Armor Blog

CYBER SECURITY & THREAT INTELLIGENCE FROM THE EXPERTS AT ARMOR.

Corey Milligan, Senior Threat Intel Analyst

Author's Blog Posts

Dec 52018

Supply Chain Attacks

| Senior Threat Intel Analyst

Trusting third-parties in order to quickly add infrastructure and/or expertise to your business has become a common and, in many cases, essential business practice. These trust relationships are usually built upon agreements that both parties will do their part in a responsible manner. While that may be the case, businesses in different verticals often have […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Aug 162018

Cyber Black Market: What You Wouldn’t Think a Hacker Wants

| Senior Threat Intel Analyst

It is not difficult to understand the value of stolen bank accounts, credit cards, and social security numbers to cybercriminals. Each of those items are pieces of the average person’s financial life, and the fact that they can easily translate to profits in the hands of sellers on the cyber black market should come as […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Jun 282018

Mid-Year Cybersecurity Threat Update

| Senior Threat Intel Analyst

The cybersecurity underground is not stagnant. Attackers are continuously innovating to find new ways to make money and exploit any weaknesses available.   When we released the Black Market Report in March, the Armor Threat Resistance Unit (TRU) research team  revealed the varying costs of personal data in the underground, as well as the thriving market for cybercrime-as-a-service. Throughout the first half of 2018  though, other trends have emerged. Most notably, the increasing interest […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Apr 102018

Credit Card Skimming: Big Business for Data Thieves on the Dark Web

| Senior Threat Intel Analyst

What if I told you that for as little as $10, I could use your credit card without your knowledge or permission? Thanks to the Dark Web, I can. From track data dumps to cloned cards, the buyers and sellers on Dark Web forums are in the market for credit card information, and there are […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Apr 32018

Stolen PII & Ramifications: Identity Theft and Fraud on the Dark Web

| Senior Threat Intel Analyst

When the U.S. Department of Justice announced the seizure of AlphaBay last year, they closed a criminal marketplace on the Dark Web known to have trafficked in everything from illegal drugs to malware over the course of two years. At the time of the takedown, AlphaBay was home to more than 350,000 listings, many of […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Mar 272018

Cybercrime-as-a-Service: Selling DDoS on the Dark Web

| Senior Threat Intel Analyst

Unlike legitimate cybersecurity jobs, cybercrime does not require certification or advanced degrees. In fact, the barrier of entry into the world of cybercrime remains extremely low, in large part due to the growth of cybercrime-as-a-service on the Dark Web. In The Black Market Report, our Threat Resistance Unit (TRU) researchers identified a full menu of […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.

Mar 202018

Reselling Hospitality: A Look at Hotel Rewards on the Dark Web

| Senior Threat Intel Analyst

Just about any piece of data can be turned into money on the Dark Web – from social security numbers to utility bills to credit card information. Since everything is fair game, it should be no surprise that rewards points are just another piece of data on that list. Look inside The Black Market Report, […]

Corey Milligan

Senior Threat Intel Analyst

Corey has more than 18 years of IT experience. Before coming to Armor, he worked his way up the Army ranks, retiring as a Chief Warrant Officer and one of the Army’s first Cyber Operations Technicians. He holds some of the industries most sought after certifications including CISSP, GCIA, GNFA, and GCTI. As a member of Armor’s Threat Response Unit, Corey provides threat intelligence support to the SOC and other divisions as needed, enhancing their efforts by collecting and analyzing open and closed source threat intelligence feeds, reporting on priority threats, identifying IOCs in support of network monitoring and incident response, and analyzing logs to identify hidden threats.