CT6.® Cybercrime Prevention
A New Edge of
Preemptive Solutions to Defeat Cybercrime
Cybercrime losses will top $6 trillion in 2021.
Cybersecurity alone cannot stop cybercriminals before they strike.
CT6.® created Cybercrime Prevention to stop criminals before they attack.As digital attacks advance, cybersecurity technology often lags, compelling a repeating cycle of damage control.
CT6.® Cybercrime Prevention
CT6.® Cybercrime Prevention sees beyond network defenses to find the risk of digital attacks hiding within the relationships and remote connections that eventually touch a business or an organization.
CT6.® Cybercrime Prevention Uncovers Existing & Emerging ThreatsTo stop ransomware, malware, credential attacks, phishing, theft, fraud, sabotage, and more.
Cybersecurity protects your network. Cybercrime Prevention protects your business.
Cyber & Data Safety
The practice of good cyber hygiene. Examples: Password managers, MFA, VPNs, credit monitoring, digital footprint awareness, data encryption, smart clicking, user training, etc.
The in-progress defense and preservation of networks, hardware, software, and data. Examples: Antivirus software, firewalls, domain monitoring, cyber threat intel, advanced malware protection, DNS filtering, Cyber AI, etc.
The preemptive degradation of cybercriminal acts to prevent fraud, theft, and sabotage. Examples: Pinpoint Transactional Risk Scoring, Criminal Behavior Analytics & AI, Preemptive Fraud Controls, User Indiscretion Resolution, Vendor-Enabled Cybercrime, Dynamic Compromised Credential Remediation, etc.
CT6.® Cybercrime Prevention Stops Digital Attacks
Point of Failure
Remote employee used compromised or easily guessed RDP credentials
Before the attack, identify compromised employee RDP credentials through CT6.® CredProtect, preventing a major business disruption
2016 to Present
Threat typeCredential Stuffing Attacks
Customers re-used compromised login credentials discovered by cybercriminal credential stuffing attacks.
Preemptively identify and remediate customers that have compromised credentials through CT6.® CredProtect
Zelle product rollout
Threat typeBanking Trojans
Latent malware compromised customer endpoints
CT6.®indicators of financial compromise (IoFC)® alerts through CT6.® Fraud Preventer for anti-fraud departments on customers infected with malware, preventing future fraud transactions
Threat typeBanking Trojans
Sensitive data theft via third-party (vendor) remote access
Identify compromised third-party access through CT6.® CredProtect to allow remediation before the massive data theft occurred
Banks and Online Retailers
2000’s – Present
Threat typeFinancial Theft Malware
Customer compromised devices passively collecting debit and credit card information.
CT6.® indicators of Financials Compromise (IoFC)® alerts through CT6.® Fraud Preventer for anti-fraud departments on customers infected with malware, preventing future fraud transactions
Governments, Utilities, Business, Organizations
2000’s – Present
External & Internal users socially engineered to enter PII, financial information, and login credentials to phishing websites
CT6.® Indicators of Financial Compromise (IoFC)® alerts through CT6.® Fraud Preventer of individual users or customers who visited a phishing website
CT6.® Cybercrime Prevention is a New TechnologyIt is the first of its kind. It represents a wholesale change in the way the world will secure its information. Cybercrime Prevention technology quickly uncovers and maps hidden connections between disparate data points to expose risks and vulnerabilities that cybersecurity measures alone cannot. It means finding the unknowns (e.g., method, source, extent, all affected data) internal and external to a network to prevent sophisticated digital attacks. The proactive nature of Cybercrime Prevention marks the difference between enduring repetitive cycles of damage control versus preemptively stopping criminals before they attack.
CT6.® Cybercrime Prevention
A New Edge of
Privacy and Search Accuracy tool – The proprietary process of creating a partial hash or partial-partial hash (digital fingerprint) of data to erase identifiers while improving data matching capabilities. (U.S. Pat. Pend.) Wide Aperture Data Hunting – A proprietary software-based capability that identifies customer, employee, and vendor points of compromise, independent of a connection to an organization, among 23+ billion of pieces of data. Data types include digital device identifiers, payment cards, login credentials, financial transaction data, and all PII. (U.S. Pat. Pend.) IoFC® Matching Logic – A proprietary methodology used to uncover and map hidden connections between disparate and remote data points to expose customer, remote workers, and vendor/supplier risks. IoFC (Indicators of Financial Compromise)® is trademarked as a new way of discovering cybercrime risk. (U.S. Pat. Pend.) IoFC® Cybercrime Risk Signaling – The product of IoFC® Matching Logic, this proprietary software-based capability produces the early warning cybercrime risk indicator that CT6.® users receive to manage and mitigate risk days, weeks, or months before the criminal can commit fraud, theft or sabotage. (U.S. Pat. Pend.) Criminal Behavioral Analytics – The process that exposes exactly how the criminal business cycle converts data and access into fraud, theft, and sabotage against a business/organization. Legal & Ethical – No data or access is purchased from cybercriminals (U.S. DOJ & E.U. GDPR Compliant). Privacy Compliant – No customer, employee, or vendor PII leaves the company network through CT6.® partial hash technology and non-PII data filters. (U.S. Pat. Pending) Frictionless Touch – Adds no friction to user experiences; CT6.® works offline and onsite. Automated Results – Results delivered without human interaction as an on-premise software or cloud-hosted solution.
Looking for more? Read our White Paper: The Business of Cybercrime
Who needs Cybercrime Prevention
- Online Retailers/Sales Platforms, Financial Services, Financial Institutions, FinTech
- Any environment with critical supply chains
- Any environment with remote employees
- Any high security environment (defense firms, government, utilities)
- Cyber Insurance Providers
How CT6® Stops Cybercriminals
- Identify potential cybercriminal access to customers before it turns into a fraud event.
- Identify potential cybercriminal access to remote employees before it tarnishes reputations or disrupts business operations.
- Identify potential cybercriminal access to supply chains before it leads to sensitive information theft or business operations disruption.
- Identify potential cybercriminal access to employees and vendors before it turns into classified information theft or critical infrastructure sector disruption.
- Limit claims by identifying potential and current policyholder risk to cyber-enabled fraud, sensitive information theft, or business operations disruption.
CT6® Cybercrime White Paper Excerpts
What will CT6.® Cybercrime Prevention tell me about my data?
With CT6.® Cybercrime Prevention technology in place, one piece of data (a username, a password, an infected device) can uncover a much larger problem. This one piece of data can uncover which employees, customers, or vendors who are victims of malware or phishing campaigns on third-party networks. It can lead to the discovery of viruses, naive user behavior, weak authentication, third-party breaches, and other factors external to the network. These previously unseen vectors render a native system susceptible to attack. CT6.® Cybercrime Prevention identifies the infected devices of remote employees, customers accessing online platforms, or vendors on a network. It can determine if employees, customers, and supply chain vendors are using a username or password that was already compromised days or years ago, waiting to be discovered by a hacker. It can tell if any internal or external user was compromised by a spoofed access point for an online retailer or financial institution anywhere in the world. The ability of cybercrime prevention technology to track and map disparate data points is limitless, and it is vital to preemptively stopping cybercriminals dead in their tracks.</div>
Cybercrime Prevention Means Uncovering the Unknowns
The edge of awareness for data owners must expand to keep pace with the intrusion capabilities of the hackers and criminals. Absolutely critical to expanding the edge of awareness is ascertaining the unknowns, such as the method, source, extent, and all affected data points from the original and any subsequent compromises. By expanding the edge of awareness for data owners and protectors through cybercrime prevention, an outer ring of armor is wrapped around operational cybersecurity measures. This fills in the missing capability by adding a powerful offense to a fortified cybersecurity defense. Full cybercrime awareness means uncovering the unknowns (e.g., method, source, extent, all affected data) that sit outside of your network to combat sophisticated cyberattacks. It means knowing what the criminal knows and what access criminals have into your employees, customers, and vendors. It is no longer good enough to simply know if a piece of data is compromised or not. Data security is not a binary answer.
More Options to Timely Mitigate and Secure Information
Cybercrime prevention technology uniquely provides the opportunity to proactively identify and then mitigate data vulnerabilities before criminals use it. This gives data owners the upper hand in choosing how to respond to control the risk associated with data vulnerability. Options include a localized response (change passwords, lock a payment card, freeze a bank account, etc.), or a larger response (build a fraud fusion center, initiate a response team, install adaptive security measures), or the option to carefully monitor the affected data for future action. Cybercrime prevention technology gives the choice back to the data owner on how to proceed against threats and minimize risk. It breaks the cycle of continuous damage control because it can provide a complete picture of a cyber event or potential cyber event, allowing more time to explore response choices. With virtually unlimited data points that can be modeled against unlimited sets of identifiers and data tags, cybercrime prevention technology can also proactively pursue dynamic leads on criminal activity.
The Limitless Potential of Cybercrime Prevention Technology
The power to discover, pursue, mitigate, and secure data is limitless through the cybercrime prevention technology created by cybercrime consultancy and software developer Cyber Team Six®. The efficacy behind the innovative technology is rooted in a proprietary software that creates non PII, or anonymous, data fingerprints to identify and collect data about cyber threats targeting a company’s employees, customers, and vendors. A follow-on proprietary process maps hidden connections between access or data stolen by cyber threats and disparate internal data points about employees, customers, and vendors to expose risks and vulnerabilities with a near-perfect confidence rate. For example, one global financial institution uses cybercrime prevention technology to identify fraud schemes, synthetic identity creation, IP theft attempts, money laundering networks, shell businesses trying to avoid supply chain controls, and more. Cybercrime prevention technology adapts to every business, industry, institution, and government entity tasked with the handling of information.
How is CT6 Cybercrime Prevention used Today?
CT6.® Cybercrime Prevention changes the paradigm of security across all business enterprises and government entities by proactively protecting CT6.® clients and disrupting the business of cybercrime. CT6.® Fraud Preventer technology broke the business cycle of malware-enabled fraud targeting the customers of a global financial institution stopping the campaign in its tracks and avoiding a fraud loss of millions of dollars. More telling, criminals moved on to softer targets as the profit stream from targeting the now-protected financial institution dried up. CT6.® CredProtect technology was integrated into a large U.S. based power utility, radically limiting their cybersecurity risk profile and closing thousands of known points of criminal access into the network that could often lead to follow on disruptive attacks, such as ransomware. CT6.® expertise informs the U.S. Intelligence Community’s efforts to reduce risk to hostile threat actors in critical infrastructure with already proven results in eliminating nation-state supply chain risk.