Lessons gleaned from the physical battlefield are just as applicable to the virtual battlefield as well. Intel teams are increasingly turning to identity intelligence as cybercriminals continuously attempt to obfuscate their identities and attack vector. A recent article by Amyn Gilani, VP of Product at 4iQ, notes success in slowing down the enemy is a direct result of unmasking adversaries, despite their best efforts to remain unseen.

Traces of cybercriminals’ identities are likely located across the surface, social, deep, and dark web, so cybercrime intelligence teams are now able to effectively neutralize and disrupt offensive cyber operations (OCO) and their infrastructures through a five-step approach that consists of moving quickly, making the data obsolete, reporting the attack, identifying threat vectors, and collaborating.