ZombieZERO CTI
AI applied solution for next-generation security controlZombieZERO CTI analyzes cyber threat information collected from networks such as
OSINT and C-TAS, and endpoints based on AI to detect web forgery and falsification (d-face),
inserted malicious code in website and endpoint, and malicious domain/IP. It also provides and
predicts malware similarity and type, attack group, and technique information by improving
malicious file analysis accuracy.
ZombieZERO CTI
consists of three modules
- File AI
- URL AI
- Log AI
-
Detect
- • Website forgery and falsification detection
- • Automatic detection of malicious code in websites
- • Malicious URL, domain/IP detection
- • Automatic detection of chatbot-based attack techniques
-
Analyze
- • Malicious code similarity analysis (image-based)
- • Malicious code type analysis based on similarity
- • Compromise incident AI analysis
- • Chatbot-based event analysis
-
Predict
- • Malicious URL, domain/IP prediction
- • Prediction of new and variant malware
-
Provide Info.
- • Provides automatic identification information
- • for attack groups based on attack techniques

-
Because the initial analyst's misjudgment
and the information processor's mistake
may occur, ZombieZERO CTI automatically
classifies important and unnecessary information
based on AI analysis technology. -
Automatic threat analysis based on AI
as dependence on Threat Intelligence increases -
Prevent the spread of damage by
preemptively detecting and responding
to malicious code before it is used as a
malicious code distribution site or C&C server -
Automated attacker identification,
attack group and attack type analysis
for cause analysis
-
Because the initial analyst's
misjudgment and the information
processor's mistake may occur,
ZombieZERO CTI automatically
classifies important and
unnecessary information based on
AI analysis technology -
-
Automatic threat analysis based on AI as dependence on Threat Intelligence increases
-
Prevent the spread of damage
by preemptively detecting
and responding to malicious
code before it is used as a
malicious code distribution
site or C&C server -
-
Automated attacker
identification, attack group
and attack type analysis
for cause analysis
ZombieZERO CTI Applications

Service Name |
Customer | Delivery Method |
Service Description |
---|---|---|---|
URL hunter |
Domestic / Overseas Institutions |
Control service in conjunction with CTI |
Malicious URL detection and threat domain prediction through AI analysis and detection |
Domestic / Overseas Enterprises |
|||
CTI Portal |
Domestic / Overseas Institutions |
Service through portal establishment |
Provides CTI collection information through website inquiry and malicious similarity, type information, attack group, and attack technique information through AI analysis |
Domestic / Overseas Enterprises |
|||
Cloud-based Next-Gen. Security |
Domestic / Overseas Institutions |
Control service in conjunction with CTI |
Cloud-based security control service provides CTI collection information and AI analysis information |
Domestic / Overseas Enterprises |
|||
Personal user |
ZombieZERO CTI
provides Detect, Predict, Automatic identification
AI-based next-generationsecurity control service
• Extraction of anomaly characteristic
points from network topology
• Predict and block threat behavior
with node DNA
