SHAPE - BLACKFISH AI SYSTEM

Blackfish detects stolen credentials before they reach the darknet.

WHAT IS BLACKFISH? Blackfish is an artificial intelligence system to identify passwords stolen from data breaches that have not yet been discovered or disclosed, and whose data is not on the dark web. More than 3.3 billion credentials were reported stolen last year. The problem is so severe that NIST issued guidelines recommending that companies examine stolen password breach corpuses in order to ensure that their users were not using those passwords. In response, many companies have started engaging in dark web research in order to acquire stolen passwords and protect their users against them. Unfortunately, it can be months or years after a breach before stolen credentials are posted on the dark web, and a great deal of stolen data never shows up there at all. So darknet-sourced lists of stolen passwords are just not very valuable in protecting accounts against sophisticated attackers. WHAT MAKES BLACKFISH UNIQUE? Instead of relying on stolen credentials to someday appear on the dark web, Blackfish identifies freshly stolen credentials by observing where sophisticated cybercriminals use them. Blackfish builds on Shape’s machine learning platform which autonomously detects credential stuffing attacks. As one of the largest processors of login traffic in the world, Shape protects the logins to the most valuable accounts that cybercriminals target with credential stuffing attacks, including the top banks, airlines, and retailers. Blackfish AI sensors are able to identify the usernames and passwords that are used in those attacks and then invalidate those credentials across our customer network. HOW DOES BLACKFISH OPERATE SECURELY? The security of the Blackfish system itself was our most important design consideration. Blackfish’s patent-pending architecture incorporates multiple layers of encryption and access control, but the most important security feature is the ability to compare usernames and passwords against a list of known compromised credentials without ever storing the usernames and passwords themselves. This is accomplished with Bloom filters, a probabilistic data structure that allows Blackfish to perform lookups without ever maintaining a table of passwords.

Learn more at shapesecurity.com


Login to Leave A Comment
About The Company
Shape Security
  • Security
  • 2 Products
  • 3 Case Studies

Advanced Application Cyber-Defense. Shape protects web and mobile applications for the world's largest companies.

Discover, Learn and Evaluate AI Companies and Solutions

Save content to your library

Save case studies, articles, blog posts and more. Curate your research library with content directly from AI companies.

Login with LinkedIn Login with Twitter

Sign in with Email

The latest updates from AI companies in your industry

Get a weekly newsletter with the latest posts directly from the AI companies. Follow companies to tailor your feed.

LATEST | POPULAR
RAZORTHINK AI

The First True Enterprise Grade Artificial Intelligence Platform

SPARKCOGNITION, INC. - SPARKPREDICT®

Reimagine Industrial Maintenance. Optimize Asset Operations. The current maintenance paradigm is broken. Scheduled maintenance is costly and inefficient, but failures can be devastating to the bottom line.

SPARKCOGNITION, INC. - DEEPARMOR®

The Future of Endpoint Protection, Built from AI. The DeepArmor endpoint protection platform uses the power of big data and our patented machine learning algorithms to prevent the most advanced, modern-day attacks.

FORTEM TECHNOLOGIES - TRUEVIEW RADAR

Fortem TrueView™ Size, weight, power, and cost-reinvented. Fortem TrueView is a family of cost-effective and efficient (compact) military-tested radar solutions.

RECORDED FUTURE - THREAT INTELLIGENCE

Recorded Future enables you to proactively defend your organization from cyberattacks using threat intelligence powered by machine learning.

FORTEM TECHNOLOGIES - FORTEM DRONEHUNTER

DroneHunter™ is a fully autonomous UAS Airspace Defense Solution (ADS). DroneHunter™ is an intelligent (robotic) aircraft enabled with TrueView radar designed and engineered for physical remediation of intruder or threatening drones.

CALLSIGN - FOR EMPLOYEES

Proactively protect your employee identities to prevent data breaches without cumbersome and unmanageable authentication processes. Enhanced cyber security with Callsign.

CYLANCE - CYLANCEOPTICS

CylanceOPTICS is an AI-driven EDR component that provides consistent endpoint visibility for root cause analysis, threat hunting, incident response and containment.

CYLANCE - SMART ANTIVIRUS

The only antivirus to use Artificial Intelligence to protect against never-before-seen threats. Combining transparent pricing and intelligent protection.

CANARY - CANARY ALL-IN-ONE

All-in-one security with HD camera, siren, and air monitor.

CYLANCE - CYLANCEV

CylanceV is a malware detection tool to identify malware on endpoints. It leverages the power of artificial intelligence and machine learning techniques to hunt down threats across your organization.

Make sure your business and career keeps up with the changing world.
Sign up