Discover New Attacks

Discover new attack vectors as they are being first used, or old attacks that are once again rearing their head.

You can choose from any available dates, and filter the results.

What you get

Use our data to quickly get the following insight:

Among other things, on 2015-06-26T00:00:00.000Z the Shotput backdoor and CookieCutter backdoor Malware, SMS phishing, and the Hacking Operation Operation Clandestine Fox were seen for the first time (in at least the last 30 days, if ever).

Interactive API

Our interactive API powered this example using the link below.
  https://www.surfwatchlabs.com/api/v3/static/swagger.html#!/summary/getCyberPracticeHeadlines_get_2

To try it yourself, you'll need your Application ID and Application Key from My API Profile.

The Response

An excerpt of actual output from this insight:

[
  {
    "analytic_day": "2015-06-26T00:00:00.000Z",
    "feed_id": -7,
    "feed_description": "Information Technology",
    "tag_id": 205161,
    "tag": "Shotput backdoor",
    "macro_tag_id": -300,
    "macro_tag": "Malware",
    "tag_super_type_id": 3,
    "tag_super_type": "Practice",
    "cyber_facts": [
      {
        "cyberfact_polarity": 0,
        "cyberfact_score": 62,
        "cyberfact_type_id": 1,
        "cyberfact_id": 285509,
        "event_date": "2015-06-23T00:00:00.000Z",
        "industry_targets": [
          {
            "industry_target_id": -11,
            "industry_target_description": "Default Industrials target",
            "industry_id": -11,
            "industry_description": "Industrials",
            "industry_group_id": 308,
            "industry_group_description": "Default Industrials group"
          },
          {
            "industry_target_id": -7,
            "industry_target_description": "Default Information Technology target",
            "industry_id": -7,
            "industry_description": "Information Technology",
            "industry_group_id": 304,
            "industry_group_description": "Default Information Technology group"
          },
          {
            "industry_target_id": -13,
            "industry_target_description": "Default Telecommunications Target",
            "industry_id": -13,
            "industry_description": "Telecommunications",
            "industry_group_id": 310,
            "industry_group_description": "Default Telecommunications group"
          },
          {
            "industry_target_id": 51217,
            "industry_target_description": "Adobe Systems Incorporated",
            "industry_id": -7,
            "industry_description": "Information Technology",
            "industry_group_id": 118,
            "industry_group_description": "Software",
            "market": "NASDAQ"
          }
        ],
        "tags": [
          {
            "tag_id": 100818,
            "tag": "security research",
            "macro_tag_id": -311,
            "macro_tag": "Security Research",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 163057,
            "tag": "threat advisory",
            "macro_tag_id": -513,
            "macro_tag": "Threat Intelligence",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 170896,
            "tag": "APT3",
            "macro_tag_id": -105,
            "macro_tag": "Identity Unknown",
            "tag_super_type_id": 1,
            "tag_super_type": "Actor"
          },
          {
            "tag_id": 170899,
            "tag": "CookieCutter backdoor",
            "macro_tag_id": -300,
            "macro_tag": "Malware",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 117050,
            "tag": "FireEye Inc",
            "macro_tag_id": -107,
            "macro_tag": "Information Security",
            "tag_super_type_id": 6,
            "tag_super_type": "Positive Actor"
          },
          {
            "tag_id": 105355,
            "tag": "Adobe Flash Player",
            "macro_tag_id": -224,
            "macro_tag": "Entertainment Software",
            "tag_super_type_id": 2,
            "tag_super_type": "Target"
          }
        ],
        "publication_date": "2015-06-26T00:00:00.000Z",
        "cyberfact_source": "https://twitter.com/SCMagazine/status/613472966588919808",
        "cyberfact_type": "Advisory",
        "data_feed_ids": [
          -7,
          -100
        ]
      }
    ]
  },
  {
    "analytic_day": "2015-06-26T00:00:00.000Z",
    "feed_id": -7,
    "feed_description": "Information Technology",
    "tag_id": 141823,
    "tag": "Operation Clandestine Fox",
    "macro_tag_id": -309,
    "macro_tag": "Hacking Operation",
    "tag_super_type_id": 3,
    "tag_super_type": "Practice",
    "cyber_facts": [
      {
        "cyberfact_polarity": 0,
        "cyberfact_score": 67,
        "cyberfact_type_id": 1,
        "cyberfact_id": 285524,
        "event_date": "2015-06-24T00:00:00.000Z",
        "industry_targets": [
          {
            "industry_target_id": 51217,
            "industry_target_description": "Adobe Systems Incorporated",
            "industry_id": -7,
            "industry_description": "Information Technology",
            "industry_group_id": 118,
            "industry_group_description": "Software",
            "market": "NASDAQ"
          }
        ],
        "tags": [
          {
            "tag_id": 171739,
            "tag": "phishing campaign advisory",
            "macro_tag_id": -513,
            "macro_tag": "Threat Intelligence",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 205168,
            "tag": "SHOTPUT backdoor",
            "macro_tag_id": -300,
            "macro_tag": "Malware",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 205167,
            "tag": "browser-based vulnerability",
            "macro_tag_id": -308,
            "macro_tag": "Software vulnerability exploit",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 197622,
            "tag": "Mike Oppenheim",
            "macro_tag_id": -107,
            "macro_tag": "Information Security",
            "tag_super_type_id": 6,
            "tag_super_type": "Positive Actor"
          }
        ],
        "publication_date": "2015-06-26T00:00:00.000Z",
        "cyberfact_source": "https://twitter.com/NohoPCRepair/status/613731103850000384/photo/1",
        "cyberfact_type": "Advisory",
        "data_feed_ids": [
          -7,
          -100
        ]
      },
      {
        "cyberfact_polarity": 0,
        "cyberfact_score": 52,
        "cyberfact_type_id": 1,
        "cyberfact_id": 285519,
        "event_date": "2015-06-23T00:00:00.000Z",
        "industry_targets": [
          {
            "industry_target_id": 51217,
            "industry_target_description": "Adobe Systems Incorporated",
            "industry_id": -7,
            "industry_description": "Information Technology",
            "industry_group_id": 118,
            "industry_group_description": "Software",
            "market": "NASDAQ"
          }
        ],
        "tags": [
          {
            "tag_id": 163057,
            "tag": "threat advisory",
            "macro_tag_id": -513,
            "macro_tag": "Threat Intelligence",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          }
        ],
        "publication_date": "2015-06-26T00:00:00.000Z",
        "cyberfact_source": "https://twitter.com/jon_whitlock/status/613731086720475136/photo/1",
        "cyberfact_type": "Advisory",
        "data_feed_ids": [
          -7,
          -100
        ]
      }
    ]
  },
  {
    "analytic_day": "2015-06-26T00:00:00.000Z",
    "feed_id": -10,
    "feed_description": "Consumer Goods",
    "tag_id": 10304,
    "tag": "SMS phishing",
    "macro_tag_id": -304,
    "macro_tag": "Social Engineering",
    "tag_super_type_id": 3,
    "tag_super_type": "Practice",
    "cyber_facts": [
      {
        "cyberfact_polarity": -1,
        "cyberfact_score": 62,
        "cyberfact_type_id": 8,
        "cyberfact_id": 285328,
        "event_date": "2015-06-24T00:00:00.000Z",
        "industry_targets": [
          {
            "industry_target_id": 205045,
            "industry_target_description": "Hotels.com L.P.",
            "industry_id": -10,
            "industry_description": "Consumer Goods",
            "industry_group_id": 60,
            "industry_group_description": "Leisure and Recreation",
            "industry_target_parent_id": 52395,
            "industry_target_parent_description": "Expedia",
            "market": "NASDAQ"
          }
        ],
        "tags": [
          {
            "tag_id": 17597,
            "tag": "unidentified hacker",
            "macro_tag_id": -105,
            "macro_tag": "Identity Unknown",
            "tag_super_type_id": 1,
            "tag_super_type": "Actor"
          },
          {
            "tag_id": 1128,
            "tag": "phishing",
            "macro_tag_id": -304,
            "macro_tag": "Social Engineering",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 15562,
            "tag": "stolen phone numbers",
            "macro_tag_id": -522,
            "macro_tag": "Personal Information Stolen/Leaked",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 8183,
            "tag": "stolen email addresses",
            "macro_tag_id": -522,
            "macro_tag": "Personal Information Stolen/Leaked",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 205058,
            "tag": "stolen travel bookings",
            "macro_tag_id": -522,
            "macro_tag": "Personal Information Stolen/Leaked",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 205057,
            "tag": "hotels.com users",
            "macro_tag_id": -266,
            "macro_tag": "Users",
            "tag_super_type_id": 2,
            "tag_super_type": "Target"
          },
          {
            "tag_id": 10304,
            "tag": "SMS phishing",
            "macro_tag_id": -304,
            "macro_tag": "Social Engineering",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 21361,
            "tag": "stolen names",
            "macro_tag_id": -522,
            "macro_tag": "Personal Information Stolen/Leaked",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          }
        ],
        "publication_date": "2015-06-26T00:00:00.000Z",
        "cyberfact_source": "http://securityfeed.info/en/index.php/hotels-com-phishing-scam-duping-travelers/",
        "cyberfact_type": "Data Breach",
        "data_feed_ids": [
          -100,
          -10
        ]
      },
      {
        "cyberfact_polarity": -1,
        "cyberfact_score": 62,
        "cyberfact_type_id": 2,
        "cyberfact_id": 285277,
        "event_date": "2015-06-24T00:00:00.000Z",
        "industry_targets": [
          {
            "industry_target_id": 52395,
            "industry_target_description": "Expedia",
            "industry_id": -10,
            "industry_description": "Consumer Goods",
            "industry_group_id": 60,
            "industry_group_description": "Leisure and Recreation",
            "market": "NASDAQ"
          }
        ],
        "tags": [
          {
            "tag_id": 15562,
            "tag": "stolen phone numbers",
            "macro_tag_id": -522,
            "macro_tag": "Personal Information Stolen/Leaked",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 8080,
            "tag": "redirect to malicious site",
            "macro_tag_id": -509,
            "macro_tag": "Infected/Exploited Assets",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 1128,
            "tag": "phishing",
            "macro_tag_id": -304,
            "macro_tag": "Social Engineering",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 1212,
            "tag": "unknown",
            "macro_tag_id": -105,
            "macro_tag": "Identity Unknown",
            "tag_super_type_id": 1,
            "tag_super_type": "Actor"
          },
          {
            "tag_id": 10304,
            "tag": "SMS phishing",
            "macro_tag_id": -304,
            "macro_tag": "Social Engineering",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 1289,
            "tag": "stolen personally identifiable information",
            "macro_tag_id": -522,
            "macro_tag": "Personal Information Stolen/Leaked",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 7430,
            "tag": "email users",
            "macro_tag_id": -266,
            "macro_tag": "Users",
            "tag_super_type_id": 2,
            "tag_super_type": "Target"
          },
          {
            "tag_id": 8183,
            "tag": "stolen email addresses",
            "macro_tag_id": -522,
            "macro_tag": "Personal Information Stolen/Leaked",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 21361,
            "tag": "stolen names",
            "macro_tag_id": -522,
            "macro_tag": "Personal Information Stolen/Leaked",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 205043,
            "tag": "hotels.com customers",
            "macro_tag_id": -262,
            "macro_tag": "Customers/Clients",
            "tag_super_type_id": 2,
            "tag_super_type": "Target"
          }
        ],
        "publication_date": "2015-06-26T00:00:00.000Z",
        "cyberfact_source": "https://threatpost.com/hotels-com-phishing-scam-duping-travelers/113457",
        "cyberfact_type": "Cyber Attack",
        "data_feed_ids": [
          -100,
          -10
        ]
      }
    ]
  },
  {
    "analytic_day": "2015-06-26T00:00:00.000Z",
    "feed_id": -100,
    "feed_description": "Universal Data Feed",
    "tag_id": 170899,
    "tag": "CookieCutter backdoor",
    "macro_tag_id": -300,
    "macro_tag": "Malware",
    "tag_super_type_id": 3,
    "tag_super_type": "Practice",
    "cyber_facts": [
      {
        "cyberfact_polarity": 0,
        "cyberfact_score": 62,
        "cyberfact_type_id": 1,
        "cyberfact_id": 285509,
        "event_date": "2015-06-23T00:00:00.000Z",
        "industry_targets": [
          {
            "industry_target_id": -7,
            "industry_target_description": "Default Information Technology target",
            "industry_id": -7,
            "industry_description": "Information Technology",
            "industry_group_id": 304,
            "industry_group_description": "Default Information Technology group"
          },
          {
            "industry_target_id": -11,
            "industry_target_description": "Default Industrials target",
            "industry_id": -11,
            "industry_description": "Industrials",
            "industry_group_id": 308,
            "industry_group_description": "Default Industrials group"
          },
          {
            "industry_target_id": 51217,
            "industry_target_description": "Adobe Systems Incorporated",
            "industry_id": -7,
            "industry_description": "Information Technology",
            "industry_group_id": 118,
            "industry_group_description": "Software",
            "market": "NASDAQ"
          },
          {
            "industry_target_id": -13,
            "industry_target_description": "Default Telecommunications Target",
            "industry_id": -13,
            "industry_description": "Telecommunications",
            "industry_group_id": 310,
            "industry_group_description": "Default Telecommunications group"
          }
        ],
        "tags": [
          {
            "tag_id": 117050,
            "tag": "FireEye Inc",
            "macro_tag_id": -107,
            "macro_tag": "Information Security",
            "tag_super_type_id": 6,
            "tag_super_type": "Positive Actor"
          },
          {
            "tag_id": 105355,
            "tag": "Adobe Flash Player",
            "macro_tag_id": -224,
            "macro_tag": "Entertainment Software",
            "tag_super_type_id": 2,
            "tag_super_type": "Target"
          },
          {
            "tag_id": 100818,
            "tag": "security research",
            "macro_tag_id": -311,
            "macro_tag": "Security Research",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 205160,
            "tag": "transportation industries",
            "macro_tag_id": -247,
            "macro_tag": "Facilities",
            "tag_super_type_id": 2,
            "tag_super_type": "Target"
          },
          {
            "tag_id": 8080,
            "tag": "redirect to malicious site",
            "macro_tag_id": -509,
            "macro_tag": "Infected/Exploited Assets",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 170899,
            "tag": "CookieCutter backdoor",
            "macro_tag_id": -300,
            "macro_tag": "Malware",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 163057,
            "tag": "threat advisory",
            "macro_tag_id": -513,
            "macro_tag": "Threat Intelligence",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 205159,
            "tag": "telecommunication industries",
            "macro_tag_id": -247,
            "macro_tag": "Facilities",
            "tag_super_type_id": 2,
            "tag_super_type": "Target"
          },
          {
            "tag_id": 204884,
            "tag": "CVE-2015-3113",
            "macro_tag_id": -308,
            "macro_tag": "Software vulnerability exploit",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 170896,
            "tag": "APT3",
            "macro_tag_id": -105,
            "macro_tag": "Identity Unknown",
            "tag_super_type_id": 1,
            "tag_super_type": "Actor"
          },
          {
            "tag_id": 1128,
            "tag": "phishing",
            "macro_tag_id": -304,
            "macro_tag": "Social Engineering",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          },
          {
            "tag_id": 205157,
            "tag": "defense facilities",
            "macro_tag_id": -247,
            "macro_tag": "Facilities",
            "tag_super_type_id": 2,
            "tag_super_type": "Target"
          },
          {
            "tag_id": 205158,
            "tag": "engineering facilities",
            "macro_tag_id": -247,
            "macro_tag": "Facilities",
            "tag_super_type_id": 2,
            "tag_super_type": "Target"
          },
          {
            "tag_id": 205156,
            "tag": "aerospace facilities",
            "macro_tag_id": -247,
            "macro_tag": "Facilities",
            "tag_super_type_id": 2,
            "tag_super_type": "Target"
          },
          {
            "tag_id": 24087,
            "tag": "hijacked device",
            "macro_tag_id": -520,
            "macro_tag": "Device Hijack",
            "tag_super_type_id": 5,
            "tag_super_type": "Effect"
          },
          {
            "tag_id": 205161,
            "tag": "Shotput backdoor",
            "macro_tag_id": -300,
            "macro_tag": "Malware",
            "tag_super_type_id": 3,
            "tag_super_type": "Practice"
          }
        ],
        "publication_date": "2015-06-26T00:00:00.000Z",
        "cyberfact_source": "https://twitter.com/SCMagazine/status/613472966588919808",
        "cyberfact_type": "Advisory",
        "data_feed_ids": [
          -7,
          -100
        ]
      }
    ]
  }
]

The Code

Here is the code to do it yourself:

import javax.ws.rs.client.Client;
import javax.ws.rs.client.ClientBuilder;
import javax.ws.rs.client.WebTarget;
import javax.ws.rs.core.MediaType;
import javax.ws.rs.core.MultivaluedHashMap;
import javax.ws.rs.core.MultivaluedMap;

public class PracticeHeadlines {

    private static final String API_BASE_URL = "https://www.surfwatchlabs.com:443/api/v3";

    public static void main( String[] args ) throws Exception {

        Client restClient = ClientBuilder.newClient();
        WebTarget target = restClient.target( API_BASE_URL )
                .path( "/summary/headlines/practiceHeadlines/daily" )
                .queryParam( "startDate", "2015-06-25" )
                .queryParam( "endDate", "2015-06-25" );

        MultivaluedMap headers = new MultivaluedHashMap<>();
        headers.add( "app-id", "your-app-id" );
        headers.add( "app-key", "your-app-key" );

        String response = target
                .request( MediaType.APPLICATION_JSON )  // alternately set "Content-Type" header
                .headers( headers )
                .get( String.class );

        System.out.print( response );
    }

}
Or view the source on GitHub
require 'rest_client'
require 'json'

url = 'https://www.surfwatchlabs.com:443/api/v3/summary/headlines/practiceHeadlines/daily'

header = {
  'content_type' => 'application/json',
  'app-key' => ENV['SURFWATCH_ANALYTICS_APP_KEY'],
  'app-id' => ENV['SURFWATCH_ANALYTICS_APP_ID'],
  params: {
    'startDate' => '2015-06-25',
    'endDate' => '2015-06-25'
  }
}
response = RestClient.get(url, header)
results = JSON.parse(response)
puts results
Or view the source on GitHub