Digital Shadows company logo

The profile is currenly unclaimed by the seller. All information is provided by CB Insights.

Founded Year



Acquired | Acquired

Total Raised




About Digital Shadows

On June 1st, 2022, Digital Shadows was acquired by ReliaQuest. Digital Shadows provides a digital risk management platform which combines scalable data analytics with human analysis to give customers the context and awareness they need to protect their digital footprint from digital risks including cyber threats, data exposure, brand exposure, VIP exposure, infrastructure exposure, physical threat, and third party risk. The company was founded in 2011 and is based in London, England.

Digital Shadows Headquarter Location

7 Westferry Circus Columbus Building, Level 6

London, England, E14 4HD,

United Kingdom

+44 (0) 203 393 7001

ESPs containing Digital Shadows

The ESP matrix leverages data and analyst insight to identify and rank leading companies in a given technology landscape.

Fintech / Cybersecurity

As high-value targets, banks require an understanding of the threat landscape to thwart potential attacks and reduce the risk of account compromise. Threat intelligence companies provide solutions that monitor the dark web for compromised credentials, deceive hackers with fake targets or virtual traps (i.e. honeypots), or provide information on the latest cyber threats and tactics of hackers.

Digital Shadows named as Challenger among 9 other companies, including Anomali, TrapX Security, and Cybersixgill.

Predict your next investment

The CB Insights tech market intelligence platform analyzes millions of data points on venture capital, startups, patents , partnerships and news mentions to help you see tomorrow's opportunities, today.

Research containing Digital Shadows

Get data-driven expert analysis from the CB Insights Intelligence Unit.

CB Insights Intelligence Analysts have mentioned Digital Shadows in 2 CB Insights research briefs, most recently on Mar 15, 2022.

Expert Collections containing Digital Shadows

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

Digital Shadows is included in 2 Expert Collections, including Regtech.



1,341 items

Technology that addresses regulatory challenges and facilitates the delivery of compliance requirements in FIs. Regulatory technology helps FIs and regulators address challenges ranging from traditional compliance and risk management to data reporting and transmission.



4,928 items

Latest Digital Shadows News

BRATA Android Malware Evolves Into an APT

Jun 21, 2022

The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities. PDF An Android-based banking Trojan known as BRATA (short for Brazilian RAT Android) has evolved to incorporate new phishing techniques and capabilities to acquire GPS, overlay, SMS, and device management permissions. The Italian mobile security company Cleafy reported in a blog post this week that these changes align with an advanced persistent threat (APT) pattern of activity. "Threat actors behind BRATA now target a specific financial institution at a time, and change their focus only once the targeted victim starts to implement consistent countermeasures against them," the blog post explained . "Then, they move away from the spotlight, to come out with a different target and strategies of infections." The new variant, which is targeting the EU region by posing as specific bank applications, can also now perform event logging through its ability to sideload a second-stage piece of malware from its command-and-control (C2) server. Ability to Bypass MFA The threat actors operating the new malware variant (BRATA.A) are also expanding their capabilities to include a methodology for potentially bypassing SMS-based multifactor authentication (MFA). The updated phishing technique can mimic a targeted bank's login page, part of the group's strategy to acquire personal information to be used later for social-engineering purposes. "Once installed, the pattern of the attack is similar to other SMS stealers," according to the blog post. "This consists in the malicious app asking the user to change the default messaging app with the malicious one to intercept all incoming messages." Credential harvesting is common in banking Trojans and stealer malware, but bypassing MFA is a bit more complicated. "This functionality, along with BRATA's ability to remain undetected for prolonged periods of time, could potentially classify the threat actors as an APT," says Nicole Hoffman, senior cyber threat intelligence analyst at Digital Shadows. BRATA Actors Thinking About Future Development From the perspective of John Bambenek, principal threat hunter at Netenrich, the ability to request additional permissions on the device indicates what the attackers are thinking as far as future development. "Not all the new features are actively collecting and transmitting data to the attacker, but future updates can change that," he says. "The actors are spending real effort to make sure they can maximize their success. Banks are constantly evolving, so attackers must do so also." He adds that because mobile malware is typically still just an app, consumers can protect themselves by only installing apps from approved app stores and be wary when apps are asking for banking credentials. "Financial institutions need to invest in behavioral analytics to detect stolen credential use against their online presence to prevent fraud against their consumers," Bambenek says. In a statement provided to Dark Reading, the Cleafy Threat Intelligence team notes BRATA's evolution suggests the threat actors plan to diversify their business model, and consequently its income. Cleafy's hypothesis is that BRATA is sold as malware-as-a-service (MaaS) to different groups, since the firm is tracking many variants of this malware hitting different countries across the globe. "It has been observed that they started refactoring part of the malware, in order to tailor it according to the requests of their customers," the statement reads. Evolution of a Trojan In January, Cleafy discovered the group behind BRATA manipulating Android's factory reset to prevent victims from discovering or reporting and preventing illicit wire transfers. At that point, the malware campaigns were targeting Italian banks. During the last year, BRATA was delivered through sideloading techniques , not through the official Google Play Store. Cleafy recommends users pay particular attention to downloading apps from untrusted websites or whenever SMS is required to install an application. "However, considering the Android 13 restriction for sideloaded apps, we do not exclude that in the future BRATA will be also delivered through official stores, like other famous malware have been trying to do in recent months (e.g. Sharkbot , Teabot etc. )," the statement continues. Kaspersky first discovered BRATA in 2019 when it was simply spyware and targeted at users in Brazil.

Digital Shadows Web Traffic

Page Views per User (PVPU)
Page Views per Million (PVPM)
Reach per Million (RPM)
CBI Logo

Digital Shadows Rank

  • When was Digital Shadows founded?

    Digital Shadows was founded in 2011.

  • Where is Digital Shadows's headquarters?

    Digital Shadows's headquarters is located at 7 Westferry Circus, London.

  • What is Digital Shadows's latest funding round?

    Digital Shadows's latest funding round is Acquired.

  • How much did Digital Shadows raise?

    Digital Shadows raised a total of $54.98M.

  • Who are the investors of Digital Shadows?

    Investors of Digital Shadows include ReliaQuest, Octopus Ventures, NAB Ventures, Plug and Play Fintech Accelerator, Passion Capital and 9 more.

  • Who are Digital Shadows's competitors?

    Competitors of Digital Shadows include Cybersixgill and 8 more.

You May Also Like

Recorded Future Logo
Recorded Future

Recorded Future delivers threat intelligence powered by patented machine learning to significantly lower risk, empowering organizations to reveal unknown threats before they impact business, and enable teams to respond to security alerts faster.

Cybersixgill Logo

Cybersixgill is a cyber threat intelligence company that covertly and automatically analyzes Dark Web activity detecting and preventing cyber-attacks and sensitive data leaks before they occur. Utilizing advanced algorithms, Cybersixgill's cyber intelligence platform provides organizations with continuous monitoring, prioritized real-time alerts, and actionable intelligence. Through advanced data mining and social profiling, Cybersixgill examines threat actors and their patterns of behavior, identifying and predicting cybercrime and terrorist activity.

Cobwebs Technologies Logo
Cobwebs Technologies

Cobwebs Technologies solutions are tailored to the operational needs of national security agencies and the private sector, identifying threats with just one click. Cobwebs solutions were designed by intelligence and security professionals as vital tools for the collection and analysis of data from all web layers: social media, open, deep and dark web. The web intelligence platform monitors these vast sources of data to reveal hidden leads and generate insights.

Flashpoint Logo

Flashpoint delivers Business Risk Intelligence (BRI) to allow business units and functions across organizations to make better decisions and mitigate risk. The company's Deep & Dark Web data, expertise, and technology enable customers to glean intelligence that informs risk and protects their ability to operate. Fortune 500 companies and government organizations utilize Flashpoint's intelligence across the enterprise, including bolstering cybersecurity, confronting fraud, detecting insider threats, enhancing physical security, assessing M&A opportunities, and addressing vendor risk and supply chain integrity. For corporations with limited experience availing themselves of Deep & Dark Web intelligence, Flashpoint has tailored offerings that deliver comprehensive reporting and monitoring on its behalf.

Cyble Logo

Cyble provides real-time and holistic visibility of supplier cyber threats and risks through automation, integration, and intelligence. Using an AI-powered security scoring mechanism, Cyble helps organizations assess cybersecurity risk in their supply chain, provides customized notifications of threats and risks related to their enterprise, operations, and supply chain, and allows companies to manage cyber-secure workflows with their vendors.

Intel 471 Logo
Intel 471

Intel 471 provides cybercrime intelligence, such as adversary and malware intelligence for security, fraud, and intelligence teams. It offers TITAN, an intuitive intelligence SaaS platform for intelligence and security professionals. It enables them to access structured information, dashboards, timely alerts, and intelligence reporting via web portal or API integration.

Discover the right solution for your team

The CB Insights tech market intelligence platform analyzes millions of data points on vendors, products, partnerships, and patents to help your team find their next technology solution.

Request a demo

CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.