Skip to main content
Version: 1.0.0

Threat Intelligence

Detektix automatically identifies and profiles entities that interact with your PhantomIDs. The Threat Intelligence module groups suspicious activity into threat actor profiles and enriches them with external data.

Threat Actors

Auto-Detection

The platform continuously analyzes incoming communications to detect threat actors — entities that show patterns of targeting your planted identities.

How Detection Works

The auto-detection engine examines:

  1. Phone numbers that call or text multiple PhantomIDs
  2. Email addresses that contact multiple planted identities
  3. SMS senders targeting your honeypot numbers
  4. Cross-channel patterns — the same source reaching out via different communication methods

Detection Thresholds

A source is flagged as a potential threat actor when it meets configurable thresholds:

CriterionDescription
Minimum honeypots contactedThe source must have contacted at least N different PhantomIDs
Minimum total contactsThe source must have made at least N total contacts
Lookback periodOnly activity within the last N days is considered

These thresholds filter out noise (single accidental calls) and surface genuine patterns of targeted activity.

Grouping Logic

The detection engine groups related sources into a single threat actor profile. For example, if the same caller uses two different phone numbers to contact your PhantomIDs, both numbers are linked to one threat actor.

Threat Actor Profiles

Navigate to Threat Actors to view and manage detected threat actor profiles.

Profile Overview

Each threat actor profile contains:

FieldDescription
NameAuto-generated or manually assigned identifier
DescriptionNotes about this threat actor
Threat LevelSeverity classification
SourcesPhone numbers, email addresses, and SMS numbers linked to this actor
First SeenWhen this actor first contacted a PhantomID
Last SeenMost recent contact
Total ContactsTotal number of communications across all channels
Unique HoneypotsNumber of distinct PhantomIDs contacted
TagsCategorization labels
Auto-detectedWhether this actor was found by auto-detection or created manually

Threat Levels

LevelDescriptionTypical Indicators
LowMinimal concern, single or infrequent contacts1-2 PhantomIDs contacted, low frequency
MediumModerate concern, clear pattern emerging3-5 PhantomIDs contacted, repeated contacts
HighSignificant threat, coordinated activity5+ PhantomIDs contacted, multiple channels used
CriticalConfirmed large-scale breach or ongoing attackSystematic targeting, high volume, cross-channel

Threat levels can be assigned automatically based on contact patterns or manually adjusted by analysts.

Source Attribution

Each threat actor has one or more sources — the actual identifiers used to contact your PhantomIDs:

  • Phone sources — Phone numbers that made calls
  • Email sources — Email addresses that sent messages
  • SMS sources — Numbers that sent text messages

For each source, the system tracks:

  • Total contact count
  • Number of unique PhantomIDs contacted
  • First and last seen timestamps
  • Communication channel

Activity Timeline

The activity timeline shows a chronological view of all interactions:

  • When each contact occurred
  • Which PhantomID was targeted
  • What channel was used (call, SMS, email)
  • Duration and content (for calls and messages)

Threat Actor Tags

Tags help categorize threat actors by type, origin, or investigation status:

  • Type tags — "Telemarketer", "Data Broker", "Fraud Ring", "Spam Bot"
  • Status tags — "Under Investigation", "Confirmed", "False Positive"
  • Origin tags — Geographic or organizational attribution

Create custom tags that match your investigation workflow and threat taxonomy.

Caller Enrichment

When a PhantomID receives a call, the system can automatically enrich the caller's information:

Enrichment DataDescription
CarrierThe caller's phone carrier/operator
Line typeMobile, landline, VoIP, or toll-free
CountryCaller's registered country
RegionMore specific geographic location
Spam scoreLikelihood the number is associated with spam
NameRegistered name (where available)

Enrichment data helps analysts quickly assess the nature of incoming contacts without manual lookup.

Domain Intelligence

The Intelligence section provides monitoring and analysis of domains related to your organization's threat landscape.

Domain Intelligence

Domain Monitoring

Track domains for:

  • Breach exposure — Has data from this domain appeared in known breaches?
  • Consumer leaks — Individual credential exposures tied to the domain
  • Corporate leaks — Larger-scale organizational data exposures
  • Threat feed mentions — Appearances in threat intelligence feeds

Data Awareness Scoring

The platform calculates a data awareness score for your PhantomIDs based on:

  • How many PhantomIDs have been contacted (compromised)
  • The velocity of new contacts
  • The diversity of contact sources
  • Cross-referencing with known injection targets

This score provides a high-level metric for how exposed your planted data has become — useful for executive reporting and trend tracking.

Creating Threat Actors Manually

While auto-detection handles most cases, you can also create threat actors manually:

  1. Navigate to Threat Actors
  2. Click Create Threat Actor
  3. Enter a name, description, and threat level
  4. Add known sources (phone numbers, email addresses)
  5. Assign tags for categorization

Manual creation is useful when you have intelligence from external sources (law enforcement, industry sharing groups) that you want to track alongside auto-detected actors.