroll team identified corporate information on an underground cybercriminal forum. This information helped us focus investigative efforts, helped the client understand what data was accessed and provided guidance on how to proceed with client and employee notification.
Cyber Threat Hunting
Utilizing Kroll’s proprietary technology and enhanced hunting model, our threat analysts can rapidly search and pivot on TTPs, IOCs and emerging threat indicators to quickly identify possible threats seen across various environments. Our cyclical hunting model follows six steps:
- Data gathering (threat intelligence)
- Hypothesis formation
- Hunt scoping
- Hypothesis testing
- Novel threat identification and threat neutralization
- Review
Threat Intelligence Reporting
Through Kroll’s global intelligence intake, our team gathers and analyzes data to determine trends in the market and deeply understand the most popular and common cyber threats in today’s landscape.
Our team aggregates and breaks down data to provide the most helpful insights.
Enhance Investigations and Malware Analysis
Kroll’s threat intelligence services can provide further insight both before, during or after an incident. Our experts can help assess your exposure through advanced threat monitoring or help determine the scale of exposed data from a breach.
In conjunction with our threat intelligence insights, our analysts deliver actionable findings through in-depth technical analysis of benign and malicious code. We are able to not only identify and monitor for threats but also reverse engineer malware and provide triage analysis of any code-related event in order to enhance our recommendations for investigative next steps. Our Threat Intelligence team is your ultimate partner when it comes to assessing your organization’s exposure.
Threat Intelligence in a Cyber Risk Retainer
Threat intelligence can provide important insight into your organization’s exposure or help understand your digital footprint in your industry. Kroll clients can package threat intelligence services with Kroll’s cyber risk retainer, which gives you prioritized access to elite investigators and the flexibility to allocate incident response resources as well as all other cybersecurity solutions offered by Kroll.
Stay Ahead With Kroll
Cyber and Data Resilience
Kroll merges elite security and data risk expertise with frontline intelligence from thousands of incident response, regulatory compliance, financial crime and due diligence engagements to make our clients more cyber resilient.
24x7 Incident Response
Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.
Kroll Responder MDR
Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.
Cyber Risk Retainer
Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.
Penetration Testing Services
Validate your cyber defenses against real-world threats. Kroll’s world-class penetration testing services bring together front-line threat intelligence, thousands of hours of cyber security assessments completed each year and a team of certified cyber experts — the foundation for our sophisticated and scalable approach.