KEYSTONE
THREAT
RESEARCH

Protecting Everyday People From Adversaries

We track, expose, and dismantle malspam and phishing campaigns that prey on ordinary people. From credential-harvesting kits to large-scale email fraud operations — we find them, document them, and shut them down.

View Research Areas Report a Threat
PHISH Campaign Tracking
SPAM Malspam Analysis
C2 Infrastructure Mapping
DOWN Adversary Takedowns
CTI Threat Intelligence

Research Areas

What We Study

We focus on the threats that hit closest to home — mass-scale phishing operations, malicious spam networks, and the adversaries behind them who target people with little to no cybersecurity training or support.

Phishing Campaign Analysis

End-to-end investigation of phishing kits, lure themes, hosting infrastructure, and threat actor patterns targeting consumers and small businesses.

Malspam Operations

Tracking high-volume malicious email campaigns distributing credential stealers, banking trojans, and ransomware to unsuspecting recipients.

Credential Harvesting

Identifying and cataloguing fake login pages, spoofed brands, and credential-theft infrastructure set up to defraud everyday users.

Adversary Infrastructure

Mapping the bulletproof hosting, domain registrars, and C2 frameworks used by threat actors to evade detection and sustain campaigns.

Social Engineering Tactics

Documenting evolving lure strategies — from fake parcel delivery SMS to IRS impersonation emails — that exploit trust and urgency.

Takedown & Disruption

Coordinating with registrars, hosting providers, and law enforcement to take down active threat infrastructure and protect potential victims.

Methodology

How We Work

A focused, repeatable process — from spotting a campaign in the wild to ensuring the infrastructure behind it goes dark.

01

Detection & Triage

We monitor spam traps, abuse feeds, and passive DNS to surface newly active phishing domains and malspam runs as they emerge.

02

Campaign Reconstruction

We reconstruct the full attack chain — from the initial lure email or SMS through to payload delivery and post-compromise objectives.

03

Infrastructure Mapping

Pivoting on IPs, certificates, registrant data, and kit fingerprints to uncover the full scope of an actor's hosting and distribution network.

04

Actor Attribution

Linking campaigns to known threat actors or clustering previously unattributed activity into tracked groups for ongoing monitoring.

05

Coordinated Takedown

Submitting abuse reports, working with upstream providers, and notifying impersonated brands to dismantle active threat infrastructure.

Contact

Get In Touch

Have a suspicious email, a phishing site tip, or want to partner on research? We want to hear from you.

General Inquiries
info@keystonethreatresearch.com
Report a Phishing Campaign or Malspam
report@keystonethreatresearch.com