At Treadstone 71, we fully grasp the need to target and understand those targeting your environment and staff. The Cyber and Threat Intelligence functions along with Security Operations, Incident Response, and Red Team operators all need detailed analysis in the form of dossiers to execute their tasks.
We create dossiers on given targets as supplied using Treadstone 71 methods and techniques. The intent of the dossiers is to document the Internet attack surface of each target supplying an organizational risk profile for each dossier.
Want to learn more? Complete the request at the below link and receive access to a Treadstone 71 Baseball Card.
Much has been written about Mr.Tekide and his crypters used by APT34 (OilRig, Muddywater) and others. Other organizations have documented information about Mr.Tekide’s tools in ‘celebrated’ cyber attacks against Fortune 500 institutions, governments, educational organizations, and critical infrastructure entities in the West, the EU, Israel, and Sunni majority nation-states.
Adversary hunting that defines the phrase.
However, identifying Mr.Tekide, his background, locations, and his own words has never been openly accomplished. Many believe that following an individual does not pay dividends. Treadstone 71 demonstrates the alignment of Mr.Tekide to the Iranian government through years of support using crypters such as the iloveyoucrypter, qazacrypter, and njRAT.
Treadstone 71 started tracking Mr.Tekide in the early days of Ashiyane as we did many of the members associated with this group and those registering for their forums. Soon thereafter we identified Mr.Tekide yet held back the identity from almost all entities, until now. The Treadstone 71 Baseball Card is the first publically released. The content is detailed.
Complete the form using a corporate email address. We do not sell your email addresses nor do we spam you with constant updates and marketing material. We do measure who is downloading out materials and may send the occasional email to you. What is occasional? May 2-3 a year at worst.
Targeting seeks to create specific desired effects through adversary identification, data collection, analysis, and dossier creation. Target analysis encompasses all possible legal means to create desired effects, drawing from all available capabilities.
The art of targeting creates desired effects with the least risk and expenditure of time and resources.
Adversary targeting is a fundamental task of the Treadstone 71 operational service encompassing many disciplines and demands participation from skilled intelligence operators with various technical, linguistic, and socio-cultural skills.