Join our expert-led discussion, ‘Countering Foreign Influence and Disinformation Campaigns,' and discover how to address the growing challenge of disinformation on Thursday, October 24, 2024, from 16:00 to 17:00 CET. Register now! close

Constella Intelligence

By Maltego Technologies
World’s Most Comprehensive Identity Exposure Database
# Breaches & Leaks # Company Data # Corporate Security & Business Risk # Cybercrime
Constella Intelligence integration for Maltego

Constella Intelligence Transforms for Maltego

The Constella Transforms offers access to unrivalled identity exposure data. Harnessing identity intelligence from 15 years’ worth of data breaches, investigators can search over 124 billion breach records to unmask aliases, nicknames, and domains, and query over 50 record attributes , spanning 125 countries and 53 languages to accelerate any investigation. 

The exposed identity data used by Constella Transforms has gone through a comprehensive validation and normalization process, so that investigators can quickly and easily query, pivot and fuse intelligence gathered from other sources.

Typical Users of Constella Intelligence Data

  • Law Enforcement CyberCrime Investigator
  • Bank Fraud/AML CyberCrime Investigator
  • Incident Response
  • Corporate investigators

Integration Benefits

Powerful threat actor unmasking

The Constella data set of 124BN structured breach identity records enable the unmasking of threat actors in a unique way not offered by any other dataset.

Investigators can start an investigation with any observable attribute such as a forum username or email address, then submit the query to retrieve related attributes, pivot and repeat searches until all leads are exhausted, resulting in rapid identification of multiple emails, usernames, phone numbers, addresses and other identifiable information belonging to the same person.

Validated & Structured Breach Data

Constella Intelligence’s breach data is highly validated for correct attribution and data authenticity. Metadata such as exposure event dates and data loss source allow for investigation accuracy. We ingest more than just credentials, with over 200 normalized fields recognized, allowing you to capture a comprehensive picture of a person or business’s exposures, and pivot on a number of attributes for a broader reach.

Ongoing Fresh Exposures

Constella constantly adds new global breach data to the Transforms as quickly as possible. This is now augmented with data stolen by botnets or infostealers within the past few hours our days only.   

Lower False Positives

Easily pivot and fuse the results thanks to our advanced filtering and verification process to limit false positives.

Leverage Constella Intelligence Data for

Digital Identity Attribution

Breach data contains identity records that can expose relationships between names, emails, IP addresses, payment details, usernames and assorted PII to accelerate identity validation and attribution. By traversing this data via attributes common across records, we can link an ambiguous data point such as a malicious actor’s moniker or email to a real identity including and related name, telephone number and home address.

Insider Risk Profiling

The Transform not only shows the amount of PII of an employee that is exposed (to report accidental insider risk via Account Takeover), but it can also provide associations with criminal, high risk or undesirable activities.

Cyber Defense

Search domains for any recent corporate credential exposures or botnet attacks. Login credentials are the Number 1 initial attack vector for breaches, so Constella is a critical threat intelligence feed.

Suspicious Activity Reporting (SAR)

Breach data is an unrivalled source of net new intelligence on threat actors and groups and helps contextualize suspicious activity and identity threat actors, to accelerate law enforcement liaison & response.
Read more

Resources

Articles

Investigator Toolkit July 2023: Cheat Sheets for Faster and Spot-on Workflows

Webinars

Webinar | Unmask Cybercriminals’ Real Identities with Constella and Maltego

Terms and Conditions

Learn more about the Terms and Conditions of Constella Intelligence at: Terms and Conditions

Contact

Reach out to us to learn more about this data integration and how to access it.
By clicking on "Send Message", you agree to the processing of the data you entered and you allow us to contact you for the purpose selected in the form. For further information, see our Data Privacy Policy.

About Constella Intelligence

Constella Intelligence defeats digital risk, specializing in exposed identity data. We’re trusted by public and private sector investigators, including 6 of the 10 largest identity theft protection providers and 5 of the top 10 global banks.

Our unique approach to identity resolution, bad actor unmasking and attribution has been developed for over a decade. Constella collects, verifies, deduplicates and categorizes global stolen, compromised and exposed data across the surface, social media, deep and dark web. Consequently, Constella boasts the industry’s largest data lake of compromised credentials and stolen personal information (PII). The likes of police forces, fraud teams, global enterprises and cyber journalists leverage our meticulously curated identity intelligence data to unmask bad actors, fraudsters, risky insiders and to accelerate OSINT investigations.

For more information, visit: http://www.constellaintelligence.com/.