Blog

Threat Hunting Blog

Threat Hunting Blog

Check out our latest threat hunting articles, tips and stories

Check out our latest threat hunting articles, tips and stories

Check out our latest threat hunting articles, tips and stories

Product Updates

Introducing Hunt 2.6: IP Risk & Reputation, Smarter IOC Hunting, and Faster Integrations

Oct 20, 2025

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.

Introducing Hunt 2.6: IP Risk & Reputation, Smarter IOC Hunting, and Faster Integrations

Oct 20, 2025

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.

Introducing Hunt 2.6: IP Risk & Reputation, Smarter IOC Hunting, and Faster Integrations
Oct 20, 2025

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.

Threat Research

Oct 2025

Introducing Hunt 2.6: IP Risk & Reputation, Smarter IOC Hunting, and Faster Integrations
Oct 20, 2025

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.

Threat Research

Oct 2025

Announcing Hunt 2.5

Aug 21, 2025

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.

Announcing Hunt 2.5

Aug 21, 2025

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.

Announcing Hunt 2.5
Aug 21, 2025

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.

Threat Research

Aug 2025

Announcing Hunt 2.5
Aug 21, 2025

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.

Threat Research

Aug 2025

Latest Articles

Type

Victim Region

Malware

Attack Technique

Release Date

From Munitions to Malware: Joseph Harrison on Threat Detection & Digital Forensics
Oct 23, 2025

In this interview, Joseph Harrison shares how his Air Force-minted discipline fuels his work in threat detection and digital forensics, and how he leverages Hunt.io’s data (especially JA4) to catch adversaries others miss.

Threat Research

Introducing Hunt 2.6: IP Risk & Reputation, Smarter IOC Hunting, and Faster Integrations
Oct 20, 2025

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.

Product News

Oct 16, 2025

A large-scale macOS malware campaign mimics trusted dev tools to spread Odyssey Stealer and AMOS via fake Homebrew sites. Learn more.

Threat Research

🇪🇺 Europe

🌎 North America

Odyssey Stealer

AMOS Spyware

Malware Delivery

Odyssey

AMOS

AdaptixC2 Uncovered: Capabilities, Tactics & Hunting Strategies
Oct 9, 2025

A deep dive into AdaptixC2: modular architecture, multi-protocol communication, evasion tactics, IOCs, and defense strategies.

Threat Research

🌏 Asia

AdaptixC2

Command & Control (C2)

AdaptixC2

Operation SouthNet: SideWinder Targets South Asia Maritime
Oct 1, 2025

SideWinder’s Operation SouthNet: South Asia phishing on Netlify/pages.dev, Zimbra/Outlook lures, and open directories. Maritime focus. IOCs included. Learn more.

Threat Research

🌏 Asia

SideWinder

Phishing & Social Engineering

APT Sidewinder

Hunting C2 Panels: Beginner’s Guide for Identifying Command and Control Dashboards
Sep 25, 2025

Beginner’s guide to hunting exposed C2 dashboards like Supershell, HookBot, Chaos, Unam, Mythic, and Metasploit using paths, titles, and hashes

Threat Research

🌍 Global

Command & Control (C2)

AsyncRAT Campaigns Uncovered: How Attackers Abuse ScreenConnect and Open Directories
Sep 18, 2025

Research on AsyncRAT campaigns using trojanized ScreenConnect installers and open directories, exposing resilient attacker infrastructure and C2 tactics. Learn more.

Threat Research

🌍 Global

AsyncRAT

Command & Control (C2)

Inside the 2025 Energy Phishing Wave: Chevron, Conoco, PBF, Phillips 66
Sep 11, 2025

Hunt.io uncovers the 2025 Energy Phishing Wave, with Chevron, Conoco, PBF, and Phillips 66 targeted by large-scale cloning and brand abuse. Learn more.

Threat Research

🌎 North America

MaaS

Phishing & Social Engineering

Interview with Daniel Plohmann: Malpedia, Malware Analysis, and Research Insights
Sep 9, 2025

Daniel Plohmann discusses building Malpedia, advancing malware research with MCRIT, and how metalcore and music inspire his work beyond security.

Threat Research

TinyLoader Malware: Crypto Theft & C2 Infrastructure
Sep 2, 2025

Investigation into TinyLoader malware stealing cryptocurrency via Redline Stealer, USB spread, and C2 infrastructure.

Threat Research

🌍 Global

TinyLoader

RedLine Stealer

Malware Delivery

Announcing Hunt 2.5
Aug 21, 2025

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.

Product News

APT MuddyWater Targets CFOs with Multi-Stage Phishing & NetBird Abuse
Aug 20, 2025

Hunt.io uncovers MuddyWater phishing campaigns using Firebase lures, VBS payloads, and NetBird for persistent remote access. Learn more.

Threat Research

🌍 Middle East

PowGoop

MuddyWater RAT

Malware Delivery

MuddyWater

ERMAC V3.0 Banking Trojan: Full Source Code Leak and Infrastructure Analysis
Aug 14, 2025

Hunt.io uncovers the complete ERMAC V3.0 source code, revealing its infrastructure, vulnerabilities, and expanded form injection capabilities.

Threat Research

🌍 Global

ERMAC v3

Malware Delivery

APT Sidewinder Abuses Netlify to Mimic Government and Military Portals in South Asia
Aug 8, 2025

APT Sidewinder targets South Asian government and military portals using Netlify-hosted phishing pages to harvest credentials. Learn more.

Threat Research

🌏 Asia

Phishing & Social Engineering

APT Sidewinder

APT36 Targets Indian Infrastructure with Desktop Lures and Poseidon Backdoor
Jul 31, 2025

APT36 expands its campaign beyond defense, using phishing, .desktop lures, and the Poseidon backdoor to target Indian infrastructure.

Threat Research

🇮🇳 India

Poseidon

Malware Delivery

APT36

Clickfix on macOS: AppleScript Stealer, Terminal Phishing, and C2 Infrastructure
Jul 22, 2025

Phishing campaign targets macOS with fake prompts that run AppleScript via terminal, stealing wallets, cookies, and sensitive files.

Threat Research

🇮🇳 India

🌏 Asia

Phishing & Social Engineering

Malware Delivery

APT36

630K gov.br Subdomains Abused in SEO Poisoning Attack
Jul 17, 2025

Over 630K hijacked gov.br subdomains were exploited in a black hat SEO campaign using cloaking, keyword stuffing, and redirect techniques. Learn more.

Threat Research

🌎 South America

Poseidon

GhostRAT

Abuse of Legitimate Services

Announcing Hunt 2.4
Jul 15, 2025

Hunt 2.4 adds archive-aware search, deeper SQL visibility, and improved phishing intel to make threat hunting faster, clearer, and more powerful.

Product News

Eggs, Alerts, and Adversaries: Talking with Jose Hernandez from Splunk
Jul 8, 2025

Splunk’s Jose Hernandez talks building detections, curious hires, Hunt.io in action, and balancing threat research with chickens and family life.

Threat Research

Threat Hunting at Scale: Explore 10.6B URLs to Find Payloads, C2s, and Exposed Assets with URLx
Jun 26, 2025

Explore 10.6B structured URLs with URLx. Find malware payloads, C2 paths, phishing campaigns, and exposed assets, fast.

Threat Research

Announcing Hunt 2.3: Improved Threat Hunting Experience & SSO Availability
Jun 25, 2025

Hunt 2.3 is here: analyst-driven insights, easier pivots, better phishing workflows, and full SSO support for enterprise teams.

Product News

Cobalt Strike PowerShell Loader Found on Chinese and Russian Infrastructure
Jun 19, 2025

Our threat hunters uncovered a PowerShell loader hosted by Chinese and Russian providers, linked to active Cobalt Strike infrastructure.

Threat Research

🌍 Global

Cobalt Strike

Malware Delivery

Fast and Curious: Red Teaming, Race Cars, and Hunt.io with Justin Elze
Jun 17, 2025

TrustedSec CTO Justin Elze shares red teaming insights, offensive tooling tips, and how he uses Hunt.io and AttackCapture™, plus his passion for race car data.

Threat Research

Introducing Hunt 2.2: AttackCapture™ Zip Extraction, Smarter SQL, IP History Consolidation, and more
Jun 12, 2025

Explore Hunt 2.2: Auto-unpack zips in AttackCapture™, smarter SQL with WHOIS and Nmap, and full IP history consolidation, track abused hosting with Host Radar, and more.

Product News

Paste.ee Abuse Uncovered: XWorm & AsyncRAT Infrastructure
Jun 5, 2025

See how attackers abuse paste.ee to deliver XWorm and AsyncRAT, using obfuscated scripts and globally distributed C2 infrastructure.

Threat Research

🌍 Global

AsyncRAT

XWorm

Malware Delivery

Track Threat Actors Using Real-World IOC Pivoting
May 29, 2025

Track attacker infrastructure with Hunt.io’s real-time IOC pivoting and threat actor intelligence. Learn more.

Threat Research

🌍 Global

IOC Pivoting

Introducing Hunt 2.1:  Refinements to the Threat Hunting Experience
May 21, 2025

Discover the new Hunt.io updates: deep text assisted analysis, IOC feed improvements, improved threat actor data, and faster advanced search. Learn more.

Product News

Shared SSH Keys Expose Phishing Infrastructure Targeting Kuwait
May 15, 2025

Shared SSH keys expose coordinated phishing targeting Kuwaiti fisheries, telecoms, and insurers with cloned login portals and mobile payment lures. Learn more.

Threat Research

🌍 Middle East

Phishing & Social Engineering

Detecting IOX, FRP, Rakshasa, and Stowaway Proxies Using Hunt.io
May 8, 2025

This post explores open-source proxy tools commonly used in attacker and red team infrastructure, and shows how defenders can detect IOX, FRP, Rakshasa, and Stowaway at scale using Hunt.io.

Threat Research

🌏 Asia

FRP/Rakshasa

Command & Control (C2)

APT36-Linked ClickFix Campaign Spoofs Indian Ministry of Defence, Targets Windows & Linux Users
May 5, 2025

APT36-style phishing campaign mimics India’s Ministry of Defence to drop malware on Windows and Linux via spoofed press releases and HTA payloads.

Threat Research

🇮🇳 India

Phishing & Social Engineering

APT36

APT34-Like Threat Infrastructure Uncovered Before Activation
Apr 22, 2025

APT34-like infrastructure mimicking an Iraqi academic institute and fake UK tech firms reveals early-stage staging on M247 servers. Learn what to track

Threat Research

🌍 Middle East

Karkoff

SideTwist

PowBAT

Command & Control (C2)

APT34

KeyPlug Server Exposes Fortinet Exploits & Webshell Activity Targeting a Major Japanese Company
Apr 17, 2025

Briefly exposed KeyPlug infrastructure revealed Fortinet exploits, encrypted webshells, and recon scripts targeting Shiseido, a major Japanese enterprise. Learn more..

Threat Research

🌍 Global

KEYPLUG

Tool & Infrastructure Exposure

Chinese APT

Server-Side Phishing: How Credential  Theft Campaigns Are Hiding in Plain Sight
Apr 15, 2025

Phishing campaign evades detection with server-side logic. See how employee portals are targeted—and how defenders can uncover them. Learn more.

Threat Research

🌍 Global

Pterodo

ShadowPad

Phishing & Social Engineering

Gamaredon

ShadowPad ecosystem

GoPhish Infrastructure Targets Polish Energy and Government
Apr 10, 2025

Explore how the GoPhish framework was leveraged to stage infrastructure and domains spoofing Polish government and energy entities.

Threat Research

🇵🇱 Poland

Gopish

Phishing & Social Engineering

Hunt.io Insights: Gamaredon’s Flux-Like Infrastructure and a Look at Recent ShadowPad Activity
Apr 8, 2025

Explore Gamaredon’s flux-like DNS and ShadowPad malware infrastructure, with insights into how these attacker networks are configured, rotated, and maintained.

Threat Research

🇪🇺 Europe

🌏 Asia

ShadowPad

Command & Control (C2)

Proactive ClickFix Threat Hunting with Hunt.io
Apr 3, 2025

Learn how Hunt.io identifies early-stage ClickFix delivery pages across the web using advanced search capabilities to stay ahead of exploitation attempts.

Threat Research

🌏 Asia

ClickFix

Phishing & Social Engineering

APT36

Russian-Speaking Threat Actor Abuses Cloudflare & Telegram in Phishing Campaign
Apr 1, 2025

Learn how a Russian-speaking threat actor has evolved from impersonating EFF to now deploying Cloudflare-themed phishing with Telegram-based C2.

Threat Research

🇷🇺 Russian

Abuse of Legitimate Services

URLx Just Got Bigger: 10.6B URLs for Recon and Malicious Infrastructure Hunting
Mar 27, 2025

Explore exposed infrastructure with URLx: 10.6B+ URLs, HTTPx integration, and advanced filtering - now live in Hunt.io.

Product News

A Practical Guide to Uncovering Malicious Infrastructure With Hunt.io
Mar 25, 2025

Learn how to track and map adversary infrastructure using Hunt, pivoting from a single IP to uncover hidden connections through infrastructure overlaps and key intelligence indicators.

Threat Research

🌍 Global

Malware Delivery

Introducing IOC Hunter Feed and Attribution for Enhanced Threat Intelligence
Mar 20, 2025

Track threat actors and malicious infrastructure with Hunt.io’s IOC Hunter Feed and C2 Attribution. Get deeper visibility and context for better threat intelligence.

Product News

South Korean Organizations Targeted by Cobalt Strike ‘Cat’ Delivered by a Rust Beacon
Mar 18, 2025

Discover how threat actors used a Rust loader to deploy Cobalt Strike ‘Cat’ against South Korean targets. Learn more.

Threat Research

🇰🇷 South Korea

Cobalt Strike

Malware Delivery

DPRK (North Korea)

JSPSpy and ‘Filebroser’: A Custom File Management Tool in Webshell Infrastructure
Mar 11, 2025

Discover how threat actors deploy a rebranded File Browser alongside JSPSpy for stealth file management on compromised servers.

Threat Research

JSPSpy

FileBrowser

Malware Delivery

Lazarus Group

Introducing Hunt 2.0: Deeper Threat Analysis & Enhanced Data for Cyber Intelligence
Mar 6, 2025

Our latest release delivers deeper threat analysis with improved threat actor, C2, malware data, and new integrations for robust cyber intelligence.

Product News

Exposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2
Mar 4, 2025

Discover how an open directory exposed a threat actor impersonating EFF to target gamers and how we mapped their infrastructure to Stealc & Pyramid C2.

Threat Research

🌍 Global

Stealc

Pyramid

Phishing & Social Engineering

Malware Delivery

Russian APT

Uncovering Joker’s C2 Network: How Hunt’s SSL History Exposed Its Infrastructure
Feb 27, 2025

Discover Joker malware infrastructure with Hunt SSL History, mapping its C2 network through certificate tracking of recent and past activity.

Threat Research

🌍 Global

Joker

Certificate & TLS Abuse

LightSpy Malware Now Targets Facebook & Instagram Data
Feb 20, 2025

A new LightSpy server expands its attack scope, targeting Facebook and Instagram database files. Explore its evolving capabilities and infrastructure.

Threat Research

🌏 Asia

LightSpy

Data Theft & Exfiltration

Chinese APT

Backdoored Installers for Signal, Line, and Gmail Target Chinese-Speaking Users
Feb 18, 2025

Read how attackers distribute backdoored Signal, Line, and Gmail installers through fraudulent download pages and how to defend against this campaign.

Threat Research

🇨🇳 China

Backdoor Installer

Malware Delivery

Advanced Threat Hunting with New SSL Features: Unlocking HuntSQL™ Anomaly Flags for Deeper Detection
Feb 13, 2025

Hunt.io enhances SSL threat hunting with new anomaly flags in HuntSQL™, improving the detection of misconfigurations, expired certificates, and malware infrastructure.

Product News

Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
Feb 12, 2025

Discover how Pyramid, an open-source tool, enables post-exploitation. Learn detection methods using HTTP headers and recent findings in Hunt.

Threat Research

Pyramid

Reconnaissance & Scanning

SmokeLoader Malware Targets Ukraine’s Auto & Banking Sectors via Open Directories
Feb 6, 2025

Attackers used open directories to spread SmokeLoader malware, luring Ukraine’s auto and banking sectors. Explore findings, execution, and tactics.

Threat Research

🇺🇦 Ukraine

SmokeLoader

Abuse of Legitimate Services

GreenSpot APT Targets 163.com Users with Fake Download Pages & Spoofed Domains
Feb 4, 2025

GreenSpot APT targets 163.com users via fake download pages and domain spoofing. Learn their tactics, risks, and how to protect your email accounts.

Threat Research

🌏 Asia

Phishing & Social Engineering

GreenSpot APT

Unlock SSL Intelligence: How SSL History Boosts Threat Hunting
Jan 30, 2025

Explore how SSL intelligence and SSL history empower proactive threat hunting. Learn tools, real-world examples, and strategies to track cyber threats.

Threat Research

Unmasking SparkRAT: Detection & macOS Campaign Insights
Jan 28, 2025

Explore SparkRAT detection tactics, macOS targeting, and insights into recent DPRK-linked campaigns with actionable research findings.

Threat Research

🌏 Asia

SparkRAT

Command & Control (C2)

DPRK (North Korea)

Suspected KEYPLUG Infrastructure: TLS Certificates and GhostWolf Links
Jan 23, 2025

Uncover how Hunt’s TLS records reveal patterns in suspected KEYPLUG infrastructure, linking GhostWolf and RedGolf/APT41 to ongoing activity.

Threat Research

🌏 Asia

KEYPLUG

Certificate & TLS Abuse

APT41

GhostWolf

VS Code Extension Impersonating Zoom Targets Google Chrome Cookies
Jan 21, 2025

Uncover a deceptive VS Code extension, masquerading as Zoom, that pilfers your Google Chrome cookies. Join us as we expose the techniques behind this alarming supply chain campaign.

Threat Research

🌍 Global

Malicious Extension

Malware Delivery

‘JustJoin’ Landing Page Linked to Suspected DPRK Activity Resurfaces
Jan 14, 2025

Learn how a landing page mimicking “JustJoin,” tied to suspected DPRK cyber activity, has reappeared with new infrastructure linked through SSH key overlaps.

Threat Research

🇰🇷 South Korea

Credential Reuse

DPRK (North Korea)

Cyberhaven Extension Compromise: TLS Certificates Reveal Hidden Infrastructure
Jan 9, 2025

Read more about connections through a TLS certificate linking reported and unreported infrastructure tied to the Cyberhaven extension compromise.

Threat Research

🌍 Global

Malicious Extension

Certificate & TLS Abuse

Golang Beacons and VS Code Tunnels: Tracking a Cobalt Strike Server Leveraging Trusted Infrastructure
Jan 7, 2025

Learn how a Cobalt Strike server with a TLS certificate and prominent watermark showed a Golang-compiled beacon communicating with Visual Studio Code tunnels.

Threat Research

🌍 Global

Cobalt Strike

Command & Control (C2)

Dec 20, 2024

Discover Hunt.io's 2024 highlights: major product launches, innovations like AttackCapture™, C2 Feed, and Hunt SQL, and a look ahead to 2025.

Product News

Oyster’s Trail: Resurgence of Infrastructure Linked to Ransomware and Cybercrime Actors
Dec 12, 2024

Our latest analysis uncovers domains linked to the Oyster backdoor, revealing suspected Vanilla Tempest infrastructure and offering insights into server configuration patterns.

Threat Research

🇪🇺 Europe

🌎 North America

Oyster

IOC Pivoting

Vanilla Tempest

“Million OK!!!!” and the Naver Facade: Tracking Recent Suspected Kimsuky Infrastructure
Dec 10, 2024

Learn how the 'Million OK!!!' HTTP response previously linked to Kimsuky has reappeared on new IPs and domains. This update provides the latest insights into evolving infrastructure, helping defenders stay informed on potential North Korean threat activity.

Threat Research

🇰🇷 South Korea

Beacon Reuse

Kimsuky

MoqHao Leverages iCloud and VK in Campaign Targeting Apple IDs and Android Device
Dec 5, 2024

Discover how the MoqHao campaign leveraging iCloud and VK employs cross-platform tactics to steal credentials and distribute malicious APKs.

Threat Research

🌏 Asia

MoqHao

Phishing & Social Engineering

Rare Watermark Links Cobalt Strike 4.10 Team Servers to Ongoing Suspicious Activity
Dec 3, 2024

Uncover the infrastructure and learn how a unique watermark led to the discovery of Cobalt Strike 4.10 team servers impersonating well-known brands.

Threat Research

🌍 Global

Cobalt Strike

Command & Control (C2)

 Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
Nov 28, 2024

Learn how threat actors leverage open directories to deliver XWorm malware disguised as popular software, providing insight into their tactics.

Threat Research

🌍 Global

XWorm

Malware Delivery

DarkPeony’s Trail: Certificate Patterns Point to Sustained Campaign Infrastructure
Nov 21, 2024

Explore how DarkPeony's consistent use of certificates reveals ongoing infrastructure activity, indicating consistent operations across different regions.

Threat Research

🌏 Asia

🇪🇺 Europe

DarkPeony

Certificate & TLS Abuse

XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method
Nov 19, 2024

Discover XenoRAT’s adoption of Excel XLL files and Confuser’s tactical shift from its usual methods, with our insights on adapting to evolving malware techniques.

Threat Research

🌍 Global

XenoRAT

Evasion & Obfuscation

DPRK (North Korea)

Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator
Nov 12, 2024

Sliver C2 and Ligolo-ng join forces in a campaign likely targeting Y Combinator, revealing tactics and infrastructure aimed at the accelerator's network. Learn more.

Threat Research

🌎 North America

Sliver

Ligolo-ng

Command & Control (C2)

RunningRAT’s Next Move: From Remote Access to Crypto mining For Profit
Nov 5, 2024

RunningRAT has shifted from access-driven tactics to crypto mining, using open directories to stage payloads and reduce direct C2 traffic.

Threat Research

🌍 Global

RunningRAT

XMRig

Botnet Activity, Cryptomining

Tricks, Treats, and Threats: Cobalt Strike & the Goblin Lurking in Plain Sight
Oct 31, 2024

Discover an open directory of red team tools fit for Halloween, from Cobalt Strike to BrowserGhost.

Threat Research

Cobalt Strike

BrowserGhost

Tool & Infrastructure Exposure

Suspected DPRK Phishing Campaign Targets Naver; Separate Apple Domain Spoofing Cluster Identified
Oct 29, 2024

Explore a suspected North Korean-linked phishing campaign targeting Naver and how unknown actors use distinct TLS certificates to spoof Apple domains.

Threat Research

🇰🇷 South Korea

Phishing & Social Engineering

DPRK (North Korea)

Rekoobe Backdoor Discovered in Open Directory, Possibly Targeting TradingView Users
Oct 24, 2024

Discover how an open directory of Rekoobe malware samples led to different domains resembling trading platforms, posing risks for traders and investors.

Threat Research

🌍 Global

Rekoobe

Malware Delivery

WarmCookie Infrastructure Update: Uncovering New C2 Servers and Threats
Oct 17, 2024

Get an inside look at Warmcookie’s updated C2 infrastructure linked to its latest update. We reveal insights into newly identified servers that can assist defenders in identifying related servers.

Threat Research

WarmCookie

Command & Control (C2)

Introducing Code Search on AttackCapture: Uncover Exploit Code, Reverse Shells, C2 Configs, and More
Oct 15, 2024

Read how CodeSearch helps security professionals to identify exploit code, reverse shells, and C2 configs across open directories, enhancing threat detection.

Threat Research

Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
Oct 10, 2024

Learn how basic tracking techniques using unusual certificates and redirects helped uncover Earth Baxia and a hidden cyber threat, providing practical insights for network defense.

Threat Research

🌏 Asia

PlugX

Tool & Infrastructure Exposure

Earth Baxia

Inside a Cybercriminal’s Server: DDoS Tools, Spyware APKs, and Phishing Templates
Oct 8, 2024

Explore our in-depth analysis of a cybercriminal’s server, revealing DDoS tools, SpyNote spyware, phishing sites, and ransomware tactics.

Threat Research

🌍 Global

SpyNote

DDoS Scripts

Tool & Infrastructure Exposure

Announcing Hunt SQL
Oct 3, 2024

We’re excited to release Hunt SQL and to provide the power and flexibility of SQL to researchers, analysts and threat hunters alike. 

Product News

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection  | Hunt.io
Oct 1, 2024

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection | Hunt.io

Threat Research

Packed Python Script

Evasion & Obfuscation

Echoes of Stargazer Goblin: Analyzing Shared TTPs from an Open Directory
Sep 24, 2024

Check out our new blog post on exposed files found in an open directory that reveal an attack with overlapping TTPs linked to the Stargazers network.

Threat Research

Initial Access & Exploitation

Announcing Hunt APIs
Sep 17, 2024

Today Hunt is announcing our IP Enrichment API. You can get detailed data on every IPv4 Address and enrich any existing system.

Product News

Decoy Docs and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Sep 10, 2024

Compromising a browser can be a goldmine for attackers, offering extensive access to sensitive user data ...

Threat Research

🇰🇷 South Korea

Malicious Extension

Phishing & Social Engineering

Kimsuky

ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
Sep 3, 2024

The ToneShell backdoor, frequently associated with Mustang Panda (also known as Stately Taurus and Earth Preta...

Threat Research

🌍 Global

ToneShell

Phishing & Social Engineering

Mustang Panda

Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims
Aug 29, 2024

During a recent analysis of known Latrodectus infrastructure, our research team encountered a command-and-control...

Threat Research

🇰🇷 South Korea

Latrodectus

Fake Installer

Malware Delivery

Launching AttackVault by Hunt.Io
Aug 23, 2024

We originally launched our "Open Directory" feature in Hunt a year ago.  The premise behind it was to get into the mind of the attacker by get a backstage view into their attacks.  What we learned was that there was a ton of information that could be correlated and indexed.  Today, we're reaffirming our commitment to getting into the tooling of attackers by launching AttackCapture™ by Hunt.io.

Product News

EvilGophish Unhooked: Insights Into the Infrastructure and Notable Domains
Aug 13, 2024

In late 2023, Hunt Research published a blog post detailing how we uncover emerging and previously unknown Gophish infrastructure.

Threat Research

Gophish

Phishing & Social Engineering

Pentester or Threat Actor? Open Directory Exposes Test Results and Possible Targeting of Government Organizations
Aug 7, 2024

During routine research of newly identified open directories, the Hunt Research Team made a startling discovery: a...

Threat Research

Tool & Infrastructure Exposure

macOS Malware Impersonates The Unarchiver App to Steal User Data | Hunt.io
Jul 30, 2024

Discover how macOS malware tricks users into downloading an app disguised as The Unarchiver app. The app contains a binary named “CryptoTrade” designed to steal sensitive user information.

Threat Research

🌍 Global

CryptoTrade

Malware Delivery

A Simple Approach to Discovering Oyster Backdoor Infrastructure | Hunt.io
Jul 23, 2024

Oyster backdoor, also known as Broomstick (IBM) and CleanUpLoader (RussianPanda – X), has been linked to...

Threat Research

Oyster

IOC Pivoting

SEO Poisoning Campaigns Target Browser Installers and Crypto Sites, Spreading Poseidon, GhostRAT & More
Jul 16, 2024

The Hunt Research Team recently stumbled upon Search Engine Optimization (SEO) poisoning campaigns posing as ...

Threat Research

🌍 Global

Poseidon

Gh0st RAT

Malware Delivery

The Secret Ingredient: Unearthing Suspected SpiceRAT Infrastructure via HTML Response
Jul 11, 2024

Reports on new malware families often leave subtle clues that lead researchers to uncover additional infrastructure not...

Threat Research

🇪🇺 Europe

🌏 Asia

SpiceRAT

Malware Delivery

ProxyLogon and ProxyShell Used to Target Government Mail Servers in Asia, Europe, and South America
Jul 2, 2024

Nearly three years after ProxyLogon and ProxyShell wreaked widespread havoc on Microsoft Exchange servers, the Hunt

Threat Research

🌏 Asia

🇪🇺 Europe

🌎 South America

Initial Access & Exploitation

Geacon and Geacon_Pro: A Constant Menace to Linux and Windows Systems
Jun 27, 2024

The red-teaming tool Cobalt Strike has long been a staple for simulating attacks, predominantly targeting Windows ...

Threat Research

🌍 Global

Geacon

Command & Control (C2)

Chinese APT

Good Game, Gone Bad: Xeno RAT Spread Via .gg Domains and GitHub
Jun 25, 2024

XenoRAT, an open-source malware available on GitHub, has been linked to a North Korean hacking group and unnamed...

Threat Research

🌍 Global

XenoRAT

Abuse of Legitimate Services

DPRK (North Korea)

Caught in the Act: Uncovering SpyNote in Unexpected Places
Jun 20, 2024

In hidden corners of the Internet, open directories often serve as treasure troves, offering a glimpse into the unguarded...

Threat Research

SpyNote

Malware Delivery

Open Directories Expose Publicly Available Tools Targeting Asian Organizations
Jun 18, 2024

The Hunt Research Team recently identified an exposed web server used to target the Taiwanese Freeway Bureau and a...

Threat Research

🌏 Asia

Tool & Infrastructure Exposure

Chinese APT

Gh0st and Pantegana: Two RATs that Refuse to Fade Away
Jun 12, 2024

Gh0st and Pantegana remote access tools/trojans (RATs) may seem unlikely to be discussed, but both have made notable...

Threat Research

🌍 Global

Gh0st RAT

Pantegana RAT

Malware Delivery

DriftingCloud

Jun 6, 2024

In this post, we'll detail the infrastructure of the LightSpy spyware framework and highlight the unique TLS certificate...

Threat Research

🌏 Asia

LightSpy

Certificate & TLS Abuse

Legacy Threat: PlugX Builder/Controller Discovered in Open Directory
Jun 5, 2024

The threat actor(s) built and controlled at least one of the binaries on the same server, granting us access to numerous..

Threat Research

PlugX

Tool & Infrastructure Exposure

Chinese APT

SolarMarker: Hunt Insights and Findings
May 30, 2024

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.

Threat Research

🌎 North America

🇪🇺 Europe

SolarMarker

Malware Delivery

Multi-Stage Infection

Tales from the Hunt: A Look at Yakit Security Tool
May 28, 2024

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.

Threat Research

Yakit

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.

Threat Research

Into the Viper’s Nest: Observations from Hunt’s Scanning
May 8, 2024

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...

Threat Research

Spotting SparkRAT: Detection Tactics & Sandbox Findings
Apr 23, 2024

The Hunt Research Team vigilantly monitors GitHub, sifts through the IOC sections of threat intelligence reports, and scours various online forums for emerging threats, ensuring our detections stay practical and current for our customers. Our focus frequently turns to lesser-known threats that can still wreak havoc on the networks of uninformed defenders.

Threat Research

SparkRAT

Lateral Movement & Persistence

In Plain Sight: Uncovering SuperShell & Cobalt Strike from an Open Directory
Apr 16, 2024

Hunt scans every corner of the public IPV4 space and constantly scours the Internet for open directories. Through...

Threat Research

SuperShell

Cobalt Strike

Tool & Infrastructure Exposure

BlueShell: Four Years On, Still A Formidable Threat
Apr 9, 2024

Platforms like GitHub offer a valuable resource for developers and the open-source community. However, these sites also create a potential...

Threat Research

BlueShell

Malware Delivery

A Hunt How-To: Detecting RedGuard C2 Redirector
Apr 2, 2024

If you’re like me, you’ve likely read multiple reports on network intrusions involving a “standard” deployment...

Threat Research

RedGuard

Command & Control (C2)

Coin Miner and Mozi Botnet
Mar 28, 2024

Open directories can sometimes contain unexpected dangers in the hidden parts of the internet. Our recent investigation...

Threat Research

Mozi

XMRig

Botnet Activity, Cryptomining

A Treasure Trove of Trouble: Open Directory Exposes Red Team Tools
Mar 21, 2024

While open directories are often seen as a goldmine for security researchers and blue teams searching for malware...

Threat Research

Mimikatz

Tool & Infrastructure Exposure

One More Trip to The W3LL: Phishing Kit Targets Outlook Credentials
Mar 19, 2024

The W3LL Phishing Kit, a phishing-as-a-service (PAaS) tool, was identified by Group-IB in 2022. What makes the kit...

Threat Research

🌍 Global

W3LL

Phishing & Social Engineering

Hunting PrismX: Techniques for Network Discovery
Mar 12, 2024

Described on its GitHub README as an "Integrated lightweight cross-platform penetration system," PrismX goe...

Threat Research

PrismX

Reconnaissance & Scanning

Open Directory Exposes Phishing Campaign Targeting Google & Naver Credentials
Mar 5, 2024

Over the past month, Hunt has tracked an ongoing phishing campaign by a likely North Korean threat actor focused on...

Threat Research

🇰🇷 South Korea

🌍 Global

Phishing & Social Engineering

DPRK (North Korea)

Feb 28, 2024

Hunt is tracking an ongoing sophisticated phishing campaign targeting individuals in the Telegram groups focused on...

Threat Research

🌍 Global

Pyramid

NK Dropper

Phishing & Social Engineering

DPRK (North Korea)

Unveiling the Power of Tag Cloud: Navigating the Digital Landscape with Precision
Feb 14, 2024

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...

Threat Research

Tracking ShadowPad Infrastructure Via Non-Standard Certificates
Feb 9, 2024

This post will examine ShadowPad infrastructure linked to a yet-to-be-identified threat actor. What makes this activity...

Threat Research

🌏 Asia

ShadowPad

Certificate & TLS Abuse

Feb 6, 2024

Where national interests, strategic ambitions, and sometimes personal gain intertwine, state-linked cyber threat actors...

Threat Research

The Accidental Malware Repository: Hunting & Collecting Malware Via Open Directories (Part 1)
Feb 1, 2024

This post will serve as the first in a long series of articles on using the platform to identify malicious infrastructure and hunt...

Threat Research

Introducing Hunt Advanced Search
Jan 30, 2024

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...

Threat Research

How We Identify Malicious Infrastructure At Hunt.io
Jan 24, 2024

ShadowPad, Quasar RAT, HeadLace, Emotet, and SIGNBT (to name a few) often grab headlines and captivate readers...

Threat Research

Introducing the Hunt.io C2 Feed
Jan 15, 2024

It’s been a while since we announced a new feature, and with 2024 already in full swing, it is time to highlight what’s...

Product News

Announcing IOC-Hunter
Nov 14, 2023

As the end of the year approaches, we continue to enhance our feature set by building on well-established threat-...

Product News

Gateway to Intrusion: Malware Delivery Via Open Directories
Oct 31, 2023

Attackers constantly devise new and sophisticated methods of delivering malware to infiltrate systems and exfiltrate...

Threat Research

Malware Delivery

How Hunt.io Identifies Services on Non-Standard Ports
Oct 25, 2023

The term “threat hunting” is generally associated with detecting malicious behavior on endpoints manually...

Threat Research

Phish No More: A Hunt.io Guide to Gophish Detection
Oct 12, 2023

Phishing is more than a social engineering technique; it's a harrowing threat landscape where deception, innovation, and vigilance collide.

Threat Research

Sep 28, 2023

In the ever-evolving world of cybersecurity, few individuals embody the spirit of innovation and exploration as profoundly as John Althouse.

Threat Research

Hunt Platform Statistics Launch
Sep 19, 2023

Learn about the Hunt.io massive observation collection platform.

Threat Research

Discovering & Disrupting Malicious Infrastructure
Sep 12, 2023

Michael showcases how the Hunt platform can be leveraged to proactively identify infrastructure not yet publicly reported on from recent malware campaigns.

Threat Research

Aug 17, 2023

How Open Directories Help with Threat Hunting and Incident Response.

Threat Research

Let's go Hunting
Aug 1, 2023

We are excited to unveil Hunt.io, a cutting-edge threat hunting solution that is set to transform the landscape of cybersecurity.

Threat Research

From Munitions to Malware: Joseph Harrison on Threat Detection & Digital Forensics
Oct 23, 2025

In this interview, Joseph Harrison shares how his Air Force-minted discipline fuels his work in threat detection and digital forensics, and how he leverages Hunt.io’s data (especially JA4) to catch adversaries others miss.

Threat Research

Oct 2025

Introducing Hunt 2.6: IP Risk & Reputation, Smarter IOC Hunting, and Faster Integrations
Oct 20, 2025

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.

Product News

Oct 2025

Oct 16, 2025

A large-scale macOS malware campaign mimics trusted dev tools to spread Odyssey Stealer and AMOS via fake Homebrew sites. Learn more.

Threat Research

🇪🇺 Europe

🌎 North America

Odyssey Stealer

AMOS Spyware

Malware Delivery

Odyssey

AMOS

Oct 2025

AdaptixC2 Uncovered: Capabilities, Tactics & Hunting Strategies
Oct 9, 2025

A deep dive into AdaptixC2: modular architecture, multi-protocol communication, evasion tactics, IOCs, and defense strategies.

Threat Research

🌏 Asia

AdaptixC2

Command & Control (C2)

AdaptixC2

Oct 2025

Operation SouthNet: SideWinder Targets South Asia Maritime
Oct 1, 2025

SideWinder’s Operation SouthNet: South Asia phishing on Netlify/pages.dev, Zimbra/Outlook lures, and open directories. Maritime focus. IOCs included. Learn more.

Threat Research

🌏 Asia

SideWinder

Phishing & Social Engineering

APT Sidewinder

Oct 2025

Hunting C2 Panels: Beginner’s Guide for Identifying Command and Control Dashboards
Sep 25, 2025

Beginner’s guide to hunting exposed C2 dashboards like Supershell, HookBot, Chaos, Unam, Mythic, and Metasploit using paths, titles, and hashes

Threat Research

🌍 Global

Command & Control (C2)

Sep 2025

AsyncRAT Campaigns Uncovered: How Attackers Abuse ScreenConnect and Open Directories
Sep 18, 2025

Research on AsyncRAT campaigns using trojanized ScreenConnect installers and open directories, exposing resilient attacker infrastructure and C2 tactics. Learn more.

Threat Research

🌍 Global

AsyncRAT

Command & Control (C2)

Sep 2025

Inside the 2025 Energy Phishing Wave: Chevron, Conoco, PBF, Phillips 66
Sep 11, 2025

Hunt.io uncovers the 2025 Energy Phishing Wave, with Chevron, Conoco, PBF, and Phillips 66 targeted by large-scale cloning and brand abuse. Learn more.

Threat Research

🌎 North America

MaaS

Phishing & Social Engineering

Sep 2025

Interview with Daniel Plohmann: Malpedia, Malware Analysis, and Research Insights
Sep 9, 2025

Daniel Plohmann discusses building Malpedia, advancing malware research with MCRIT, and how metalcore and music inspire his work beyond security.

Threat Research

Sep 2025

TinyLoader Malware: Crypto Theft & C2 Infrastructure
Sep 2, 2025

Investigation into TinyLoader malware stealing cryptocurrency via Redline Stealer, USB spread, and C2 infrastructure.

Threat Research

🌍 Global

TinyLoader

RedLine Stealer

Malware Delivery

Sep 2025

Announcing Hunt 2.5
Aug 21, 2025

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.

Product News

Aug 2025

APT MuddyWater Targets CFOs with Multi-Stage Phishing & NetBird Abuse
Aug 20, 2025

Hunt.io uncovers MuddyWater phishing campaigns using Firebase lures, VBS payloads, and NetBird for persistent remote access. Learn more.

Threat Research

🌍 Middle East

PowGoop

MuddyWater RAT

Malware Delivery

MuddyWater

Aug 2025

ERMAC V3.0 Banking Trojan: Full Source Code Leak and Infrastructure Analysis
Aug 14, 2025

Hunt.io uncovers the complete ERMAC V3.0 source code, revealing its infrastructure, vulnerabilities, and expanded form injection capabilities.

Threat Research

🌍 Global

ERMAC v3

Malware Delivery

Aug 2025

APT Sidewinder Abuses Netlify to Mimic Government and Military Portals in South Asia
Aug 8, 2025

APT Sidewinder targets South Asian government and military portals using Netlify-hosted phishing pages to harvest credentials. Learn more.

Threat Research

🌏 Asia

Phishing & Social Engineering

APT Sidewinder

Aug 2025

APT36 Targets Indian Infrastructure with Desktop Lures and Poseidon Backdoor
Jul 31, 2025

APT36 expands its campaign beyond defense, using phishing, .desktop lures, and the Poseidon backdoor to target Indian infrastructure.

Threat Research

🇮🇳 India

Poseidon

Malware Delivery

APT36

Jul 2025

Clickfix on macOS: AppleScript Stealer, Terminal Phishing, and C2 Infrastructure
Jul 22, 2025

Phishing campaign targets macOS with fake prompts that run AppleScript via terminal, stealing wallets, cookies, and sensitive files.

Threat Research

🇮🇳 India

🌏 Asia

Phishing & Social Engineering

Malware Delivery

APT36

Jul 2025

630K gov.br Subdomains Abused in SEO Poisoning Attack
Jul 17, 2025

Over 630K hijacked gov.br subdomains were exploited in a black hat SEO campaign using cloaking, keyword stuffing, and redirect techniques. Learn more.

Threat Research

🌎 South America

Poseidon

GhostRAT

Abuse of Legitimate Services

Jul 2025

Announcing Hunt 2.4
Jul 15, 2025

Hunt 2.4 adds archive-aware search, deeper SQL visibility, and improved phishing intel to make threat hunting faster, clearer, and more powerful.

Product News

Jul 2025

Eggs, Alerts, and Adversaries: Talking with Jose Hernandez from Splunk
Jul 8, 2025

Splunk’s Jose Hernandez talks building detections, curious hires, Hunt.io in action, and balancing threat research with chickens and family life.

Threat Research

Jul 2025

Threat Hunting at Scale: Explore 10.6B URLs to Find Payloads, C2s, and Exposed Assets with URLx
Jun 26, 2025

Explore 10.6B structured URLs with URLx. Find malware payloads, C2 paths, phishing campaigns, and exposed assets, fast.

Threat Research

Jun 2025

Announcing Hunt 2.3: Improved Threat Hunting Experience & SSO Availability
Jun 25, 2025

Hunt 2.3 is here: analyst-driven insights, easier pivots, better phishing workflows, and full SSO support for enterprise teams.

Product News

Jun 2025

Cobalt Strike PowerShell Loader Found on Chinese and Russian Infrastructure
Jun 19, 2025

Our threat hunters uncovered a PowerShell loader hosted by Chinese and Russian providers, linked to active Cobalt Strike infrastructure.

Threat Research

🌍 Global

Cobalt Strike

Malware Delivery

Jun 2025

Fast and Curious: Red Teaming, Race Cars, and Hunt.io with Justin Elze
Jun 17, 2025

TrustedSec CTO Justin Elze shares red teaming insights, offensive tooling tips, and how he uses Hunt.io and AttackCapture™, plus his passion for race car data.

Threat Research

Jun 2025

Introducing Hunt 2.2: AttackCapture™ Zip Extraction, Smarter SQL, IP History Consolidation, and more
Jun 12, 2025

Explore Hunt 2.2: Auto-unpack zips in AttackCapture™, smarter SQL with WHOIS and Nmap, and full IP history consolidation, track abused hosting with Host Radar, and more.

Product News

Jun 2025

Paste.ee Abuse Uncovered: XWorm & AsyncRAT Infrastructure
Jun 5, 2025

See how attackers abuse paste.ee to deliver XWorm and AsyncRAT, using obfuscated scripts and globally distributed C2 infrastructure.

Threat Research

🌍 Global

AsyncRAT

XWorm

Malware Delivery

Jun 2025

Track Threat Actors Using Real-World IOC Pivoting
May 29, 2025

Track attacker infrastructure with Hunt.io’s real-time IOC pivoting and threat actor intelligence. Learn more.

Threat Research

🌍 Global

IOC Pivoting

May 2025

Introducing Hunt 2.1:  Refinements to the Threat Hunting Experience
May 21, 2025

Discover the new Hunt.io updates: deep text assisted analysis, IOC feed improvements, improved threat actor data, and faster advanced search. Learn more.

Product News

May 2025

Shared SSH Keys Expose Phishing Infrastructure Targeting Kuwait
May 15, 2025

Shared SSH keys expose coordinated phishing targeting Kuwaiti fisheries, telecoms, and insurers with cloned login portals and mobile payment lures. Learn more.

Threat Research

🌍 Middle East

Phishing & Social Engineering

May 2025

Detecting IOX, FRP, Rakshasa, and Stowaway Proxies Using Hunt.io
May 8, 2025

This post explores open-source proxy tools commonly used in attacker and red team infrastructure, and shows how defenders can detect IOX, FRP, Rakshasa, and Stowaway at scale using Hunt.io.

Threat Research

🌏 Asia

FRP/Rakshasa

Command & Control (C2)

May 2025

APT36-Linked ClickFix Campaign Spoofs Indian Ministry of Defence, Targets Windows & Linux Users
May 5, 2025

APT36-style phishing campaign mimics India’s Ministry of Defence to drop malware on Windows and Linux via spoofed press releases and HTA payloads.

Threat Research

🇮🇳 India

Phishing & Social Engineering

APT36

May 2025

APT34-Like Threat Infrastructure Uncovered Before Activation
Apr 22, 2025

APT34-like infrastructure mimicking an Iraqi academic institute and fake UK tech firms reveals early-stage staging on M247 servers. Learn what to track

Threat Research

🌍 Middle East

Karkoff

SideTwist

PowBAT

Command & Control (C2)

APT34

Apr 2025

KeyPlug Server Exposes Fortinet Exploits & Webshell Activity Targeting a Major Japanese Company
Apr 17, 2025

Briefly exposed KeyPlug infrastructure revealed Fortinet exploits, encrypted webshells, and recon scripts targeting Shiseido, a major Japanese enterprise. Learn more..

Threat Research

🌍 Global

KEYPLUG

Tool & Infrastructure Exposure

Chinese APT

Apr 2025

Server-Side Phishing: How Credential  Theft Campaigns Are Hiding in Plain Sight
Apr 15, 2025

Phishing campaign evades detection with server-side logic. See how employee portals are targeted—and how defenders can uncover them. Learn more.

Threat Research

🌍 Global

Pterodo

ShadowPad

Phishing & Social Engineering

Gamaredon

ShadowPad ecosystem

Apr 2025

GoPhish Infrastructure Targets Polish Energy and Government
Apr 10, 2025

Explore how the GoPhish framework was leveraged to stage infrastructure and domains spoofing Polish government and energy entities.

Threat Research

🇵🇱 Poland

Gopish

Phishing & Social Engineering

Apr 2025

Hunt.io Insights: Gamaredon’s Flux-Like Infrastructure and a Look at Recent ShadowPad Activity
Apr 8, 2025

Explore Gamaredon’s flux-like DNS and ShadowPad malware infrastructure, with insights into how these attacker networks are configured, rotated, and maintained.

Threat Research

🇪🇺 Europe

🌏 Asia

ShadowPad

Command & Control (C2)

Apr 2025

Proactive ClickFix Threat Hunting with Hunt.io
Apr 3, 2025

Learn how Hunt.io identifies early-stage ClickFix delivery pages across the web using advanced search capabilities to stay ahead of exploitation attempts.

Threat Research

🌏 Asia

ClickFix

Phishing & Social Engineering

APT36

Apr 2025

Russian-Speaking Threat Actor Abuses Cloudflare & Telegram in Phishing Campaign
Apr 1, 2025

Learn how a Russian-speaking threat actor has evolved from impersonating EFF to now deploying Cloudflare-themed phishing with Telegram-based C2.

Threat Research

🇷🇺 Russian

Abuse of Legitimate Services

Apr 2025

URLx Just Got Bigger: 10.6B URLs for Recon and Malicious Infrastructure Hunting
Mar 27, 2025

Explore exposed infrastructure with URLx: 10.6B+ URLs, HTTPx integration, and advanced filtering - now live in Hunt.io.

Product News

Mar 2025

A Practical Guide to Uncovering Malicious Infrastructure With Hunt.io
Mar 25, 2025

Learn how to track and map adversary infrastructure using Hunt, pivoting from a single IP to uncover hidden connections through infrastructure overlaps and key intelligence indicators.

Threat Research

🌍 Global

Malware Delivery

Mar 2025

Introducing IOC Hunter Feed and Attribution for Enhanced Threat Intelligence
Mar 20, 2025

Track threat actors and malicious infrastructure with Hunt.io’s IOC Hunter Feed and C2 Attribution. Get deeper visibility and context for better threat intelligence.

Product News

Mar 2025

South Korean Organizations Targeted by Cobalt Strike ‘Cat’ Delivered by a Rust Beacon
Mar 18, 2025

Discover how threat actors used a Rust loader to deploy Cobalt Strike ‘Cat’ against South Korean targets. Learn more.

Threat Research

🇰🇷 South Korea

Cobalt Strike

Malware Delivery

DPRK (North Korea)

Mar 2025

JSPSpy and ‘Filebroser’: A Custom File Management Tool in Webshell Infrastructure
Mar 11, 2025

Discover how threat actors deploy a rebranded File Browser alongside JSPSpy for stealth file management on compromised servers.

Threat Research

JSPSpy

FileBrowser

Malware Delivery

Lazarus Group

Mar 2025

Introducing Hunt 2.0: Deeper Threat Analysis & Enhanced Data for Cyber Intelligence
Mar 6, 2025

Our latest release delivers deeper threat analysis with improved threat actor, C2, malware data, and new integrations for robust cyber intelligence.

Product News

Mar 2025

Exposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2
Mar 4, 2025

Discover how an open directory exposed a threat actor impersonating EFF to target gamers and how we mapped their infrastructure to Stealc & Pyramid C2.

Threat Research

🌍 Global

Stealc

Pyramid

Phishing & Social Engineering

Malware Delivery

Russian APT

Mar 2025

Uncovering Joker’s C2 Network: How Hunt’s SSL History Exposed Its Infrastructure
Feb 27, 2025

Discover Joker malware infrastructure with Hunt SSL History, mapping its C2 network through certificate tracking of recent and past activity.

Threat Research

🌍 Global

Joker

Certificate & TLS Abuse

Feb 2025

LightSpy Malware Now Targets Facebook & Instagram Data
Feb 20, 2025

A new LightSpy server expands its attack scope, targeting Facebook and Instagram database files. Explore its evolving capabilities and infrastructure.

Threat Research

🌏 Asia

LightSpy

Data Theft & Exfiltration

Chinese APT

Feb 2025

Backdoored Installers for Signal, Line, and Gmail Target Chinese-Speaking Users
Feb 18, 2025

Read how attackers distribute backdoored Signal, Line, and Gmail installers through fraudulent download pages and how to defend against this campaign.

Threat Research

🇨🇳 China

Backdoor Installer

Malware Delivery

Feb 2025

Advanced Threat Hunting with New SSL Features: Unlocking HuntSQL™ Anomaly Flags for Deeper Detection
Feb 13, 2025

Hunt.io enhances SSL threat hunting with new anomaly flags in HuntSQL™, improving the detection of misconfigurations, expired certificates, and malware infrastructure.

Product News

Feb 2025

Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
Feb 12, 2025

Discover how Pyramid, an open-source tool, enables post-exploitation. Learn detection methods using HTTP headers and recent findings in Hunt.

Threat Research

Pyramid

Reconnaissance & Scanning

Feb 2025

SmokeLoader Malware Targets Ukraine’s Auto & Banking Sectors via Open Directories
Feb 6, 2025

Attackers used open directories to spread SmokeLoader malware, luring Ukraine’s auto and banking sectors. Explore findings, execution, and tactics.

Threat Research

🇺🇦 Ukraine

SmokeLoader

Abuse of Legitimate Services

Feb 2025

GreenSpot APT Targets 163.com Users with Fake Download Pages & Spoofed Domains
Feb 4, 2025

GreenSpot APT targets 163.com users via fake download pages and domain spoofing. Learn their tactics, risks, and how to protect your email accounts.

Threat Research

🌏 Asia

Phishing & Social Engineering

GreenSpot APT

Feb 2025

Unlock SSL Intelligence: How SSL History Boosts Threat Hunting
Jan 30, 2025

Explore how SSL intelligence and SSL history empower proactive threat hunting. Learn tools, real-world examples, and strategies to track cyber threats.

Threat Research

Jan 2025

Unmasking SparkRAT: Detection & macOS Campaign Insights
Jan 28, 2025

Explore SparkRAT detection tactics, macOS targeting, and insights into recent DPRK-linked campaigns with actionable research findings.

Threat Research

🌏 Asia

SparkRAT

Command & Control (C2)

DPRK (North Korea)

Jan 2025

Suspected KEYPLUG Infrastructure: TLS Certificates and GhostWolf Links
Jan 23, 2025

Uncover how Hunt’s TLS records reveal patterns in suspected KEYPLUG infrastructure, linking GhostWolf and RedGolf/APT41 to ongoing activity.

Threat Research

🌏 Asia

KEYPLUG

Certificate & TLS Abuse

APT41

GhostWolf

Jan 2025

VS Code Extension Impersonating Zoom Targets Google Chrome Cookies
Jan 21, 2025

Uncover a deceptive VS Code extension, masquerading as Zoom, that pilfers your Google Chrome cookies. Join us as we expose the techniques behind this alarming supply chain campaign.

Threat Research

🌍 Global

Malicious Extension

Malware Delivery

Jan 2025

‘JustJoin’ Landing Page Linked to Suspected DPRK Activity Resurfaces
Jan 14, 2025

Learn how a landing page mimicking “JustJoin,” tied to suspected DPRK cyber activity, has reappeared with new infrastructure linked through SSH key overlaps.

Threat Research

🇰🇷 South Korea

Credential Reuse

DPRK (North Korea)

Jan 2025

Cyberhaven Extension Compromise: TLS Certificates Reveal Hidden Infrastructure
Jan 9, 2025

Read more about connections through a TLS certificate linking reported and unreported infrastructure tied to the Cyberhaven extension compromise.

Threat Research

🌍 Global

Malicious Extension

Certificate & TLS Abuse

Jan 2025

Golang Beacons and VS Code Tunnels: Tracking a Cobalt Strike Server Leveraging Trusted Infrastructure
Jan 7, 2025

Learn how a Cobalt Strike server with a TLS certificate and prominent watermark showed a Golang-compiled beacon communicating with Visual Studio Code tunnels.

Threat Research

🌍 Global

Cobalt Strike

Command & Control (C2)

Jan 2025

Dec 20, 2024

Discover Hunt.io's 2024 highlights: major product launches, innovations like AttackCapture™, C2 Feed, and Hunt SQL, and a look ahead to 2025.

Product News

Dec 2024

Oyster’s Trail: Resurgence of Infrastructure Linked to Ransomware and Cybercrime Actors
Dec 12, 2024

Our latest analysis uncovers domains linked to the Oyster backdoor, revealing suspected Vanilla Tempest infrastructure and offering insights into server configuration patterns.

Threat Research

🇪🇺 Europe

🌎 North America

Oyster

IOC Pivoting

Vanilla Tempest

Dec 2024

“Million OK!!!!” and the Naver Facade: Tracking Recent Suspected Kimsuky Infrastructure
Dec 10, 2024

Learn how the 'Million OK!!!' HTTP response previously linked to Kimsuky has reappeared on new IPs and domains. This update provides the latest insights into evolving infrastructure, helping defenders stay informed on potential North Korean threat activity.

Threat Research

🇰🇷 South Korea

Beacon Reuse

Kimsuky

Dec 2024

MoqHao Leverages iCloud and VK in Campaign Targeting Apple IDs and Android Device
Dec 5, 2024

Discover how the MoqHao campaign leveraging iCloud and VK employs cross-platform tactics to steal credentials and distribute malicious APKs.

Threat Research

🌏 Asia

MoqHao

Phishing & Social Engineering

Dec 2024

Rare Watermark Links Cobalt Strike 4.10 Team Servers to Ongoing Suspicious Activity
Dec 3, 2024

Uncover the infrastructure and learn how a unique watermark led to the discovery of Cobalt Strike 4.10 team servers impersonating well-known brands.

Threat Research

🌍 Global

Cobalt Strike

Command & Control (C2)

Dec 2024

 Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
Nov 28, 2024

Learn how threat actors leverage open directories to deliver XWorm malware disguised as popular software, providing insight into their tactics.

Threat Research

🌍 Global

XWorm

Malware Delivery

Nov 2024

DarkPeony’s Trail: Certificate Patterns Point to Sustained Campaign Infrastructure
Nov 21, 2024

Explore how DarkPeony's consistent use of certificates reveals ongoing infrastructure activity, indicating consistent operations across different regions.

Threat Research

🌏 Asia

🇪🇺 Europe

DarkPeony

Certificate & TLS Abuse

Nov 2024

XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method
Nov 19, 2024

Discover XenoRAT’s adoption of Excel XLL files and Confuser’s tactical shift from its usual methods, with our insights on adapting to evolving malware techniques.

Threat Research

🌍 Global

XenoRAT

Evasion & Obfuscation

DPRK (North Korea)

Nov 2024

Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator
Nov 12, 2024

Sliver C2 and Ligolo-ng join forces in a campaign likely targeting Y Combinator, revealing tactics and infrastructure aimed at the accelerator's network. Learn more.

Threat Research

🌎 North America

Sliver

Ligolo-ng

Command & Control (C2)

Nov 2024

RunningRAT’s Next Move: From Remote Access to Crypto mining For Profit
Nov 5, 2024

RunningRAT has shifted from access-driven tactics to crypto mining, using open directories to stage payloads and reduce direct C2 traffic.

Threat Research

🌍 Global

RunningRAT

XMRig

Botnet Activity, Cryptomining

Nov 2024

Tricks, Treats, and Threats: Cobalt Strike & the Goblin Lurking in Plain Sight
Oct 31, 2024

Discover an open directory of red team tools fit for Halloween, from Cobalt Strike to BrowserGhost.

Threat Research

Cobalt Strike

BrowserGhost

Tool & Infrastructure Exposure

Oct 2024

Suspected DPRK Phishing Campaign Targets Naver; Separate Apple Domain Spoofing Cluster Identified
Oct 29, 2024

Explore a suspected North Korean-linked phishing campaign targeting Naver and how unknown actors use distinct TLS certificates to spoof Apple domains.

Threat Research

🇰🇷 South Korea

Phishing & Social Engineering

DPRK (North Korea)

Oct 2024

Rekoobe Backdoor Discovered in Open Directory, Possibly Targeting TradingView Users
Oct 24, 2024

Discover how an open directory of Rekoobe malware samples led to different domains resembling trading platforms, posing risks for traders and investors.

Threat Research

🌍 Global

Rekoobe

Malware Delivery

Oct 2024

WarmCookie Infrastructure Update: Uncovering New C2 Servers and Threats
Oct 17, 2024

Get an inside look at Warmcookie’s updated C2 infrastructure linked to its latest update. We reveal insights into newly identified servers that can assist defenders in identifying related servers.

Threat Research

WarmCookie

Command & Control (C2)

Oct 2024

Introducing Code Search on AttackCapture: Uncover Exploit Code, Reverse Shells, C2 Configs, and More
Oct 15, 2024

Read how CodeSearch helps security professionals to identify exploit code, reverse shells, and C2 configs across open directories, enhancing threat detection.

Threat Research

Oct 2024

Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
Oct 10, 2024

Learn how basic tracking techniques using unusual certificates and redirects helped uncover Earth Baxia and a hidden cyber threat, providing practical insights for network defense.

Threat Research

🌏 Asia

PlugX

Tool & Infrastructure Exposure

Earth Baxia

Oct 2024

Inside a Cybercriminal’s Server: DDoS Tools, Spyware APKs, and Phishing Templates
Oct 8, 2024

Explore our in-depth analysis of a cybercriminal’s server, revealing DDoS tools, SpyNote spyware, phishing sites, and ransomware tactics.

Threat Research

🌍 Global

SpyNote

DDoS Scripts

Tool & Infrastructure Exposure

Oct 2024

Announcing Hunt SQL
Oct 3, 2024

We’re excited to release Hunt SQL and to provide the power and flexibility of SQL to researchers, analysts and threat hunters alike. 

Product News

Oct 2024

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection  | Hunt.io
Oct 1, 2024

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection | Hunt.io

Threat Research

Packed Python Script

Evasion & Obfuscation

Oct 2024

Echoes of Stargazer Goblin: Analyzing Shared TTPs from an Open Directory
Sep 24, 2024

Check out our new blog post on exposed files found in an open directory that reveal an attack with overlapping TTPs linked to the Stargazers network.

Threat Research

Initial Access & Exploitation

Sep 2024

Announcing Hunt APIs
Sep 17, 2024

Today Hunt is announcing our IP Enrichment API. You can get detailed data on every IPv4 Address and enrich any existing system.

Product News

Sep 2024

Decoy Docs and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Sep 10, 2024

Compromising a browser can be a goldmine for attackers, offering extensive access to sensitive user data ...

Threat Research

🇰🇷 South Korea

Malicious Extension

Phishing & Social Engineering

Kimsuky

Sep 2024

ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
Sep 3, 2024

The ToneShell backdoor, frequently associated with Mustang Panda (also known as Stately Taurus and Earth Preta...

Threat Research

🌍 Global

ToneShell

Phishing & Social Engineering

Mustang Panda

Sep 2024

Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims
Aug 29, 2024

During a recent analysis of known Latrodectus infrastructure, our research team encountered a command-and-control...

Threat Research

🇰🇷 South Korea

Latrodectus

Fake Installer

Malware Delivery

Aug 2024

Launching AttackVault by Hunt.Io
Aug 23, 2024

We originally launched our "Open Directory" feature in Hunt a year ago.  The premise behind it was to get into the mind of the attacker by get a backstage view into their attacks.  What we learned was that there was a ton of information that could be correlated and indexed.  Today, we're reaffirming our commitment to getting into the tooling of attackers by launching AttackCapture™ by Hunt.io.

Product News

Aug 2024

EvilGophish Unhooked: Insights Into the Infrastructure and Notable Domains
Aug 13, 2024

In late 2023, Hunt Research published a blog post detailing how we uncover emerging and previously unknown Gophish infrastructure.

Threat Research

Gophish

Phishing & Social Engineering

Aug 2024

Pentester or Threat Actor? Open Directory Exposes Test Results and Possible Targeting of Government Organizations
Aug 7, 2024

During routine research of newly identified open directories, the Hunt Research Team made a startling discovery: a...

Threat Research

Tool & Infrastructure Exposure

Aug 2024

macOS Malware Impersonates The Unarchiver App to Steal User Data | Hunt.io
Jul 30, 2024

Discover how macOS malware tricks users into downloading an app disguised as The Unarchiver app. The app contains a binary named “CryptoTrade” designed to steal sensitive user information.

Threat Research

🌍 Global

CryptoTrade

Malware Delivery

Jul 2024

A Simple Approach to Discovering Oyster Backdoor Infrastructure | Hunt.io
Jul 23, 2024

Oyster backdoor, also known as Broomstick (IBM) and CleanUpLoader (RussianPanda – X), has been linked to...

Threat Research

Oyster

IOC Pivoting

Jul 2024

SEO Poisoning Campaigns Target Browser Installers and Crypto Sites, Spreading Poseidon, GhostRAT & More
Jul 16, 2024

The Hunt Research Team recently stumbled upon Search Engine Optimization (SEO) poisoning campaigns posing as ...

Threat Research

🌍 Global

Poseidon

Gh0st RAT

Malware Delivery

Jul 2024

The Secret Ingredient: Unearthing Suspected SpiceRAT Infrastructure via HTML Response
Jul 11, 2024

Reports on new malware families often leave subtle clues that lead researchers to uncover additional infrastructure not...

Threat Research

🇪🇺 Europe

🌏 Asia

SpiceRAT

Malware Delivery

Jul 2024

ProxyLogon and ProxyShell Used to Target Government Mail Servers in Asia, Europe, and South America
Jul 2, 2024

Nearly three years after ProxyLogon and ProxyShell wreaked widespread havoc on Microsoft Exchange servers, the Hunt

Threat Research

🌏 Asia

🇪🇺 Europe

🌎 South America

Initial Access & Exploitation

Jul 2024

Geacon and Geacon_Pro: A Constant Menace to Linux and Windows Systems
Jun 27, 2024

The red-teaming tool Cobalt Strike has long been a staple for simulating attacks, predominantly targeting Windows ...

Threat Research

🌍 Global

Geacon

Command & Control (C2)

Chinese APT

Jun 2024

Good Game, Gone Bad: Xeno RAT Spread Via .gg Domains and GitHub
Jun 25, 2024

XenoRAT, an open-source malware available on GitHub, has been linked to a North Korean hacking group and unnamed...

Threat Research

🌍 Global

XenoRAT

Abuse of Legitimate Services

DPRK (North Korea)

Jun 2024

Caught in the Act: Uncovering SpyNote in Unexpected Places
Jun 20, 2024

In hidden corners of the Internet, open directories often serve as treasure troves, offering a glimpse into the unguarded...

Threat Research

SpyNote

Malware Delivery

Jun 2024

Open Directories Expose Publicly Available Tools Targeting Asian Organizations
Jun 18, 2024

The Hunt Research Team recently identified an exposed web server used to target the Taiwanese Freeway Bureau and a...

Threat Research

🌏 Asia

Tool & Infrastructure Exposure

Chinese APT

Jun 2024

Gh0st and Pantegana: Two RATs that Refuse to Fade Away
Jun 12, 2024

Gh0st and Pantegana remote access tools/trojans (RATs) may seem unlikely to be discussed, but both have made notable...

Threat Research

🌍 Global

Gh0st RAT

Pantegana RAT

Malware Delivery

DriftingCloud

Jun 2024

Jun 6, 2024

In this post, we'll detail the infrastructure of the LightSpy spyware framework and highlight the unique TLS certificate...

Threat Research

🌏 Asia

LightSpy

Certificate & TLS Abuse

Jun 2024

Legacy Threat: PlugX Builder/Controller Discovered in Open Directory
Jun 5, 2024

The threat actor(s) built and controlled at least one of the binaries on the same server, granting us access to numerous..

Threat Research

PlugX

Tool & Infrastructure Exposure

Chinese APT

Jun 2024

SolarMarker: Hunt Insights and Findings
May 30, 2024

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.

Threat Research

🌎 North America

🇪🇺 Europe

SolarMarker

Malware Delivery

Multi-Stage Infection

May 2024

Tales from the Hunt: A Look at Yakit Security Tool
May 28, 2024

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.

Threat Research

Yakit

May 2024

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.

Threat Research

May 2024

Into the Viper’s Nest: Observations from Hunt’s Scanning
May 8, 2024

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...

Threat Research

May 2024

Spotting SparkRAT: Detection Tactics & Sandbox Findings
Apr 23, 2024

The Hunt Research Team vigilantly monitors GitHub, sifts through the IOC sections of threat intelligence reports, and scours various online forums for emerging threats, ensuring our detections stay practical and current for our customers. Our focus frequently turns to lesser-known threats that can still wreak havoc on the networks of uninformed defenders.

Threat Research

SparkRAT

Lateral Movement & Persistence

Apr 2024

In Plain Sight: Uncovering SuperShell & Cobalt Strike from an Open Directory
Apr 16, 2024

Hunt scans every corner of the public IPV4 space and constantly scours the Internet for open directories. Through...

Threat Research

SuperShell

Cobalt Strike

Tool & Infrastructure Exposure

Apr 2024

BlueShell: Four Years On, Still A Formidable Threat
Apr 9, 2024

Platforms like GitHub offer a valuable resource for developers and the open-source community. However, these sites also create a potential...

Threat Research

BlueShell

Malware Delivery

Apr 2024

A Hunt How-To: Detecting RedGuard C2 Redirector
Apr 2, 2024

If you’re like me, you’ve likely read multiple reports on network intrusions involving a “standard” deployment...

Threat Research

RedGuard

Command & Control (C2)

Apr 2024

Coin Miner and Mozi Botnet
Mar 28, 2024

Open directories can sometimes contain unexpected dangers in the hidden parts of the internet. Our recent investigation...

Threat Research

Mozi

XMRig

Botnet Activity, Cryptomining

May 2024

A Treasure Trove of Trouble: Open Directory Exposes Red Team Tools
Mar 21, 2024

While open directories are often seen as a goldmine for security researchers and blue teams searching for malware...

Threat Research

Mimikatz

Tool & Infrastructure Exposure

May 2024

One More Trip to The W3LL: Phishing Kit Targets Outlook Credentials
Mar 19, 2024

The W3LL Phishing Kit, a phishing-as-a-service (PAaS) tool, was identified by Group-IB in 2022. What makes the kit...

Threat Research

🌍 Global

W3LL

Phishing & Social Engineering

May 2024

Hunting PrismX: Techniques for Network Discovery
Mar 12, 2024

Described on its GitHub README as an "Integrated lightweight cross-platform penetration system," PrismX goe...

Threat Research

PrismX

Reconnaissance & Scanning

May 2024

Open Directory Exposes Phishing Campaign Targeting Google & Naver Credentials
Mar 5, 2024

Over the past month, Hunt has tracked an ongoing phishing campaign by a likely North Korean threat actor focused on...

Threat Research

🇰🇷 South Korea

🌍 Global

Phishing & Social Engineering

DPRK (North Korea)

May 2024

Feb 28, 2024

Hunt is tracking an ongoing sophisticated phishing campaign targeting individuals in the Telegram groups focused on...

Threat Research

🌍 Global

Pyramid

NK Dropper

Phishing & Social Engineering

DPRK (North Korea)

Feb 2024

Unveiling the Power of Tag Cloud: Navigating the Digital Landscape with Precision
Feb 14, 2024

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...

Threat Research

Feb 2024

Tracking ShadowPad Infrastructure Via Non-Standard Certificates
Feb 9, 2024

This post will examine ShadowPad infrastructure linked to a yet-to-be-identified threat actor. What makes this activity...

Threat Research

🌏 Asia

ShadowPad

Certificate & TLS Abuse

Feb 2024

Feb 6, 2024

Where national interests, strategic ambitions, and sometimes personal gain intertwine, state-linked cyber threat actors...

Threat Research

Feb 2024

The Accidental Malware Repository: Hunting & Collecting Malware Via Open Directories (Part 1)
Feb 1, 2024

This post will serve as the first in a long series of articles on using the platform to identify malicious infrastructure and hunt...

Threat Research

Feb 2024

Introducing Hunt Advanced Search
Jan 30, 2024

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...

Threat Research

Jan 2024

How We Identify Malicious Infrastructure At Hunt.io
Jan 24, 2024

ShadowPad, Quasar RAT, HeadLace, Emotet, and SIGNBT (to name a few) often grab headlines and captivate readers...

Threat Research

Jan 2024

Introducing the Hunt.io C2 Feed
Jan 15, 2024

It’s been a while since we announced a new feature, and with 2024 already in full swing, it is time to highlight what’s...

Product News

Jan 2024

Announcing IOC-Hunter
Nov 14, 2023

As the end of the year approaches, we continue to enhance our feature set by building on well-established threat-...

Product News

Nov 2023

Gateway to Intrusion: Malware Delivery Via Open Directories
Oct 31, 2023

Attackers constantly devise new and sophisticated methods of delivering malware to infiltrate systems and exfiltrate...

Threat Research

Malware Delivery

Oct 2023

How Hunt.io Identifies Services on Non-Standard Ports
Oct 25, 2023

The term “threat hunting” is generally associated with detecting malicious behavior on endpoints manually...

Threat Research

Oct 2023

Phish No More: A Hunt.io Guide to Gophish Detection
Oct 12, 2023

Phishing is more than a social engineering technique; it's a harrowing threat landscape where deception, innovation, and vigilance collide.

Threat Research

Oct 2023

Sep 28, 2023

In the ever-evolving world of cybersecurity, few individuals embody the spirit of innovation and exploration as profoundly as John Althouse.

Threat Research

Sep 2023

Hunt Platform Statistics Launch
Sep 19, 2023

Learn about the Hunt.io massive observation collection platform.

Threat Research

Sep 2023

Discovering & Disrupting Malicious Infrastructure
Sep 12, 2023

Michael showcases how the Hunt platform can be leveraged to proactively identify infrastructure not yet publicly reported on from recent malware campaigns.

Threat Research

Aug 17, 2023

How Open Directories Help with Threat Hunting and Incident Response.

Threat Research

Let's go Hunting
Aug 1, 2023

We are excited to unveil Hunt.io, a cutting-edge threat hunting solution that is set to transform the landscape of cybersecurity.

Threat Research

From Munitions to Malware: Joseph Harrison on Threat Detection & Digital Forensics
Oct 23, 2025

In this interview, Joseph Harrison shares how his Air Force-minted discipline fuels his work in threat detection and digital forensics, and how he leverages Hunt.io’s data (especially JA4) to catch adversaries others miss.

Threat Research

Oct 2025

Introducing Hunt 2.6: IP Risk & Reputation, Smarter IOC Hunting, and Faster Integrations
Oct 20, 2025

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.

Product News

Oct 2025

Oct 16, 2025

A large-scale macOS malware campaign mimics trusted dev tools to spread Odyssey Stealer and AMOS via fake Homebrew sites. Learn more.

Threat Research

🇪🇺 Europe

🌎 North America

Odyssey Stealer

AMOS Spyware

Malware Delivery

Odyssey

AMOS

Oct 2025

AdaptixC2 Uncovered: Capabilities, Tactics & Hunting Strategies
Oct 9, 2025

A deep dive into AdaptixC2: modular architecture, multi-protocol communication, evasion tactics, IOCs, and defense strategies.

Threat Research

🌏 Asia

AdaptixC2

Command & Control (C2)

AdaptixC2

Oct 2025

Operation SouthNet: SideWinder Targets South Asia Maritime
Oct 1, 2025

SideWinder’s Operation SouthNet: South Asia phishing on Netlify/pages.dev, Zimbra/Outlook lures, and open directories. Maritime focus. IOCs included. Learn more.

Threat Research

🌏 Asia

SideWinder

Phishing & Social Engineering

APT Sidewinder

Oct 2025

Hunting C2 Panels: Beginner’s Guide for Identifying Command and Control Dashboards
Sep 25, 2025

Beginner’s guide to hunting exposed C2 dashboards like Supershell, HookBot, Chaos, Unam, Mythic, and Metasploit using paths, titles, and hashes

Threat Research

🌍 Global

Command & Control (C2)

Sep 2025

AsyncRAT Campaigns Uncovered: How Attackers Abuse ScreenConnect and Open Directories
Sep 18, 2025

Research on AsyncRAT campaigns using trojanized ScreenConnect installers and open directories, exposing resilient attacker infrastructure and C2 tactics. Learn more.

Threat Research

🌍 Global

AsyncRAT

Command & Control (C2)

Sep 2025

Inside the 2025 Energy Phishing Wave: Chevron, Conoco, PBF, Phillips 66
Sep 11, 2025

Hunt.io uncovers the 2025 Energy Phishing Wave, with Chevron, Conoco, PBF, and Phillips 66 targeted by large-scale cloning and brand abuse. Learn more.

Threat Research

🌎 North America

MaaS

Phishing & Social Engineering

Sep 2025

Interview with Daniel Plohmann: Malpedia, Malware Analysis, and Research Insights
Sep 9, 2025

Daniel Plohmann discusses building Malpedia, advancing malware research with MCRIT, and how metalcore and music inspire his work beyond security.

Threat Research

Sep 2025

TinyLoader Malware: Crypto Theft & C2 Infrastructure
Sep 2, 2025

Investigation into TinyLoader malware stealing cryptocurrency via Redline Stealer, USB spread, and C2 infrastructure.

Threat Research

🌍 Global

TinyLoader

RedLine Stealer

Malware Delivery

Sep 2025

Announcing Hunt 2.5
Aug 21, 2025

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.

Product News

Aug 2025

APT MuddyWater Targets CFOs with Multi-Stage Phishing & NetBird Abuse
Aug 20, 2025

Hunt.io uncovers MuddyWater phishing campaigns using Firebase lures, VBS payloads, and NetBird for persistent remote access. Learn more.

Threat Research

🌍 Middle East

PowGoop

MuddyWater RAT

Malware Delivery

MuddyWater

Aug 2025

ERMAC V3.0 Banking Trojan: Full Source Code Leak and Infrastructure Analysis
Aug 14, 2025

Hunt.io uncovers the complete ERMAC V3.0 source code, revealing its infrastructure, vulnerabilities, and expanded form injection capabilities.

Threat Research

🌍 Global

ERMAC v3

Malware Delivery

Aug 2025

APT Sidewinder Abuses Netlify to Mimic Government and Military Portals in South Asia
Aug 8, 2025

APT Sidewinder targets South Asian government and military portals using Netlify-hosted phishing pages to harvest credentials. Learn more.

Threat Research

🌏 Asia

Phishing & Social Engineering

APT Sidewinder

Aug 2025

APT36 Targets Indian Infrastructure with Desktop Lures and Poseidon Backdoor
Jul 31, 2025

APT36 expands its campaign beyond defense, using phishing, .desktop lures, and the Poseidon backdoor to target Indian infrastructure.

Threat Research

🇮🇳 India

Poseidon

Malware Delivery

APT36

Jul 2025

Clickfix on macOS: AppleScript Stealer, Terminal Phishing, and C2 Infrastructure
Jul 22, 2025

Phishing campaign targets macOS with fake prompts that run AppleScript via terminal, stealing wallets, cookies, and sensitive files.

Threat Research

🇮🇳 India

🌏 Asia

Phishing & Social Engineering

Malware Delivery

APT36

Jul 2025

630K gov.br Subdomains Abused in SEO Poisoning Attack
Jul 17, 2025

Over 630K hijacked gov.br subdomains were exploited in a black hat SEO campaign using cloaking, keyword stuffing, and redirect techniques. Learn more.

Threat Research

🌎 South America

Poseidon

GhostRAT

Abuse of Legitimate Services

Jul 2025

Announcing Hunt 2.4
Jul 15, 2025

Hunt 2.4 adds archive-aware search, deeper SQL visibility, and improved phishing intel to make threat hunting faster, clearer, and more powerful.

Product News

Jul 2025

Eggs, Alerts, and Adversaries: Talking with Jose Hernandez from Splunk
Jul 8, 2025

Splunk’s Jose Hernandez talks building detections, curious hires, Hunt.io in action, and balancing threat research with chickens and family life.

Threat Research

Jul 2025

Threat Hunting at Scale: Explore 10.6B URLs to Find Payloads, C2s, and Exposed Assets with URLx
Jun 26, 2025

Explore 10.6B structured URLs with URLx. Find malware payloads, C2 paths, phishing campaigns, and exposed assets, fast.

Threat Research

Jun 2025

Announcing Hunt 2.3: Improved Threat Hunting Experience & SSO Availability
Jun 25, 2025

Hunt 2.3 is here: analyst-driven insights, easier pivots, better phishing workflows, and full SSO support for enterprise teams.

Product News

Jun 2025

Cobalt Strike PowerShell Loader Found on Chinese and Russian Infrastructure
Jun 19, 2025

Our threat hunters uncovered a PowerShell loader hosted by Chinese and Russian providers, linked to active Cobalt Strike infrastructure.

Threat Research

🌍 Global

Cobalt Strike

Malware Delivery

Jun 2025

Fast and Curious: Red Teaming, Race Cars, and Hunt.io with Justin Elze
Jun 17, 2025

TrustedSec CTO Justin Elze shares red teaming insights, offensive tooling tips, and how he uses Hunt.io and AttackCapture™, plus his passion for race car data.

Threat Research

Jun 2025

Introducing Hunt 2.2: AttackCapture™ Zip Extraction, Smarter SQL, IP History Consolidation, and more
Jun 12, 2025

Explore Hunt 2.2: Auto-unpack zips in AttackCapture™, smarter SQL with WHOIS and Nmap, and full IP history consolidation, track abused hosting with Host Radar, and more.

Product News

Jun 2025

Paste.ee Abuse Uncovered: XWorm & AsyncRAT Infrastructure
Jun 5, 2025

See how attackers abuse paste.ee to deliver XWorm and AsyncRAT, using obfuscated scripts and globally distributed C2 infrastructure.

Threat Research

🌍 Global

AsyncRAT

XWorm

Malware Delivery

Jun 2025

Track Threat Actors Using Real-World IOC Pivoting
May 29, 2025

Track attacker infrastructure with Hunt.io’s real-time IOC pivoting and threat actor intelligence. Learn more.

Threat Research

🌍 Global

IOC Pivoting

May 2025

Introducing Hunt 2.1:  Refinements to the Threat Hunting Experience
May 21, 2025

Discover the new Hunt.io updates: deep text assisted analysis, IOC feed improvements, improved threat actor data, and faster advanced search. Learn more.

Product News

May 2025

Shared SSH Keys Expose Phishing Infrastructure Targeting Kuwait
May 15, 2025

Shared SSH keys expose coordinated phishing targeting Kuwaiti fisheries, telecoms, and insurers with cloned login portals and mobile payment lures. Learn more.

Threat Research

🌍 Middle East

Phishing & Social Engineering

May 2025

Detecting IOX, FRP, Rakshasa, and Stowaway Proxies Using Hunt.io
May 8, 2025

This post explores open-source proxy tools commonly used in attacker and red team infrastructure, and shows how defenders can detect IOX, FRP, Rakshasa, and Stowaway at scale using Hunt.io.

Threat Research

🌏 Asia

FRP/Rakshasa

Command & Control (C2)

May 2025

APT36-Linked ClickFix Campaign Spoofs Indian Ministry of Defence, Targets Windows & Linux Users
May 5, 2025

APT36-style phishing campaign mimics India’s Ministry of Defence to drop malware on Windows and Linux via spoofed press releases and HTA payloads.

Threat Research

🇮🇳 India

Phishing & Social Engineering

APT36

May 2025

APT34-Like Threat Infrastructure Uncovered Before Activation
Apr 22, 2025

APT34-like infrastructure mimicking an Iraqi academic institute and fake UK tech firms reveals early-stage staging on M247 servers. Learn what to track

Threat Research

🌍 Middle East

Karkoff

SideTwist

PowBAT

Command & Control (C2)

APT34

Apr 2025

KeyPlug Server Exposes Fortinet Exploits & Webshell Activity Targeting a Major Japanese Company
Apr 17, 2025

Briefly exposed KeyPlug infrastructure revealed Fortinet exploits, encrypted webshells, and recon scripts targeting Shiseido, a major Japanese enterprise. Learn more..

Threat Research

🌍 Global

KEYPLUG

Tool & Infrastructure Exposure

Chinese APT

Apr 2025

Server-Side Phishing: How Credential  Theft Campaigns Are Hiding in Plain Sight
Apr 15, 2025

Phishing campaign evades detection with server-side logic. See how employee portals are targeted—and how defenders can uncover them. Learn more.

Threat Research

🌍 Global

Pterodo

ShadowPad

Phishing & Social Engineering

Gamaredon

ShadowPad ecosystem

Apr 2025

GoPhish Infrastructure Targets Polish Energy and Government
Apr 10, 2025

Explore how the GoPhish framework was leveraged to stage infrastructure and domains spoofing Polish government and energy entities.

Threat Research

🇵🇱 Poland

Gopish

Phishing & Social Engineering

Apr 2025

Hunt.io Insights: Gamaredon’s Flux-Like Infrastructure and a Look at Recent ShadowPad Activity
Apr 8, 2025

Explore Gamaredon’s flux-like DNS and ShadowPad malware infrastructure, with insights into how these attacker networks are configured, rotated, and maintained.

Threat Research

🇪🇺 Europe

🌏 Asia

ShadowPad

Command & Control (C2)

Apr 2025

Proactive ClickFix Threat Hunting with Hunt.io
Apr 3, 2025

Learn how Hunt.io identifies early-stage ClickFix delivery pages across the web using advanced search capabilities to stay ahead of exploitation attempts.

Threat Research

🌏 Asia

ClickFix

Phishing & Social Engineering

APT36

Apr 2025

Russian-Speaking Threat Actor Abuses Cloudflare & Telegram in Phishing Campaign
Apr 1, 2025

Learn how a Russian-speaking threat actor has evolved from impersonating EFF to now deploying Cloudflare-themed phishing with Telegram-based C2.

Threat Research

🇷🇺 Russian

Abuse of Legitimate Services

Apr 2025

URLx Just Got Bigger: 10.6B URLs for Recon and Malicious Infrastructure Hunting
Mar 27, 2025

Explore exposed infrastructure with URLx: 10.6B+ URLs, HTTPx integration, and advanced filtering - now live in Hunt.io.

Product News

Mar 2025

A Practical Guide to Uncovering Malicious Infrastructure With Hunt.io
Mar 25, 2025

Learn how to track and map adversary infrastructure using Hunt, pivoting from a single IP to uncover hidden connections through infrastructure overlaps and key intelligence indicators.

Threat Research

🌍 Global

Malware Delivery

Mar 2025

Introducing IOC Hunter Feed and Attribution for Enhanced Threat Intelligence
Mar 20, 2025

Track threat actors and malicious infrastructure with Hunt.io’s IOC Hunter Feed and C2 Attribution. Get deeper visibility and context for better threat intelligence.

Product News

Mar 2025

South Korean Organizations Targeted by Cobalt Strike ‘Cat’ Delivered by a Rust Beacon
Mar 18, 2025

Discover how threat actors used a Rust loader to deploy Cobalt Strike ‘Cat’ against South Korean targets. Learn more.

Threat Research

🇰🇷 South Korea

Cobalt Strike

Malware Delivery

DPRK (North Korea)

Mar 2025

JSPSpy and ‘Filebroser’: A Custom File Management Tool in Webshell Infrastructure
Mar 11, 2025

Discover how threat actors deploy a rebranded File Browser alongside JSPSpy for stealth file management on compromised servers.

Threat Research

JSPSpy

FileBrowser

Malware Delivery

Lazarus Group

Mar 2025

Introducing Hunt 2.0: Deeper Threat Analysis & Enhanced Data for Cyber Intelligence
Mar 6, 2025

Our latest release delivers deeper threat analysis with improved threat actor, C2, malware data, and new integrations for robust cyber intelligence.

Product News

Mar 2025

Exposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2
Mar 4, 2025

Discover how an open directory exposed a threat actor impersonating EFF to target gamers and how we mapped their infrastructure to Stealc & Pyramid C2.

Threat Research

🌍 Global

Stealc

Pyramid

Phishing & Social Engineering

Malware Delivery

Russian APT

Mar 2025

Uncovering Joker’s C2 Network: How Hunt’s SSL History Exposed Its Infrastructure
Feb 27, 2025

Discover Joker malware infrastructure with Hunt SSL History, mapping its C2 network through certificate tracking of recent and past activity.

Threat Research

🌍 Global

Joker

Certificate & TLS Abuse

Feb 2025

LightSpy Malware Now Targets Facebook & Instagram Data
Feb 20, 2025

A new LightSpy server expands its attack scope, targeting Facebook and Instagram database files. Explore its evolving capabilities and infrastructure.

Threat Research

🌏 Asia

LightSpy

Data Theft & Exfiltration

Chinese APT

Feb 2025

Backdoored Installers for Signal, Line, and Gmail Target Chinese-Speaking Users
Feb 18, 2025

Read how attackers distribute backdoored Signal, Line, and Gmail installers through fraudulent download pages and how to defend against this campaign.

Threat Research

🇨🇳 China

Backdoor Installer

Malware Delivery

Feb 2025

Advanced Threat Hunting with New SSL Features: Unlocking HuntSQL™ Anomaly Flags for Deeper Detection
Feb 13, 2025

Hunt.io enhances SSL threat hunting with new anomaly flags in HuntSQL™, improving the detection of misconfigurations, expired certificates, and malware infrastructure.

Product News

Feb 2025

Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
Feb 12, 2025

Discover how Pyramid, an open-source tool, enables post-exploitation. Learn detection methods using HTTP headers and recent findings in Hunt.

Threat Research

Pyramid

Reconnaissance & Scanning

Feb 2025

SmokeLoader Malware Targets Ukraine’s Auto & Banking Sectors via Open Directories
Feb 6, 2025

Attackers used open directories to spread SmokeLoader malware, luring Ukraine’s auto and banking sectors. Explore findings, execution, and tactics.

Threat Research

🇺🇦 Ukraine

SmokeLoader

Abuse of Legitimate Services

Feb 2025

GreenSpot APT Targets 163.com Users with Fake Download Pages & Spoofed Domains
Feb 4, 2025

GreenSpot APT targets 163.com users via fake download pages and domain spoofing. Learn their tactics, risks, and how to protect your email accounts.

Threat Research

🌏 Asia

Phishing & Social Engineering

GreenSpot APT

Feb 2025

Unlock SSL Intelligence: How SSL History Boosts Threat Hunting
Jan 30, 2025

Explore how SSL intelligence and SSL history empower proactive threat hunting. Learn tools, real-world examples, and strategies to track cyber threats.

Threat Research

Jan 2025

Unmasking SparkRAT: Detection & macOS Campaign Insights
Jan 28, 2025

Explore SparkRAT detection tactics, macOS targeting, and insights into recent DPRK-linked campaigns with actionable research findings.

Threat Research

🌏 Asia

SparkRAT

Command & Control (C2)

DPRK (North Korea)

Jan 2025

Suspected KEYPLUG Infrastructure: TLS Certificates and GhostWolf Links
Jan 23, 2025

Uncover how Hunt’s TLS records reveal patterns in suspected KEYPLUG infrastructure, linking GhostWolf and RedGolf/APT41 to ongoing activity.

Threat Research

🌏 Asia

KEYPLUG

Certificate & TLS Abuse

APT41

GhostWolf

Jan 2025

VS Code Extension Impersonating Zoom Targets Google Chrome Cookies
Jan 21, 2025

Uncover a deceptive VS Code extension, masquerading as Zoom, that pilfers your Google Chrome cookies. Join us as we expose the techniques behind this alarming supply chain campaign.

Threat Research

🌍 Global

Malicious Extension

Malware Delivery

Jan 2025

‘JustJoin’ Landing Page Linked to Suspected DPRK Activity Resurfaces
Jan 14, 2025

Learn how a landing page mimicking “JustJoin,” tied to suspected DPRK cyber activity, has reappeared with new infrastructure linked through SSH key overlaps.

Threat Research

🇰🇷 South Korea

Credential Reuse

DPRK (North Korea)

Jan 2025

Cyberhaven Extension Compromise: TLS Certificates Reveal Hidden Infrastructure
Jan 9, 2025

Read more about connections through a TLS certificate linking reported and unreported infrastructure tied to the Cyberhaven extension compromise.

Threat Research

🌍 Global

Malicious Extension

Certificate & TLS Abuse

Jan 2025

Golang Beacons and VS Code Tunnels: Tracking a Cobalt Strike Server Leveraging Trusted Infrastructure
Jan 7, 2025

Learn how a Cobalt Strike server with a TLS certificate and prominent watermark showed a Golang-compiled beacon communicating with Visual Studio Code tunnels.

Threat Research

🌍 Global

Cobalt Strike

Command & Control (C2)

Jan 2025

Dec 20, 2024

Discover Hunt.io's 2024 highlights: major product launches, innovations like AttackCapture™, C2 Feed, and Hunt SQL, and a look ahead to 2025.

Product News

Dec 2024

Oyster’s Trail: Resurgence of Infrastructure Linked to Ransomware and Cybercrime Actors
Dec 12, 2024

Our latest analysis uncovers domains linked to the Oyster backdoor, revealing suspected Vanilla Tempest infrastructure and offering insights into server configuration patterns.

Threat Research

🇪🇺 Europe

🌎 North America

Oyster

IOC Pivoting

Vanilla Tempest

Dec 2024

“Million OK!!!!” and the Naver Facade: Tracking Recent Suspected Kimsuky Infrastructure
Dec 10, 2024

Learn how the 'Million OK!!!' HTTP response previously linked to Kimsuky has reappeared on new IPs and domains. This update provides the latest insights into evolving infrastructure, helping defenders stay informed on potential North Korean threat activity.

Threat Research

🇰🇷 South Korea

Beacon Reuse

Kimsuky

Dec 2024

MoqHao Leverages iCloud and VK in Campaign Targeting Apple IDs and Android Device
Dec 5, 2024

Discover how the MoqHao campaign leveraging iCloud and VK employs cross-platform tactics to steal credentials and distribute malicious APKs.

Threat Research

🌏 Asia

MoqHao

Phishing & Social Engineering

Dec 2024

Rare Watermark Links Cobalt Strike 4.10 Team Servers to Ongoing Suspicious Activity
Dec 3, 2024

Uncover the infrastructure and learn how a unique watermark led to the discovery of Cobalt Strike 4.10 team servers impersonating well-known brands.

Threat Research

🌍 Global

Cobalt Strike

Command & Control (C2)

Dec 2024

 Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
Nov 28, 2024

Learn how threat actors leverage open directories to deliver XWorm malware disguised as popular software, providing insight into their tactics.

Threat Research

🌍 Global

XWorm

Malware Delivery

Nov 2024

DarkPeony’s Trail: Certificate Patterns Point to Sustained Campaign Infrastructure
Nov 21, 2024

Explore how DarkPeony's consistent use of certificates reveals ongoing infrastructure activity, indicating consistent operations across different regions.

Threat Research

🌏 Asia

🇪🇺 Europe

DarkPeony

Certificate & TLS Abuse

Nov 2024

XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method
Nov 19, 2024

Discover XenoRAT’s adoption of Excel XLL files and Confuser’s tactical shift from its usual methods, with our insights on adapting to evolving malware techniques.

Threat Research

🌍 Global

XenoRAT

Evasion & Obfuscation

DPRK (North Korea)

Nov 2024

Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator
Nov 12, 2024

Sliver C2 and Ligolo-ng join forces in a campaign likely targeting Y Combinator, revealing tactics and infrastructure aimed at the accelerator's network. Learn more.

Threat Research

🌎 North America

Sliver

Ligolo-ng

Command & Control (C2)

Nov 2024

RunningRAT’s Next Move: From Remote Access to Crypto mining For Profit
Nov 5, 2024

RunningRAT has shifted from access-driven tactics to crypto mining, using open directories to stage payloads and reduce direct C2 traffic.

Threat Research

🌍 Global

RunningRAT

XMRig

Botnet Activity, Cryptomining

Nov 2024

Tricks, Treats, and Threats: Cobalt Strike & the Goblin Lurking in Plain Sight
Oct 31, 2024

Discover an open directory of red team tools fit for Halloween, from Cobalt Strike to BrowserGhost.

Threat Research

Cobalt Strike

BrowserGhost

Tool & Infrastructure Exposure

Oct 2024

Suspected DPRK Phishing Campaign Targets Naver; Separate Apple Domain Spoofing Cluster Identified
Oct 29, 2024

Explore a suspected North Korean-linked phishing campaign targeting Naver and how unknown actors use distinct TLS certificates to spoof Apple domains.

Threat Research

🇰🇷 South Korea

Phishing & Social Engineering

DPRK (North Korea)

Oct 2024

Rekoobe Backdoor Discovered in Open Directory, Possibly Targeting TradingView Users
Oct 24, 2024

Discover how an open directory of Rekoobe malware samples led to different domains resembling trading platforms, posing risks for traders and investors.

Threat Research

🌍 Global

Rekoobe

Malware Delivery

Oct 2024

WarmCookie Infrastructure Update: Uncovering New C2 Servers and Threats
Oct 17, 2024

Get an inside look at Warmcookie’s updated C2 infrastructure linked to its latest update. We reveal insights into newly identified servers that can assist defenders in identifying related servers.

Threat Research

WarmCookie

Command & Control (C2)

Oct 2024

Introducing Code Search on AttackCapture: Uncover Exploit Code, Reverse Shells, C2 Configs, and More
Oct 15, 2024

Read how CodeSearch helps security professionals to identify exploit code, reverse shells, and C2 configs across open directories, enhancing threat detection.

Threat Research

Oct 2024

Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
Oct 10, 2024

Learn how basic tracking techniques using unusual certificates and redirects helped uncover Earth Baxia and a hidden cyber threat, providing practical insights for network defense.

Threat Research

🌏 Asia

PlugX

Tool & Infrastructure Exposure

Earth Baxia

Oct 2024

Inside a Cybercriminal’s Server: DDoS Tools, Spyware APKs, and Phishing Templates
Oct 8, 2024

Explore our in-depth analysis of a cybercriminal’s server, revealing DDoS tools, SpyNote spyware, phishing sites, and ransomware tactics.

Threat Research

🌍 Global

SpyNote

DDoS Scripts

Tool & Infrastructure Exposure

Oct 2024

Announcing Hunt SQL
Oct 3, 2024

We’re excited to release Hunt SQL and to provide the power and flexibility of SQL to researchers, analysts and threat hunters alike. 

Product News

Oct 2024

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection  | Hunt.io
Oct 1, 2024

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection | Hunt.io

Threat Research

Packed Python Script

Evasion & Obfuscation

Oct 2024

Echoes of Stargazer Goblin: Analyzing Shared TTPs from an Open Directory
Sep 24, 2024

Check out our new blog post on exposed files found in an open directory that reveal an attack with overlapping TTPs linked to the Stargazers network.

Threat Research

Initial Access & Exploitation

Sep 2024

Announcing Hunt APIs
Sep 17, 2024

Today Hunt is announcing our IP Enrichment API. You can get detailed data on every IPv4 Address and enrich any existing system.

Product News

Sep 2024

Decoy Docs and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Sep 10, 2024

Compromising a browser can be a goldmine for attackers, offering extensive access to sensitive user data ...

Threat Research

🇰🇷 South Korea

Malicious Extension

Phishing & Social Engineering

Kimsuky

Sep 2024

ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
Sep 3, 2024

The ToneShell backdoor, frequently associated with Mustang Panda (also known as Stately Taurus and Earth Preta...

Threat Research

🌍 Global

ToneShell

Phishing & Social Engineering

Mustang Panda

Sep 2024

Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims
Aug 29, 2024

During a recent analysis of known Latrodectus infrastructure, our research team encountered a command-and-control...

Threat Research

🇰🇷 South Korea

Latrodectus

Fake Installer

Malware Delivery

Aug 2024

Launching AttackVault by Hunt.Io
Aug 23, 2024

We originally launched our "Open Directory" feature in Hunt a year ago.  The premise behind it was to get into the mind of the attacker by get a backstage view into their attacks.  What we learned was that there was a ton of information that could be correlated and indexed.  Today, we're reaffirming our commitment to getting into the tooling of attackers by launching AttackCapture™ by Hunt.io.

Product News

Aug 2024

EvilGophish Unhooked: Insights Into the Infrastructure and Notable Domains
Aug 13, 2024

In late 2023, Hunt Research published a blog post detailing how we uncover emerging and previously unknown Gophish infrastructure.

Threat Research

Gophish

Phishing & Social Engineering

Aug 2024

Pentester or Threat Actor? Open Directory Exposes Test Results and Possible Targeting of Government Organizations
Aug 7, 2024

During routine research of newly identified open directories, the Hunt Research Team made a startling discovery: a...

Threat Research

Tool & Infrastructure Exposure

Aug 2024

macOS Malware Impersonates The Unarchiver App to Steal User Data | Hunt.io
Jul 30, 2024

Discover how macOS malware tricks users into downloading an app disguised as The Unarchiver app. The app contains a binary named “CryptoTrade” designed to steal sensitive user information.

Threat Research

🌍 Global

CryptoTrade

Malware Delivery

Jul 2024

A Simple Approach to Discovering Oyster Backdoor Infrastructure | Hunt.io
Jul 23, 2024

Oyster backdoor, also known as Broomstick (IBM) and CleanUpLoader (RussianPanda – X), has been linked to...

Threat Research

Oyster

IOC Pivoting

Jul 2024

SEO Poisoning Campaigns Target Browser Installers and Crypto Sites, Spreading Poseidon, GhostRAT & More
Jul 16, 2024

The Hunt Research Team recently stumbled upon Search Engine Optimization (SEO) poisoning campaigns posing as ...

Threat Research

🌍 Global

Poseidon

Gh0st RAT

Malware Delivery

Jul 2024

The Secret Ingredient: Unearthing Suspected SpiceRAT Infrastructure via HTML Response
Jul 11, 2024

Reports on new malware families often leave subtle clues that lead researchers to uncover additional infrastructure not...

Threat Research

🇪🇺 Europe

🌏 Asia

SpiceRAT

Malware Delivery

Jul 2024

ProxyLogon and ProxyShell Used to Target Government Mail Servers in Asia, Europe, and South America
Jul 2, 2024

Nearly three years after ProxyLogon and ProxyShell wreaked widespread havoc on Microsoft Exchange servers, the Hunt

Threat Research

🌏 Asia

🇪🇺 Europe

🌎 South America

Initial Access & Exploitation

Jul 2024

Geacon and Geacon_Pro: A Constant Menace to Linux and Windows Systems
Jun 27, 2024

The red-teaming tool Cobalt Strike has long been a staple for simulating attacks, predominantly targeting Windows ...

Threat Research

🌍 Global

Geacon

Command & Control (C2)

Chinese APT

Jun 2024

Good Game, Gone Bad: Xeno RAT Spread Via .gg Domains and GitHub
Jun 25, 2024

XenoRAT, an open-source malware available on GitHub, has been linked to a North Korean hacking group and unnamed...

Threat Research

🌍 Global

XenoRAT

Abuse of Legitimate Services

DPRK (North Korea)

Jun 2024

Caught in the Act: Uncovering SpyNote in Unexpected Places
Jun 20, 2024

In hidden corners of the Internet, open directories often serve as treasure troves, offering a glimpse into the unguarded...

Threat Research

SpyNote

Malware Delivery

Jun 2024

Open Directories Expose Publicly Available Tools Targeting Asian Organizations
Jun 18, 2024

The Hunt Research Team recently identified an exposed web server used to target the Taiwanese Freeway Bureau and a...

Threat Research

🌏 Asia

Tool & Infrastructure Exposure

Chinese APT

Jun 2024

Gh0st and Pantegana: Two RATs that Refuse to Fade Away
Jun 12, 2024

Gh0st and Pantegana remote access tools/trojans (RATs) may seem unlikely to be discussed, but both have made notable...

Threat Research

🌍 Global

Gh0st RAT

Pantegana RAT

Malware Delivery

DriftingCloud

Jun 2024

Jun 6, 2024

In this post, we'll detail the infrastructure of the LightSpy spyware framework and highlight the unique TLS certificate...

Threat Research

🌏 Asia

LightSpy

Certificate & TLS Abuse

Jun 2024

Legacy Threat: PlugX Builder/Controller Discovered in Open Directory
Jun 5, 2024

The threat actor(s) built and controlled at least one of the binaries on the same server, granting us access to numerous..

Threat Research

PlugX

Tool & Infrastructure Exposure

Chinese APT

Jun 2024

SolarMarker: Hunt Insights and Findings
May 30, 2024

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.

Threat Research

🌎 North America

🇪🇺 Europe

SolarMarker

Malware Delivery

Multi-Stage Infection

May 2024

Tales from the Hunt: A Look at Yakit Security Tool
May 28, 2024

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.

Threat Research

Yakit

May 2024

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.

Threat Research

May 2024

Into the Viper’s Nest: Observations from Hunt’s Scanning
May 8, 2024

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...

Threat Research

May 2024

Spotting SparkRAT: Detection Tactics & Sandbox Findings
Apr 23, 2024

The Hunt Research Team vigilantly monitors GitHub, sifts through the IOC sections of threat intelligence reports, and scours various online forums for emerging threats, ensuring our detections stay practical and current for our customers. Our focus frequently turns to lesser-known threats that can still wreak havoc on the networks of uninformed defenders.

Threat Research

SparkRAT

Lateral Movement & Persistence

Apr 2024

In Plain Sight: Uncovering SuperShell & Cobalt Strike from an Open Directory
Apr 16, 2024

Hunt scans every corner of the public IPV4 space and constantly scours the Internet for open directories. Through...

Threat Research

SuperShell

Cobalt Strike

Tool & Infrastructure Exposure

Apr 2024

BlueShell: Four Years On, Still A Formidable Threat
Apr 9, 2024

Platforms like GitHub offer a valuable resource for developers and the open-source community. However, these sites also create a potential...

Threat Research

BlueShell

Malware Delivery

Apr 2024

A Hunt How-To: Detecting RedGuard C2 Redirector
Apr 2, 2024

If you’re like me, you’ve likely read multiple reports on network intrusions involving a “standard” deployment...

Threat Research

RedGuard

Command & Control (C2)

Apr 2024

Coin Miner and Mozi Botnet
Mar 28, 2024

Open directories can sometimes contain unexpected dangers in the hidden parts of the internet. Our recent investigation...

Threat Research

Mozi

XMRig

Botnet Activity, Cryptomining

May 2024

A Treasure Trove of Trouble: Open Directory Exposes Red Team Tools
Mar 21, 2024

While open directories are often seen as a goldmine for security researchers and blue teams searching for malware...

Threat Research

Mimikatz

Tool & Infrastructure Exposure

May 2024

One More Trip to The W3LL: Phishing Kit Targets Outlook Credentials
Mar 19, 2024

The W3LL Phishing Kit, a phishing-as-a-service (PAaS) tool, was identified by Group-IB in 2022. What makes the kit...

Threat Research

🌍 Global

W3LL

Phishing & Social Engineering

May 2024

Hunting PrismX: Techniques for Network Discovery
Mar 12, 2024

Described on its GitHub README as an "Integrated lightweight cross-platform penetration system," PrismX goe...

Threat Research

PrismX

Reconnaissance & Scanning

May 2024

Open Directory Exposes Phishing Campaign Targeting Google & Naver Credentials
Mar 5, 2024

Over the past month, Hunt has tracked an ongoing phishing campaign by a likely North Korean threat actor focused on...

Threat Research

🇰🇷 South Korea

🌍 Global

Phishing & Social Engineering

DPRK (North Korea)

May 2024

Feb 28, 2024

Hunt is tracking an ongoing sophisticated phishing campaign targeting individuals in the Telegram groups focused on...

Threat Research

🌍 Global

Pyramid

NK Dropper

Phishing & Social Engineering

DPRK (North Korea)

Feb 2024

Unveiling the Power of Tag Cloud: Navigating the Digital Landscape with Precision
Feb 14, 2024

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...

Threat Research

Feb 2024

Tracking ShadowPad Infrastructure Via Non-Standard Certificates
Feb 9, 2024

This post will examine ShadowPad infrastructure linked to a yet-to-be-identified threat actor. What makes this activity...

Threat Research

🌏 Asia

ShadowPad

Certificate & TLS Abuse

Feb 2024

Feb 6, 2024

Where national interests, strategic ambitions, and sometimes personal gain intertwine, state-linked cyber threat actors...

Threat Research

Feb 2024

The Accidental Malware Repository: Hunting & Collecting Malware Via Open Directories (Part 1)
Feb 1, 2024

This post will serve as the first in a long series of articles on using the platform to identify malicious infrastructure and hunt...

Threat Research

Feb 2024

Introducing Hunt Advanced Search
Jan 30, 2024

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...

Threat Research

Jan 2024

How We Identify Malicious Infrastructure At Hunt.io
Jan 24, 2024

ShadowPad, Quasar RAT, HeadLace, Emotet, and SIGNBT (to name a few) often grab headlines and captivate readers...

Threat Research

Jan 2024

Introducing the Hunt.io C2 Feed
Jan 15, 2024

It’s been a while since we announced a new feature, and with 2024 already in full swing, it is time to highlight what’s...

Product News

Jan 2024

Announcing IOC-Hunter
Nov 14, 2023

As the end of the year approaches, we continue to enhance our feature set by building on well-established threat-...

Product News

Nov 2023

Gateway to Intrusion: Malware Delivery Via Open Directories
Oct 31, 2023

Attackers constantly devise new and sophisticated methods of delivering malware to infiltrate systems and exfiltrate...

Threat Research

Malware Delivery

Oct 2023

How Hunt.io Identifies Services on Non-Standard Ports
Oct 25, 2023

The term “threat hunting” is generally associated with detecting malicious behavior on endpoints manually...

Threat Research

Oct 2023

Phish No More: A Hunt.io Guide to Gophish Detection
Oct 12, 2023

Phishing is more than a social engineering technique; it's a harrowing threat landscape where deception, innovation, and vigilance collide.

Threat Research

Oct 2023

Sep 28, 2023

In the ever-evolving world of cybersecurity, few individuals embody the spirit of innovation and exploration as profoundly as John Althouse.

Threat Research

Sep 2023

Hunt Platform Statistics Launch
Sep 19, 2023

Learn about the Hunt.io massive observation collection platform.

Threat Research

Sep 2023

Discovering & Disrupting Malicious Infrastructure
Sep 12, 2023

Michael showcases how the Hunt platform can be leveraged to proactively identify infrastructure not yet publicly reported on from recent malware campaigns.

Threat Research

Aug 17, 2023

How Open Directories Help with Threat Hunting and Incident Response.

Threat Research

Let's go Hunting
Aug 1, 2023

We are excited to unveil Hunt.io, a cutting-edge threat hunting solution that is set to transform the landscape of cybersecurity.

Threat Research

From Munitions to Malware: Joseph Harrison on Threat Detection & Digital Forensics
Oct 23, 2025

In this interview, Joseph Harrison shares how his Air Force-minted discipline fuels his work in threat detection and digital forensics, and how he leverages Hunt.io’s data (especially JA4) to catch adversaries others miss.

Threat Research

Oct 2025

Introducing Hunt 2.6: IP Risk & Reputation, Smarter IOC Hunting, and Faster Integrations
Oct 20, 2025

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.

Product News

Oct 2025

Oct 16, 2025

A large-scale macOS malware campaign mimics trusted dev tools to spread Odyssey Stealer and AMOS via fake Homebrew sites. Learn more.

Threat Research

🇪🇺 Europe

🌎 North America

Odyssey Stealer

AMOS Spyware

Malware Delivery

Odyssey

AMOS

Oct 2025

AdaptixC2 Uncovered: Capabilities, Tactics & Hunting Strategies
Oct 9, 2025

A deep dive into AdaptixC2: modular architecture, multi-protocol communication, evasion tactics, IOCs, and defense strategies.

Threat Research

🌏 Asia

AdaptixC2

Command & Control (C2)

AdaptixC2

Oct 2025

Operation SouthNet: SideWinder Targets South Asia Maritime
Oct 1, 2025

SideWinder’s Operation SouthNet: South Asia phishing on Netlify/pages.dev, Zimbra/Outlook lures, and open directories. Maritime focus. IOCs included. Learn more.

Threat Research

🌏 Asia

SideWinder

Phishing & Social Engineering

APT Sidewinder

Oct 2025

Hunting C2 Panels: Beginner’s Guide for Identifying Command and Control Dashboards
Sep 25, 2025

Beginner’s guide to hunting exposed C2 dashboards like Supershell, HookBot, Chaos, Unam, Mythic, and Metasploit using paths, titles, and hashes

Threat Research

🌍 Global

Command & Control (C2)

Sep 2025

AsyncRAT Campaigns Uncovered: How Attackers Abuse ScreenConnect and Open Directories
Sep 18, 2025

Research on AsyncRAT campaigns using trojanized ScreenConnect installers and open directories, exposing resilient attacker infrastructure and C2 tactics. Learn more.

Threat Research

🌍 Global

AsyncRAT

Command & Control (C2)

Sep 2025

Inside the 2025 Energy Phishing Wave: Chevron, Conoco, PBF, Phillips 66
Sep 11, 2025

Hunt.io uncovers the 2025 Energy Phishing Wave, with Chevron, Conoco, PBF, and Phillips 66 targeted by large-scale cloning and brand abuse. Learn more.

Threat Research

🌎 North America

MaaS

Phishing & Social Engineering

Sep 2025

Interview with Daniel Plohmann: Malpedia, Malware Analysis, and Research Insights
Sep 9, 2025

Daniel Plohmann discusses building Malpedia, advancing malware research with MCRIT, and how metalcore and music inspire his work beyond security.

Threat Research

Sep 2025

TinyLoader Malware: Crypto Theft & C2 Infrastructure
Sep 2, 2025

Investigation into TinyLoader malware stealing cryptocurrency via Redline Stealer, USB spread, and C2 infrastructure.

Threat Research

🌍 Global

TinyLoader

RedLine Stealer

Malware Delivery

Sep 2025

Announcing Hunt 2.5
Aug 21, 2025

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.

Product News

Aug 2025

APT MuddyWater Targets CFOs with Multi-Stage Phishing & NetBird Abuse
Aug 20, 2025

Hunt.io uncovers MuddyWater phishing campaigns using Firebase lures, VBS payloads, and NetBird for persistent remote access. Learn more.

Threat Research

🌍 Middle East

PowGoop

MuddyWater RAT

Malware Delivery

MuddyWater

Aug 2025

ERMAC V3.0 Banking Trojan: Full Source Code Leak and Infrastructure Analysis
Aug 14, 2025

Hunt.io uncovers the complete ERMAC V3.0 source code, revealing its infrastructure, vulnerabilities, and expanded form injection capabilities.

Threat Research

🌍 Global

ERMAC v3

Malware Delivery

Aug 2025

APT Sidewinder Abuses Netlify to Mimic Government and Military Portals in South Asia
Aug 8, 2025

APT Sidewinder targets South Asian government and military portals using Netlify-hosted phishing pages to harvest credentials. Learn more.

Threat Research

🌏 Asia

Phishing & Social Engineering

APT Sidewinder

Aug 2025

APT36 Targets Indian Infrastructure with Desktop Lures and Poseidon Backdoor
Jul 31, 2025

APT36 expands its campaign beyond defense, using phishing, .desktop lures, and the Poseidon backdoor to target Indian infrastructure.

Threat Research

🇮🇳 India

Poseidon

Malware Delivery

APT36

Jul 2025

Clickfix on macOS: AppleScript Stealer, Terminal Phishing, and C2 Infrastructure
Jul 22, 2025

Phishing campaign targets macOS with fake prompts that run AppleScript via terminal, stealing wallets, cookies, and sensitive files.

Threat Research

🇮🇳 India

🌏 Asia

Phishing & Social Engineering

Malware Delivery

APT36

Jul 2025

630K gov.br Subdomains Abused in SEO Poisoning Attack
Jul 17, 2025

Over 630K hijacked gov.br subdomains were exploited in a black hat SEO campaign using cloaking, keyword stuffing, and redirect techniques. Learn more.

Threat Research

🌎 South America

Poseidon

GhostRAT

Abuse of Legitimate Services

Jul 2025

Announcing Hunt 2.4
Jul 15, 2025

Hunt 2.4 adds archive-aware search, deeper SQL visibility, and improved phishing intel to make threat hunting faster, clearer, and more powerful.

Product News

Jul 2025

Eggs, Alerts, and Adversaries: Talking with Jose Hernandez from Splunk
Jul 8, 2025

Splunk’s Jose Hernandez talks building detections, curious hires, Hunt.io in action, and balancing threat research with chickens and family life.

Threat Research

Jul 2025

Threat Hunting at Scale: Explore 10.6B URLs to Find Payloads, C2s, and Exposed Assets with URLx
Jun 26, 2025

Explore 10.6B structured URLs with URLx. Find malware payloads, C2 paths, phishing campaigns, and exposed assets, fast.

Threat Research

Jun 2025

Announcing Hunt 2.3: Improved Threat Hunting Experience & SSO Availability
Jun 25, 2025

Hunt 2.3 is here: analyst-driven insights, easier pivots, better phishing workflows, and full SSO support for enterprise teams.

Product News

Jun 2025

Cobalt Strike PowerShell Loader Found on Chinese and Russian Infrastructure
Jun 19, 2025

Our threat hunters uncovered a PowerShell loader hosted by Chinese and Russian providers, linked to active Cobalt Strike infrastructure.

Threat Research

🌍 Global

Cobalt Strike

Malware Delivery

Jun 2025

Fast and Curious: Red Teaming, Race Cars, and Hunt.io with Justin Elze
Jun 17, 2025

TrustedSec CTO Justin Elze shares red teaming insights, offensive tooling tips, and how he uses Hunt.io and AttackCapture™, plus his passion for race car data.

Threat Research

Jun 2025

Introducing Hunt 2.2: AttackCapture™ Zip Extraction, Smarter SQL, IP History Consolidation, and more
Jun 12, 2025

Explore Hunt 2.2: Auto-unpack zips in AttackCapture™, smarter SQL with WHOIS and Nmap, and full IP history consolidation, track abused hosting with Host Radar, and more.

Product News

Jun 2025

Paste.ee Abuse Uncovered: XWorm & AsyncRAT Infrastructure
Jun 5, 2025

See how attackers abuse paste.ee to deliver XWorm and AsyncRAT, using obfuscated scripts and globally distributed C2 infrastructure.

Threat Research

🌍 Global

AsyncRAT

XWorm

Malware Delivery

Jun 2025

Track Threat Actors Using Real-World IOC Pivoting
May 29, 2025

Track attacker infrastructure with Hunt.io’s real-time IOC pivoting and threat actor intelligence. Learn more.

Threat Research

🌍 Global

IOC Pivoting

May 2025

Introducing Hunt 2.1:  Refinements to the Threat Hunting Experience
May 21, 2025

Discover the new Hunt.io updates: deep text assisted analysis, IOC feed improvements, improved threat actor data, and faster advanced search. Learn more.

Product News

May 2025

Shared SSH Keys Expose Phishing Infrastructure Targeting Kuwait
May 15, 2025

Shared SSH keys expose coordinated phishing targeting Kuwaiti fisheries, telecoms, and insurers with cloned login portals and mobile payment lures. Learn more.

Threat Research

🌍 Middle East

Phishing & Social Engineering

May 2025

Detecting IOX, FRP, Rakshasa, and Stowaway Proxies Using Hunt.io
May 8, 2025

This post explores open-source proxy tools commonly used in attacker and red team infrastructure, and shows how defenders can detect IOX, FRP, Rakshasa, and Stowaway at scale using Hunt.io.

Threat Research

🌏 Asia

FRP/Rakshasa

Command & Control (C2)

May 2025

APT36-Linked ClickFix Campaign Spoofs Indian Ministry of Defence, Targets Windows & Linux Users
May 5, 2025

APT36-style phishing campaign mimics India’s Ministry of Defence to drop malware on Windows and Linux via spoofed press releases and HTA payloads.

Threat Research

🇮🇳 India

Phishing & Social Engineering

APT36

May 2025

APT34-Like Threat Infrastructure Uncovered Before Activation
Apr 22, 2025

APT34-like infrastructure mimicking an Iraqi academic institute and fake UK tech firms reveals early-stage staging on M247 servers. Learn what to track

Threat Research

🌍 Middle East

Karkoff

SideTwist

PowBAT

Command & Control (C2)

APT34

Apr 2025

KeyPlug Server Exposes Fortinet Exploits & Webshell Activity Targeting a Major Japanese Company
Apr 17, 2025

Briefly exposed KeyPlug infrastructure revealed Fortinet exploits, encrypted webshells, and recon scripts targeting Shiseido, a major Japanese enterprise. Learn more..

Threat Research

🌍 Global

KEYPLUG

Tool & Infrastructure Exposure

Chinese APT

Apr 2025

Server-Side Phishing: How Credential  Theft Campaigns Are Hiding in Plain Sight
Apr 15, 2025

Phishing campaign evades detection with server-side logic. See how employee portals are targeted—and how defenders can uncover them. Learn more.

Threat Research

🌍 Global

Pterodo

ShadowPad

Phishing & Social Engineering

Gamaredon

ShadowPad ecosystem

Apr 2025

GoPhish Infrastructure Targets Polish Energy and Government
Apr 10, 2025

Explore how the GoPhish framework was leveraged to stage infrastructure and domains spoofing Polish government and energy entities.

Threat Research

🇵🇱 Poland

Gopish

Phishing & Social Engineering

Apr 2025

Hunt.io Insights: Gamaredon’s Flux-Like Infrastructure and a Look at Recent ShadowPad Activity
Apr 8, 2025

Explore Gamaredon’s flux-like DNS and ShadowPad malware infrastructure, with insights into how these attacker networks are configured, rotated, and maintained.

Threat Research

🇪🇺 Europe

🌏 Asia

ShadowPad

Command & Control (C2)

Apr 2025

Proactive ClickFix Threat Hunting with Hunt.io
Apr 3, 2025

Learn how Hunt.io identifies early-stage ClickFix delivery pages across the web using advanced search capabilities to stay ahead of exploitation attempts.

Threat Research

🌏 Asia

ClickFix

Phishing & Social Engineering

APT36

Apr 2025

Russian-Speaking Threat Actor Abuses Cloudflare & Telegram in Phishing Campaign
Apr 1, 2025

Learn how a Russian-speaking threat actor has evolved from impersonating EFF to now deploying Cloudflare-themed phishing with Telegram-based C2.

Threat Research

🇷🇺 Russian

Abuse of Legitimate Services

Apr 2025

URLx Just Got Bigger: 10.6B URLs for Recon and Malicious Infrastructure Hunting
Mar 27, 2025

Explore exposed infrastructure with URLx: 10.6B+ URLs, HTTPx integration, and advanced filtering - now live in Hunt.io.

Product News

Mar 2025

A Practical Guide to Uncovering Malicious Infrastructure With Hunt.io
Mar 25, 2025

Learn how to track and map adversary infrastructure using Hunt, pivoting from a single IP to uncover hidden connections through infrastructure overlaps and key intelligence indicators.

Threat Research

🌍 Global

Malware Delivery

Mar 2025

Introducing IOC Hunter Feed and Attribution for Enhanced Threat Intelligence
Mar 20, 2025

Track threat actors and malicious infrastructure with Hunt.io’s IOC Hunter Feed and C2 Attribution. Get deeper visibility and context for better threat intelligence.

Product News

Mar 2025

South Korean Organizations Targeted by Cobalt Strike ‘Cat’ Delivered by a Rust Beacon
Mar 18, 2025

Discover how threat actors used a Rust loader to deploy Cobalt Strike ‘Cat’ against South Korean targets. Learn more.

Threat Research

🇰🇷 South Korea

Cobalt Strike

Malware Delivery

DPRK (North Korea)

Mar 2025

JSPSpy and ‘Filebroser’: A Custom File Management Tool in Webshell Infrastructure
Mar 11, 2025

Discover how threat actors deploy a rebranded File Browser alongside JSPSpy for stealth file management on compromised servers.

Threat Research

JSPSpy

FileBrowser

Malware Delivery

Lazarus Group

Mar 2025

Introducing Hunt 2.0: Deeper Threat Analysis & Enhanced Data for Cyber Intelligence
Mar 6, 2025

Our latest release delivers deeper threat analysis with improved threat actor, C2, malware data, and new integrations for robust cyber intelligence.

Product News

Mar 2025

Exposing the Deception: Russian EFF Impersonators Behind Stealc & Pyramid C2
Mar 4, 2025

Discover how an open directory exposed a threat actor impersonating EFF to target gamers and how we mapped their infrastructure to Stealc & Pyramid C2.

Threat Research

🌍 Global

Stealc

Pyramid

Phishing & Social Engineering

Malware Delivery

Russian APT

Mar 2025

Uncovering Joker’s C2 Network: How Hunt’s SSL History Exposed Its Infrastructure
Feb 27, 2025

Discover Joker malware infrastructure with Hunt SSL History, mapping its C2 network through certificate tracking of recent and past activity.

Threat Research

🌍 Global

Joker

Certificate & TLS Abuse

Feb 2025

LightSpy Malware Now Targets Facebook & Instagram Data
Feb 20, 2025

A new LightSpy server expands its attack scope, targeting Facebook and Instagram database files. Explore its evolving capabilities and infrastructure.

Threat Research

🌏 Asia

LightSpy

Data Theft & Exfiltration

Chinese APT

Feb 2025

Backdoored Installers for Signal, Line, and Gmail Target Chinese-Speaking Users
Feb 18, 2025

Read how attackers distribute backdoored Signal, Line, and Gmail installers through fraudulent download pages and how to defend against this campaign.

Threat Research

🇨🇳 China

Backdoor Installer

Malware Delivery

Feb 2025

Advanced Threat Hunting with New SSL Features: Unlocking HuntSQL™ Anomaly Flags for Deeper Detection
Feb 13, 2025

Hunt.io enhances SSL threat hunting with new anomaly flags in HuntSQL™, improving the detection of misconfigurations, expired certificates, and malware infrastructure.

Product News

Feb 2025

Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
Feb 12, 2025

Discover how Pyramid, an open-source tool, enables post-exploitation. Learn detection methods using HTTP headers and recent findings in Hunt.

Threat Research

Pyramid

Reconnaissance & Scanning

Feb 2025

SmokeLoader Malware Targets Ukraine’s Auto & Banking Sectors via Open Directories
Feb 6, 2025

Attackers used open directories to spread SmokeLoader malware, luring Ukraine’s auto and banking sectors. Explore findings, execution, and tactics.

Threat Research

🇺🇦 Ukraine

SmokeLoader

Abuse of Legitimate Services

Feb 2025

GreenSpot APT Targets 163.com Users with Fake Download Pages & Spoofed Domains
Feb 4, 2025

GreenSpot APT targets 163.com users via fake download pages and domain spoofing. Learn their tactics, risks, and how to protect your email accounts.

Threat Research

🌏 Asia

Phishing & Social Engineering

GreenSpot APT

Feb 2025

Unlock SSL Intelligence: How SSL History Boosts Threat Hunting
Jan 30, 2025

Explore how SSL intelligence and SSL history empower proactive threat hunting. Learn tools, real-world examples, and strategies to track cyber threats.

Threat Research

Jan 2025

Unmasking SparkRAT: Detection & macOS Campaign Insights
Jan 28, 2025

Explore SparkRAT detection tactics, macOS targeting, and insights into recent DPRK-linked campaigns with actionable research findings.

Threat Research

🌏 Asia

SparkRAT

Command & Control (C2)

DPRK (North Korea)

Jan 2025

Suspected KEYPLUG Infrastructure: TLS Certificates and GhostWolf Links
Jan 23, 2025

Uncover how Hunt’s TLS records reveal patterns in suspected KEYPLUG infrastructure, linking GhostWolf and RedGolf/APT41 to ongoing activity.

Threat Research

🌏 Asia

KEYPLUG

Certificate & TLS Abuse

APT41

GhostWolf

Jan 2025

VS Code Extension Impersonating Zoom Targets Google Chrome Cookies
Jan 21, 2025

Uncover a deceptive VS Code extension, masquerading as Zoom, that pilfers your Google Chrome cookies. Join us as we expose the techniques behind this alarming supply chain campaign.

Threat Research

🌍 Global

Malicious Extension

Malware Delivery

Jan 2025

‘JustJoin’ Landing Page Linked to Suspected DPRK Activity Resurfaces
Jan 14, 2025

Learn how a landing page mimicking “JustJoin,” tied to suspected DPRK cyber activity, has reappeared with new infrastructure linked through SSH key overlaps.

Threat Research

🇰🇷 South Korea

Credential Reuse

DPRK (North Korea)

Jan 2025

Cyberhaven Extension Compromise: TLS Certificates Reveal Hidden Infrastructure
Jan 9, 2025

Read more about connections through a TLS certificate linking reported and unreported infrastructure tied to the Cyberhaven extension compromise.

Threat Research

🌍 Global

Malicious Extension

Certificate & TLS Abuse

Jan 2025

Golang Beacons and VS Code Tunnels: Tracking a Cobalt Strike Server Leveraging Trusted Infrastructure
Jan 7, 2025

Learn how a Cobalt Strike server with a TLS certificate and prominent watermark showed a Golang-compiled beacon communicating with Visual Studio Code tunnels.

Threat Research

🌍 Global

Cobalt Strike

Command & Control (C2)

Jan 2025

Dec 20, 2024

Discover Hunt.io's 2024 highlights: major product launches, innovations like AttackCapture™, C2 Feed, and Hunt SQL, and a look ahead to 2025.

Product News

Dec 2024

Oyster’s Trail: Resurgence of Infrastructure Linked to Ransomware and Cybercrime Actors
Dec 12, 2024

Our latest analysis uncovers domains linked to the Oyster backdoor, revealing suspected Vanilla Tempest infrastructure and offering insights into server configuration patterns.

Threat Research

🇪🇺 Europe

🌎 North America

Oyster

IOC Pivoting

Vanilla Tempest

Dec 2024

“Million OK!!!!” and the Naver Facade: Tracking Recent Suspected Kimsuky Infrastructure
Dec 10, 2024

Learn how the 'Million OK!!!' HTTP response previously linked to Kimsuky has reappeared on new IPs and domains. This update provides the latest insights into evolving infrastructure, helping defenders stay informed on potential North Korean threat activity.

Threat Research

🇰🇷 South Korea

Beacon Reuse

Kimsuky

Dec 2024

MoqHao Leverages iCloud and VK in Campaign Targeting Apple IDs and Android Device
Dec 5, 2024

Discover how the MoqHao campaign leveraging iCloud and VK employs cross-platform tactics to steal credentials and distribute malicious APKs.

Threat Research

🌏 Asia

MoqHao

Phishing & Social Engineering

Dec 2024

Rare Watermark Links Cobalt Strike 4.10 Team Servers to Ongoing Suspicious Activity
Dec 3, 2024

Uncover the infrastructure and learn how a unique watermark led to the discovery of Cobalt Strike 4.10 team servers impersonating well-known brands.

Threat Research

🌍 Global

Cobalt Strike

Command & Control (C2)

Dec 2024

 Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
Nov 28, 2024

Learn how threat actors leverage open directories to deliver XWorm malware disguised as popular software, providing insight into their tactics.

Threat Research

🌍 Global

XWorm

Malware Delivery

Nov 2024

DarkPeony’s Trail: Certificate Patterns Point to Sustained Campaign Infrastructure
Nov 21, 2024

Explore how DarkPeony's consistent use of certificates reveals ongoing infrastructure activity, indicating consistent operations across different regions.

Threat Research

🌏 Asia

🇪🇺 Europe

DarkPeony

Certificate & TLS Abuse

Nov 2024

XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method
Nov 19, 2024

Discover XenoRAT’s adoption of Excel XLL files and Confuser’s tactical shift from its usual methods, with our insights on adapting to evolving malware techniques.

Threat Research

🌍 Global

XenoRAT

Evasion & Obfuscation

DPRK (North Korea)

Nov 2024

Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator
Nov 12, 2024

Sliver C2 and Ligolo-ng join forces in a campaign likely targeting Y Combinator, revealing tactics and infrastructure aimed at the accelerator's network. Learn more.

Threat Research

🌎 North America

Sliver

Ligolo-ng

Command & Control (C2)

Nov 2024

RunningRAT’s Next Move: From Remote Access to Crypto mining For Profit
Nov 5, 2024

RunningRAT has shifted from access-driven tactics to crypto mining, using open directories to stage payloads and reduce direct C2 traffic.

Threat Research

🌍 Global

RunningRAT

XMRig

Botnet Activity, Cryptomining

Nov 2024

Tricks, Treats, and Threats: Cobalt Strike & the Goblin Lurking in Plain Sight
Oct 31, 2024

Discover an open directory of red team tools fit for Halloween, from Cobalt Strike to BrowserGhost.

Threat Research

Cobalt Strike

BrowserGhost

Tool & Infrastructure Exposure

Oct 2024

Suspected DPRK Phishing Campaign Targets Naver; Separate Apple Domain Spoofing Cluster Identified
Oct 29, 2024

Explore a suspected North Korean-linked phishing campaign targeting Naver and how unknown actors use distinct TLS certificates to spoof Apple domains.

Threat Research

🇰🇷 South Korea

Phishing & Social Engineering

DPRK (North Korea)

Oct 2024

Rekoobe Backdoor Discovered in Open Directory, Possibly Targeting TradingView Users
Oct 24, 2024

Discover how an open directory of Rekoobe malware samples led to different domains resembling trading platforms, posing risks for traders and investors.

Threat Research

🌍 Global

Rekoobe

Malware Delivery

Oct 2024

WarmCookie Infrastructure Update: Uncovering New C2 Servers and Threats
Oct 17, 2024

Get an inside look at Warmcookie’s updated C2 infrastructure linked to its latest update. We reveal insights into newly identified servers that can assist defenders in identifying related servers.

Threat Research

WarmCookie

Command & Control (C2)

Oct 2024

Introducing Code Search on AttackCapture: Uncover Exploit Code, Reverse Shells, C2 Configs, and More
Oct 15, 2024

Read how CodeSearch helps security professionals to identify exploit code, reverse shells, and C2 configs across open directories, enhancing threat detection.

Threat Research

Oct 2024

Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
Oct 10, 2024

Learn how basic tracking techniques using unusual certificates and redirects helped uncover Earth Baxia and a hidden cyber threat, providing practical insights for network defense.

Threat Research

🌏 Asia

PlugX

Tool & Infrastructure Exposure

Earth Baxia

Oct 2024

Inside a Cybercriminal’s Server: DDoS Tools, Spyware APKs, and Phishing Templates
Oct 8, 2024

Explore our in-depth analysis of a cybercriminal’s server, revealing DDoS tools, SpyNote spyware, phishing sites, and ransomware tactics.

Threat Research

🌍 Global

SpyNote

DDoS Scripts

Tool & Infrastructure Exposure

Oct 2024

Announcing Hunt SQL
Oct 3, 2024

We’re excited to release Hunt SQL and to provide the power and flexibility of SQL to researchers, analysts and threat hunters alike. 

Product News

Oct 2024

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection  | Hunt.io
Oct 1, 2024

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection | Hunt.io

Threat Research

Packed Python Script

Evasion & Obfuscation

Oct 2024

Echoes of Stargazer Goblin: Analyzing Shared TTPs from an Open Directory
Sep 24, 2024

Check out our new blog post on exposed files found in an open directory that reveal an attack with overlapping TTPs linked to the Stargazers network.

Threat Research

Initial Access & Exploitation

Sep 2024

Announcing Hunt APIs
Sep 17, 2024

Today Hunt is announcing our IP Enrichment API. You can get detailed data on every IPv4 Address and enrich any existing system.

Product News

Sep 2024

Decoy Docs and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Sep 10, 2024

Compromising a browser can be a goldmine for attackers, offering extensive access to sensitive user data ...

Threat Research

🇰🇷 South Korea

Malicious Extension

Phishing & Social Engineering

Kimsuky

Sep 2024

ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
Sep 3, 2024

The ToneShell backdoor, frequently associated with Mustang Panda (also known as Stately Taurus and Earth Preta...

Threat Research

🌍 Global

ToneShell

Phishing & Social Engineering

Mustang Panda

Sep 2024

Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims
Aug 29, 2024

During a recent analysis of known Latrodectus infrastructure, our research team encountered a command-and-control...

Threat Research

🇰🇷 South Korea

Latrodectus

Fake Installer

Malware Delivery

Aug 2024

Launching AttackVault by Hunt.Io
Aug 23, 2024

We originally launched our "Open Directory" feature in Hunt a year ago.  The premise behind it was to get into the mind of the attacker by get a backstage view into their attacks.  What we learned was that there was a ton of information that could be correlated and indexed.  Today, we're reaffirming our commitment to getting into the tooling of attackers by launching AttackCapture™ by Hunt.io.

Product News

Aug 2024

EvilGophish Unhooked: Insights Into the Infrastructure and Notable Domains
Aug 13, 2024

In late 2023, Hunt Research published a blog post detailing how we uncover emerging and previously unknown Gophish infrastructure.

Threat Research

Gophish

Phishing & Social Engineering

Aug 2024

Pentester or Threat Actor? Open Directory Exposes Test Results and Possible Targeting of Government Organizations
Aug 7, 2024

During routine research of newly identified open directories, the Hunt Research Team made a startling discovery: a...

Threat Research

Tool & Infrastructure Exposure

Aug 2024

macOS Malware Impersonates The Unarchiver App to Steal User Data | Hunt.io
Jul 30, 2024

Discover how macOS malware tricks users into downloading an app disguised as The Unarchiver app. The app contains a binary named “CryptoTrade” designed to steal sensitive user information.

Threat Research

🌍 Global

CryptoTrade

Malware Delivery

Jul 2024

A Simple Approach to Discovering Oyster Backdoor Infrastructure | Hunt.io
Jul 23, 2024

Oyster backdoor, also known as Broomstick (IBM) and CleanUpLoader (RussianPanda – X), has been linked to...

Threat Research

Oyster

IOC Pivoting

Jul 2024

SEO Poisoning Campaigns Target Browser Installers and Crypto Sites, Spreading Poseidon, GhostRAT & More
Jul 16, 2024

The Hunt Research Team recently stumbled upon Search Engine Optimization (SEO) poisoning campaigns posing as ...

Threat Research

🌍 Global

Poseidon

Gh0st RAT

Malware Delivery

Jul 2024

The Secret Ingredient: Unearthing Suspected SpiceRAT Infrastructure via HTML Response
Jul 11, 2024

Reports on new malware families often leave subtle clues that lead researchers to uncover additional infrastructure not...

Threat Research

🇪🇺 Europe

🌏 Asia

SpiceRAT

Malware Delivery

Jul 2024

ProxyLogon and ProxyShell Used to Target Government Mail Servers in Asia, Europe, and South America
Jul 2, 2024

Nearly three years after ProxyLogon and ProxyShell wreaked widespread havoc on Microsoft Exchange servers, the Hunt

Threat Research

🌏 Asia

🇪🇺 Europe

🌎 South America

Initial Access & Exploitation

Jul 2024

Geacon and Geacon_Pro: A Constant Menace to Linux and Windows Systems
Jun 27, 2024

The red-teaming tool Cobalt Strike has long been a staple for simulating attacks, predominantly targeting Windows ...

Threat Research

🌍 Global

Geacon

Command & Control (C2)

Chinese APT

Jun 2024

Good Game, Gone Bad: Xeno RAT Spread Via .gg Domains and GitHub
Jun 25, 2024

XenoRAT, an open-source malware available on GitHub, has been linked to a North Korean hacking group and unnamed...

Threat Research

🌍 Global

XenoRAT

Abuse of Legitimate Services

DPRK (North Korea)

Jun 2024

Caught in the Act: Uncovering SpyNote in Unexpected Places
Jun 20, 2024

In hidden corners of the Internet, open directories often serve as treasure troves, offering a glimpse into the unguarded...

Threat Research

SpyNote

Malware Delivery

Jun 2024

Open Directories Expose Publicly Available Tools Targeting Asian Organizations
Jun 18, 2024

The Hunt Research Team recently identified an exposed web server used to target the Taiwanese Freeway Bureau and a...

Threat Research

🌏 Asia

Tool & Infrastructure Exposure

Chinese APT

Jun 2024

Gh0st and Pantegana: Two RATs that Refuse to Fade Away
Jun 12, 2024

Gh0st and Pantegana remote access tools/trojans (RATs) may seem unlikely to be discussed, but both have made notable...

Threat Research

🌍 Global

Gh0st RAT

Pantegana RAT

Malware Delivery

DriftingCloud

Jun 2024

Jun 6, 2024

In this post, we'll detail the infrastructure of the LightSpy spyware framework and highlight the unique TLS certificate...

Threat Research

🌏 Asia

LightSpy

Certificate & TLS Abuse

Jun 2024

Legacy Threat: PlugX Builder/Controller Discovered in Open Directory
Jun 5, 2024

The threat actor(s) built and controlled at least one of the binaries on the same server, granting us access to numerous..

Threat Research

PlugX

Tool & Infrastructure Exposure

Chinese APT

Jun 2024

SolarMarker: Hunt Insights and Findings
May 30, 2024

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.

Threat Research

🌎 North America

🇪🇺 Europe

SolarMarker

Malware Delivery

Multi-Stage Infection

May 2024

Tales from the Hunt: A Look at Yakit Security Tool
May 28, 2024

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.

Threat Research

Yakit

May 2024

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.

Threat Research

May 2024

Into the Viper’s Nest: Observations from Hunt’s Scanning
May 8, 2024

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...

Threat Research

May 2024

Spotting SparkRAT: Detection Tactics & Sandbox Findings
Apr 23, 2024

The Hunt Research Team vigilantly monitors GitHub, sifts through the IOC sections of threat intelligence reports, and scours various online forums for emerging threats, ensuring our detections stay practical and current for our customers. Our focus frequently turns to lesser-known threats that can still wreak havoc on the networks of uninformed defenders.

Threat Research

SparkRAT

Lateral Movement & Persistence

Apr 2024

In Plain Sight: Uncovering SuperShell & Cobalt Strike from an Open Directory
Apr 16, 2024

Hunt scans every corner of the public IPV4 space and constantly scours the Internet for open directories. Through...

Threat Research

SuperShell

Cobalt Strike

Tool & Infrastructure Exposure

Apr 2024

BlueShell: Four Years On, Still A Formidable Threat
Apr 9, 2024

Platforms like GitHub offer a valuable resource for developers and the open-source community. However, these sites also create a potential...

Threat Research

BlueShell

Malware Delivery

Apr 2024

A Hunt How-To: Detecting RedGuard C2 Redirector
Apr 2, 2024

If you’re like me, you’ve likely read multiple reports on network intrusions involving a “standard” deployment...

Threat Research

RedGuard

Command & Control (C2)

Apr 2024

Coin Miner and Mozi Botnet
Mar 28, 2024

Open directories can sometimes contain unexpected dangers in the hidden parts of the internet. Our recent investigation...

Threat Research

Mozi

XMRig

Botnet Activity, Cryptomining

May 2024

A Treasure Trove of Trouble: Open Directory Exposes Red Team Tools
Mar 21, 2024

While open directories are often seen as a goldmine for security researchers and blue teams searching for malware...

Threat Research

Mimikatz

Tool & Infrastructure Exposure

May 2024

One More Trip to The W3LL: Phishing Kit Targets Outlook Credentials
Mar 19, 2024

The W3LL Phishing Kit, a phishing-as-a-service (PAaS) tool, was identified by Group-IB in 2022. What makes the kit...

Threat Research

🌍 Global

W3LL

Phishing & Social Engineering

May 2024

Hunting PrismX: Techniques for Network Discovery
Mar 12, 2024

Described on its GitHub README as an "Integrated lightweight cross-platform penetration system," PrismX goe...

Threat Research

PrismX

Reconnaissance & Scanning

May 2024

Open Directory Exposes Phishing Campaign Targeting Google & Naver Credentials
Mar 5, 2024

Over the past month, Hunt has tracked an ongoing phishing campaign by a likely North Korean threat actor focused on...

Threat Research

🇰🇷 South Korea

🌍 Global

Phishing & Social Engineering

DPRK (North Korea)

May 2024

Feb 28, 2024

Hunt is tracking an ongoing sophisticated phishing campaign targeting individuals in the Telegram groups focused on...

Threat Research

🌍 Global

Pyramid

NK Dropper

Phishing & Social Engineering

DPRK (North Korea)

Feb 2024

Unveiling the Power of Tag Cloud: Navigating the Digital Landscape with Precision
Feb 14, 2024

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...

Threat Research

Feb 2024

Tracking ShadowPad Infrastructure Via Non-Standard Certificates
Feb 9, 2024

This post will examine ShadowPad infrastructure linked to a yet-to-be-identified threat actor. What makes this activity...

Threat Research

🌏 Asia

ShadowPad

Certificate & TLS Abuse

Feb 2024

Feb 6, 2024

Where national interests, strategic ambitions, and sometimes personal gain intertwine, state-linked cyber threat actors...

Threat Research

Feb 2024

The Accidental Malware Repository: Hunting & Collecting Malware Via Open Directories (Part 1)
Feb 1, 2024

This post will serve as the first in a long series of articles on using the platform to identify malicious infrastructure and hunt...

Threat Research

Feb 2024

Introducing Hunt Advanced Search
Jan 30, 2024

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...

Threat Research

Jan 2024

How We Identify Malicious Infrastructure At Hunt.io
Jan 24, 2024

ShadowPad, Quasar RAT, HeadLace, Emotet, and SIGNBT (to name a few) often grab headlines and captivate readers...

Threat Research

Jan 2024

Introducing the Hunt.io C2 Feed
Jan 15, 2024

It’s been a while since we announced a new feature, and with 2024 already in full swing, it is time to highlight what’s...

Product News

Jan 2024

Announcing IOC-Hunter
Nov 14, 2023

As the end of the year approaches, we continue to enhance our feature set by building on well-established threat-...

Product News

Nov 2023

Gateway to Intrusion: Malware Delivery Via Open Directories
Oct 31, 2023

Attackers constantly devise new and sophisticated methods of delivering malware to infiltrate systems and exfiltrate...

Threat Research

Malware Delivery

Oct 2023

How Hunt.io Identifies Services on Non-Standard Ports
Oct 25, 2023

The term “threat hunting” is generally associated with detecting malicious behavior on endpoints manually...

Threat Research

Oct 2023

Phish No More: A Hunt.io Guide to Gophish Detection
Oct 12, 2023

Phishing is more than a social engineering technique; it's a harrowing threat landscape where deception, innovation, and vigilance collide.

Threat Research

Oct 2023

Sep 28, 2023

In the ever-evolving world of cybersecurity, few individuals embody the spirit of innovation and exploration as profoundly as John Althouse.

Threat Research

Sep 2023

Hunt Platform Statistics Launch
Sep 19, 2023

Learn about the Hunt.io massive observation collection platform.

Threat Research

Sep 2023

Discovering & Disrupting Malicious Infrastructure
Sep 12, 2023

Michael showcases how the Hunt platform can be leveraged to proactively identify infrastructure not yet publicly reported on from recent malware campaigns.

Threat Research

Aug 17, 2023

How Open Directories Help with Threat Hunting and Incident Response.

Threat Research

Let's go Hunting
Aug 1, 2023

We are excited to unveil Hunt.io, a cutting-edge threat hunting solution that is set to transform the landscape of cybersecurity.

Threat Research

Ready to See Hunt.io in Action?

Ready to See Hunt.io in Action?

Ready to See Hunt.io in Action?

Explore how our platform helps you find real threats, not noise.

Explore how our platform helps you find real threats, not noise.

Explore how our platform helps you find real threats, not noise.