Explore OpenCTI or OpenAEV platform with 30 days Free Trial!
XTM Hub by FiligranSign In
MokN logo

MokN

Deployable
Verified
Threat Intel Feed
Credential Compromise

Overview

The MokN connector retrieves login attempt events from the MokN Bait platform and converts them into STIX objects within OpenCTI. It processes attacker infrastructure, targeted accounts, and credential validation status to generate observables, indic

MokN provides intelligence on credential compromise attempts captured through deception-based authentication systems. By deploying bait login portals that mimic legitimate services, MokN records attacker login attempts and identifies when stolen credentials are used. This helps organizations detect potential account compromises early in the attack lifecycle.

When attackers interact with bait systems, MokN captures contextual information such as the source IP address, targeted username/password, and authentication outcome. This allows security teams to distinguish between credential harvesting attempts and cases where attackers possess valid credentials that may enable unauthorized access.

The MokN connector retrieves login attempt events from the MokN Bait platform and converts them into STIX objects within OpenCTI. It processes attacker infrastructure, targeted accounts, and credential validation status to generate observables, indicators, sightings, and incidents, enabling analysts to correlate credential compromise activity with existing threat intelligence and investigations.

Basic information

MokN
Vendor Contact
Connectors
External import
7.260305.0
0
    MokN | OpenCTI Integrations Library | XTM Hub by Filigran