Cavalier™: The Industry's Most Robust Compromised Credentials Data Source

“Remarkable high-fidelity data granularity.”
Cavalier™ is based on forensic technologies and operational knowhow developed at the IDF’s 8200 Unit to counter nation-state adversaries and professional threat-actors. It is a unique cybercrime intelligence data source composed of millions of machines compromised in global malware spreading campaigns.

Our high-fidelity data is sourced directly from threat actors
and augmented monthly with hundreds of thousands of new compromised machines.

0

Compromised Machines

0

Compromised Employees

Trusted by Security Teams at Leading Companies.

003-trusted-Kovrr
003a-Acronis
04-trusted-Bridewell
04-trusted-Rapid7
04a-trusted-hibob
04b-trusted-atbay
04b-trusted-malwarebytes
05-trusted-panorays
05a-trusted-Bluevine
05b--trusted-Five9
05b-lacnic
06a-trusted-Etoro
06b-trusted-YellowCard
06c-trusted-Wuerth_Phoenix
11-trusted-teramind
12-Team.Blue
003-trusted-Kovrr
003a-Acronis
04-trusted-Bridewell
04-trusted-Rapid7
04a-trusted-hibob
04b-trusted-atbay
04b-trusted-malwarebytes
05-trusted-panorays
05a-trusted-Bluevine
05b--trusted-Five9
05b-lacnic
06a-trusted-Etoro
06b-trusted-YellowCard
06c-trusted-Wuerth_Phoenix
11-trusted-teramind
12-Team.Blue

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

"Acronis utilizes Hudson Rock alerts to proactively mitigate potential security risks. The timely notifications quickly inform us which in turn allows our team to take swift, preventative measures. This precision and reliability make Hudson Rock a very valuable partner to Acronis, ensuring our systems stay secure and resilient."

Kevin Reed
CISO

"Hudson Rock's alerts for stolen credentials are part of Hibob’s proactive defense strategy. Their timely insights on stolen data via infostealers empower us to respond quickly, secure our assets, and effectively prevent malicious actions before they can impact our organization."

Tamir Ronen
VP, Global CISO

"Yellow Card implemented API integration with Hudson Rock's alerts for stolen account credentials. Gaining early visibility into potentially compromised accounts gives us the opportunity to remediate before the threat has materialized."

Micha Katz
CISO
Cavalier’s™ high-fidelity data protects employees, partners, customers, and digital assets with unprecedented granularity of threat vectors including Ransomware, Business Espionage, Breaches & Network Overtakes.

Cavalier™ is Available for:

  • Security & Threat Intelligence Teams
  • Cyber-Insurance Providers
  • 3rd Party Risk Assessment Providers
  • MSSPs
  • Governmental Agencies

Cavalier™ Data Spans these Sectors:

  • Banking & Finance
  • Insurance
  • Crypto & FinTech
  • Pharmaceutical
  • Retail & eCommerce
  • Healthcare
  • Consumer Services
  • Food & Beverage
  • Manufacturing
  • Automotive
  • Oil & Gas
  • Legal
  • Gaming & Leisure
  • Telecom

Cavalier™ Data:

  • Compromised Employees
  • Compromised Customers & Users
  • Compromised Vendors
  • Compromised Android Users
  • Compromised Leaked Databases
  • Compromised CXO’s & Family Members

Access Cavalier™ Data:

  • Web
  • API
  • JSON
  • Email
  • Custom

Import Cavalier™ Data:

  • SIEM
  • SOAR
  • EDR

Cavalier™ Data Spans:

Cookies
Allows hackers to use existing sessions of victims by importing their cookies and bypass 2fa and other security measurements.
Credentials
URL accessed by the victim, their login credentials and plaintext passwords,  are used by hackers to hack into employee and user accounts. The credentials are retrieved directly from the browsers of the victims and are therefore almost always valid.
IP
The IP address of the compromised computer.
Malware Path
The path on the computer in which the infostealer malware was installed on.
Date
The date in which the computer was infected.
Operating System
Which operating system was installed on the infected computer.
Computer Name
The username of the computer that was infected assists in identifying which computer was infected as sometimes employees share credentials, complicating attribution.
Installed Anti-Viruses
A list of the anti-viruses running on the computer at the time of the infection.