HYAS is a threat intelligence firm, a private company that tries to prevent or investigates hacks against its clients. Intel firm buys Location Data which is harvested from ordinary applications installed on persons phones in the whole world. However, it is operating to disclose hackers. This company is not a law enforcement agency, rather it is a business which track people to their “doorstep.”
Intel firm buys Location Data news high spots the multiplex supply chain and sale of location data. Going through the applications whose users are in some cases unknowing that the software is selling their location; by the means of data brokers and finally to end clients who use the data oneself. HYAS puts focus on Intel firm buys Location Data to identify the people behind attacks. Although it is unclear, the actual effectiveness of its products. HYAS’ location data comes from X-Mode, a company that started with an app named “Drunk Mode,” designed to prevent college students from making drunk phone calls. It has since pivoted to selling user data from a wide swath of apps.
“We track threat actors and other bad guys down to their physical doorstep for customers and clients,” the LinkedIn profile for HYAS CEO David Ratner reads. HYAS’ “Insight” product provides clients with a Google Maps-style interface to interact with the company’s datasets, according to HYAS’ website. Insight provides access to the firm’s “exclusive data sources” and “non-traditional collection mechanisms,” states the website.
Apps including X-Mode :
Applications that mention X-Mode in their privacy policies include Perfect365; a beauty app and other harmless looking apps such as an MP3 file converter. Intel firm buys Location Data and HYAS claims to have some Fortune 25 companies, large tech firms, as well as law enforcement and intelligence agencies as clients. “As a TI [threat intelligence] tool it’s incredible, but ethically it stinks,” a source in the threat intelligence industry who received a demo of HYAS’ product told Motherboard.
Hacker forums, private chat rooms and internet infrastructure such websites threat intelligence firms generally gather data from a wide range of sources.