Dark Web data hunter Terbium Labs secures $6.4m in fresh funding

Hunter of data on the Dark Web Terbium Labs has secured $6.4 million from investors in a Series A funding round.

Terbium Labs touts itself as a company which protects the enterprise from “relentless attempts to steal data for personal, monetary or political gain.” In 2015, the Baltimore, MD.-based startup launched Matchlight, software which monitors the Dark Web — a small fraction of the Deep Web associated with illegal dealings — in real-time and alerts companies when information belonging to them appears there.

More security news

If data can be detected quickly, companies have more time to conduct damage control and potentially seal a data breach. Information on the Dark Web could include consumer records, sensitive corporate data or trade secrets — in short, data that firms wish to keep secure within their own servers rather than released to the public domain.

See also: When stolen data turns up on the dark web, this tech can find it fast

The funding round, led by .406 Ventures, brings the company’s overall investment up yo $9.7 million. The company plans to use the funding to expand its team and boost Matchlight sales in the enterprise realm.

Greg Dracon, Partner at .406 Ventures and Terbium Labs board member commented:

“Terbium Labs is redefining how security teams identify breaches and protect their organization’s most critical data.

Managing data breach risk has become a business necessity as breach frequency is at an all-time high with no signs of slowing down. Matchlight picks up where traditional prevention tools fail, giving organizations the ability to counter data theft quickly, privately and affordably.”

Earlier this month, cloud security firm Bitglass revealed the results of an experiment focused on how quickly stolen data spreads through the Dark Web. The company found that within days, financial credentials leaked to the underground spread to 30 countries across six continents with thousands of users accessing the information.

Read on: Top picks

Chinese Threat Intel Start-up Finds DarkHotel Exploiting Chinese Telecom

New China-based threat intelligence company ThreatBook wants to be the ‘trusted contact in China.’

SAN FRANCISCO, RSA Conference — The DarkHotel threat group is targeting executives at telecommunications companies in North Korea and China, already compromising at least one, according to researchers at Beijing-based threat intelligence start-up ThreatBook.

In operation since 2007, DarkHotel is named for their habit of exploiting executives while they were using unsecured hotel WiFi networks, a behavior the group has since abandoned. In this campaign, which ThreatBook refers to as DarkHotel Operation 8651, the group is using spearphishing messages with malicious documents attached — specifically, a crafted SWF file embedded as a downloadable link in a Word document.

The SWF file exploits Adobe Flash vulnerability CVE-2015-8651. According to ThreatBook, the earliest infections associated with that bug and this campaign are Dec. 24. Adobe released an out-of-band patch for it Dec. 28.

The payload, update.exe, is a Trojan downloader, disguised as a component of OpenSSL. It then uses a variety of anti-detection measures, including anti-sandbox, and anti-anti-virus, as well as just-in-time decryption.

Feng Xue and Hong Jia, friends from their days working at Microsoft, first had the idea to start ThreatBook in May. After a hurried meeting at the Beijing airport Starbucks during Jia’s two-hour layover en route to Redmond, Wash., the two quit their jobs — Jia as principal anti-virus research manager at Microsoft and Feng as CISO of Amazon.cn — and launched ThreatBook in June.

“I never thought I would leave [Microsoft],” says Jia. “The career path was quite good and I love Microsoft.”

“I got excited and I could not sleep,” says Xue.

The idea that hooked Xue and Jia was realizing that there was no threat intelligence market in China, but the need for one was great.

“Threat intelligence is not just a tool, it’s a new wave. A trend,” says Xue.

ThreatBook uncovered information about the identity and intentions of the XCodeGhost authors in October. This week they are exhibiting at RSA, introducing their security threat analysis platform and Threat Intelligence Center.

Xue says that at previous positions he’s held there was a lack of understanding of China’s unique landscape. He’d have to spend some of time at old jobs educating colleagues about, for example, enormous cybersecurity incidents in China that are so underreported in the West that they aren’t even mentioned in yearly wrap-ups of top global attacks. “I feel sometimes frustrated,” Xue says.

Jia says this is one of the things she wants ThreatBook to be able to fix. She says their focus is China-focused threat intelligence, and they’re very open to exchanging information with other companies and other organizations.

“Our company is a bridge,” she says. “We want to be the trusted contact in China.”

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

More Insights