Identifying ClickFix Exploits: A Case Study in Proactive Threat Hunting

Published on

Published on

Published on

Apr 3, 2025

Apr 3, 2025

Apr 3, 2025

Proactive ClickFix Threat Hunting with Hunt.io
Proactive ClickFix Threat Hunting with Hunt.io
Proactive ClickFix Threat Hunting with Hunt.io

Identifying ClickFix Exploits: A Case Study in Proactive Threat Hunting

ClickFix is a browser-based delivery technique that uses deceptive prompts and clipboard hijacking to trick users into executing malicious commands. Often disguised as system alerts or CAPTCHA challenges, these web pages lure users into clicking a button-at which point a payload is silently staged for execution.

Both cybercriminals and advanced actors have adopted this technique to deploy a range of malware, most commonly information stealers delivered via mshta.exe, PowerShell, or embedded JavaScript.

Our research team used HuntSQL™ to proactively identify web infrastructure exhibiting traits associated with ClickFix delivery. Drawing from behavioral patterns observed in earlier reporting, we developed a custom query to track similar activity at scale across Hunt.io's dataset-ultimately uncovering multiple live domains serving malicious content yet to be publicly reported.

In the following sections, we break down the ClickFix technique, highlight real-world examples that surfaced as a result of our query, and examine how attackers are actively employing this method across the web.

Understanding the ClickFix Flow

In mid-2024, ClickFix emerged as a deceptive execution method that abused familiar UI elements to trick users into running malware under the guise of legitimate system prompts.

These lures often appear as 'Fix Now' and 'Bot Verification' messages, typically triggered by a click or JavaScript page load event.

Below is a breakdown of how the infection occurs:

  • Step 1: The user is instructed to press Windows + R, which opens the native Run dialog on Windows.

  • Step 2: Next, the site tells the user to press Ctrl + V, pasting a preloaded command silently copied to the clipboard via JavaScript.

  • Step 3: Pressing Enter executes the payload. Depending on the variant, it often launches mshta.exe to retrieve and run a remote script or invokes PowerShell directly.

The entire interaction with the user is framed as a necessary system action, something we all encounter daily while surfing the internet.

Clickfix flow

Building Search Queries in Hunt.io

Hunt's approach to identifying ClickFix delivery domains centered on translating observable behaviors into structured, repeatable queries. Drawing on public reporting from Sekoia, Microsoft, and Proofpoint, we reviewed known webpages hosting the exploit and extracted a small set of recurring strings found in HTML and JavaScript used to stage payloads:

  • 'Robot or Human'

  • 'mshta'

  • 'I am not a robot'

The three examples above represent a small, targeted set used for this blog. Defenders looking to start hunting immediately can expand on this approach by incorporating additional patterns such as 'Try Fix', 'reCAPTCHA Verification Id:', and 'powershell -enc'.

Users can adapt and experiment with different queries in HuntSQL™ to search across IPs, URLs, and hostnames through the SQL API or within the Crawler tab.

For this post, we've limited our results to scans with a timestamp of March 26th or later, capturing the most recent domains matching ClickFix activity.

Below is the query we came up with:

SELECT timestamp, ip, url, body
FROM crawler
WHERE timestamp.day gt '2025-03-26'
AND 

(

body LIKE '%Robot 

OR Human%' 

OR body LIKE '%mshta%' 

OR body LIKE '%I am not a robot'

)
GROUP BY
timestamp,
ip,
url,
body

Running the query across Hunt's Crawler dataset returned 10 results that matched the string patterns we identified earlier.

Figure 1: Screenshot of the SQL query results in Hunt for ClickFix-related domains

Figure 1: Screenshot of the SQL query results in Hunt for ClickFix-related domains.

Looking at the domains in Figure 1, we see references to Microsoft 365, 'coins' (likely a reference to digital currencies), and another seeming to abuse Scaleway's Object storage service at s3.pl-waw[.]scw[.]cloud.

In the next section, we'll take a closer look at several of these web pages and the techniques used to deceive users and infect their systems.

Observed ClickFix Pages

Bitcoin-Themed Domain Poses as Cloudflare WAF to Deliver Lumma, CryptBot

The first site uncovered in our query, soubtcevent[.]com, presents a typical CAPTCHA-style verification page prompting users to prove they are not a robot. After clicking the button, a secondary prompt appears, mimicking a Cloudflare Web Application Firewall (WAF) check-asking the user to manually enter the word 'Cloudflare' into a system dialog box.

Figure 2: Verification prompt seen at soubtcevent[.]com

Figure 2: Verification prompt seen at soubtcevent[.]com.

Once the string is entered, a Base64-encoded PowerShell script is run. Decoding the string reveals a second script hosted at tlgrm-redirect[.]icu/1.txt.

Figure 3: Secondary PowerShell script hosted at tlgrm-redirect[.]icu

Figure 3: Secondary PowerShell script hosted at tlgrm-redirect[.]icu.

The second-stage code downloads three ZIP archives (1.zip, 2.zip, 3.zip) from mikropedik[.].in, and logs the success or failure of each attempt to tlgrmverif[.]cyou/log.php. When extracted:

  • 1.zip and 2.zip each contain Windows Portable Executables: verify1.exe and verify2.exe.

  • 3.zip includes verify3.exe alongside several DLLs.

At the time of analysis, verify1.exe was flagged as malicious by 39 of 73 vendors on VirusTotal. User comments suggest an association with the Lumma Stealer malware, and network activity includes callbacks to targett[.]top, a Telegram bot API endpoint, and meltmetu[.]live.

The malware also communicated with a Steam community profile page, likely to obtain URL paths for further infection of the target.

Figure 4: Steam community profile contacted by verify1.exe

Figure 4: Steam community profile contacted by verify1.exe.

verify2.exe follows a similar network pattern, initiating communication with 94.181.203[.]38:4057/15bff393f6b17fef247/wwqkigwk.87r61. The endpoint closely mirrors the aforementioned Steam user profiles in Figure 4. Where these files differ is that this executable was linked to CryptBot malware.

As of the time of writing, verify3.exe returned a score of 0 and had no comments indicating it was connected to a malware family.

On Mar 18, 2025, soubtcevent[.]com was promoted on X by a Japanese-language account associated with a cryptocurrency project named SOU BTC.

Figure 5: Mentions on X of the domain delivering the ClickFix technique

Figure 5: Mentions on X of the domain delivering the ClickFix technique.

Translating the text on the 18th from Japanese to English reads:

"Are you confident the market will bounce back quickly?

If you don't want to miss out on my top 100x chances, consider joining my private group.

Open for 1 hour. Best of luck."

It remains unclear whether the domain was compromised or if the individual promoting it is part of a cryptocurrency scam infecting users with information stealer malware. Regardless, users and defenders should be observant of prompts pretending to be associated with web application firewall software.

ClickFix Page Targets Zoho Office Suite Credentials

Unlike other attacks involving malware delivery, this example focuses on credential theft. The domain, timestesol[.]com, has the title 'Webmail Sign-in' and prompts for verification using the phrase 'I am not a robot,' which, if you remember, was one of our HuntSQL™ query keywords.

Figure 6: Robot verification prompt at timestesol[.]com/wl/editor/uploaded/mid/cgi/newnew.html

Figure 6: Robot verification prompt at timestesol[.]com/wl/editor/uploaded/mid/cgi/newnew.html.

After interacting with the verification button, users are redirected to a login prompt branded with the Zoho header and a message indicating their session has expired, urging them to re-enter their username/password to continue.

Figure 7: Screenshot of the Zoho login present after passing verification

Figure 7: Screenshot of the Zoho login present after passing verification.

Reviewing the webpage's source code reveals a hardcoded Telegram bot token, suggesting that once the users' email and password are entered, they are sent directly to an actor-controlled endpoint.

Figure 8: A Snippet of webpage source displaying the Telegram bot information

Figure 8: A Snippet of webpage source displaying the Telegram bot information.

Rather than relying on malware execution, this variant leverages ClickFix tactics to guide users into submitting credentials-an arguably more discreet approach. As awareness of clipboard-based delivery increases, phishing adaptations like this may offer a lower-friction path for threat actors targeting enterprise platforms.

Compromised Website Abused to Deliver PowerShell

Our final example involves using compromised infrastructure to deliver a fileless PowerShell payload.

Clicking the verification prompt at https[:]//riverview-pools[.]com/verify/index.html copies a PowerShell command to the user's clipboard.

Figure 7: Webpage source showing a PowerShell script being copied to the clipboard

Figure 7: Webpage source showing a PowerShell script being copied to the clipboard.

Visiting the script at http[:]//aatox[.]com/verify/45.ps1 reveals a Base64-encoded command that, once decoded, attempts to retrieve a second script (44.ps1) from a London-based website, which was likely compromised. As of this writing, the URL was inactive, suggesting the intrusion may have been remediated.

Together, these examples show how the ClickFix technique can be adapted for malware delivery, credential theft, and covert payload staging-often without relying on dedicated attacker infrastructure.

Final thoughts

ClickFix continues to gain traction as a low-friction method for delivering malware and harvesting credentials through deceptive browser-based prompts. By staging payloads in the clipboard and leaning on user interaction, it bypasses traditional download workflows and challenges conventional detection strategies.

In this post, we outlined how ClickFix is being used across a range of web-based delivery mechanisms-from clipboard-injected malware to credential harvesting and fileless payload staging. By focusing on the behavioral patterns of these pages, we were able to surface active infrastructure that may otherwise evade traditional detection pipelines.

Defender Recommendations

To reduce exposure to ClickFix-style delivery mechanisms, defenders should consider the following:

  • Monitor for clipboard-based execution involving PowerShell, mshta.exe, or Base64-encoded commands-especially when preceded by suspicious browser activity.

  • Alert on or block access to domains hosting verification-style lures that mimic CAPTCHA challenges or security checks.

  • Ensure endpoint detection tools are deployed and configured to log PowerShell activity, script-based execution, and unusual clipboard use.

  • Encourage users to enroll in multi-factor authentication (MFA) to mitigate the impact of potential credential harvesting campaigns.

ClickFix Network Observables and Indicators of Compromise (IOCs)

DomainIP AddressASNCountry
soubtcevent[.]com94.181.229[.]250JSC ER-Telecom HoldingRU
informepartne[.]com104.21.60[.]15CloudflareUS
securedmicrosoft365[.]com20.217.17[.]201MicrosoftIL
movmlyvvip88[.]xyz172.67.135[.]234CloudflareUS
staticpage-dispatch.s3.pl-waw.scw[.]cloud/device-sync.html151.115.10[.]3Scaleway S.a.s.PL
informationhuman[.]com104.21.48[.]1CloudflareUS
coinspaceteam[.]com94.181.229[.]250JSC ER-Telecom HoldingRU
informboomk[.]com104.21.16[.]1CloudflareUS
tlgrmverif[.]cyou94.181.229[.]250JSC ER-Telecom HoldingRU
micropedik[.]in94.181.229[.]250JSC ER-Telecom HoldingRU
targett[.]top104.16.198[.]133CloudflareUS

ClickFix Host Observables and Indicators of Compromise (IOCs)

FilenameSHA-256
1.zip1d4f24b5df63fb65947d1d1378b9686986a78bd4dc714511358bf0fea841bc51
verify1.exedad4ecd247efa876faac2e3f67130951b044043ca21c5db6281ba2b8fce7a089
2.zip638a472c16202c2b564a08b779b6640bcc933ba170d469370f83645130fa76b5
verify2.exe69c513f0ddf4416e0d47f778594fd76b96424359c7e9c2e5585ad0abaaf5dbc0
3.zip85fc09ce98fb126d4d47d4b75a96fb7e7ca6184bfcb9971cfae8d893f2912cf1
verify3.exee11d68ee9294a55de8548687935567d030dae3a594d40ea75f88598f30ebb76e
focus-beats-vol1.mp34f568e8305ea8a024c22b0b77547384950198156fb4217c0278e09bed17a144c`
1.txt909ed8a1351f9a21ebdd5d8efb4147145f12d5d24225dbd44cd2800a1f94a596

ClickFix is a browser-based delivery technique that uses deceptive prompts and clipboard hijacking to trick users into executing malicious commands. Often disguised as system alerts or CAPTCHA challenges, these web pages lure users into clicking a button-at which point a payload is silently staged for execution.

Both cybercriminals and advanced actors have adopted this technique to deploy a range of malware, most commonly information stealers delivered via mshta.exe, PowerShell, or embedded JavaScript.

Our research team used HuntSQL™ to proactively identify web infrastructure exhibiting traits associated with ClickFix delivery. Drawing from behavioral patterns observed in earlier reporting, we developed a custom query to track similar activity at scale across Hunt.io's dataset-ultimately uncovering multiple live domains serving malicious content yet to be publicly reported.

In the following sections, we break down the ClickFix technique, highlight real-world examples that surfaced as a result of our query, and examine how attackers are actively employing this method across the web.

Understanding the ClickFix Flow

In mid-2024, ClickFix emerged as a deceptive execution method that abused familiar UI elements to trick users into running malware under the guise of legitimate system prompts.

These lures often appear as 'Fix Now' and 'Bot Verification' messages, typically triggered by a click or JavaScript page load event.

Below is a breakdown of how the infection occurs:

  • Step 1: The user is instructed to press Windows + R, which opens the native Run dialog on Windows.

  • Step 2: Next, the site tells the user to press Ctrl + V, pasting a preloaded command silently copied to the clipboard via JavaScript.

  • Step 3: Pressing Enter executes the payload. Depending on the variant, it often launches mshta.exe to retrieve and run a remote script or invokes PowerShell directly.

The entire interaction with the user is framed as a necessary system action, something we all encounter daily while surfing the internet.

Clickfix flow

Building Search Queries in Hunt.io

Hunt's approach to identifying ClickFix delivery domains centered on translating observable behaviors into structured, repeatable queries. Drawing on public reporting from Sekoia, Microsoft, and Proofpoint, we reviewed known webpages hosting the exploit and extracted a small set of recurring strings found in HTML and JavaScript used to stage payloads:

  • 'Robot or Human'

  • 'mshta'

  • 'I am not a robot'

The three examples above represent a small, targeted set used for this blog. Defenders looking to start hunting immediately can expand on this approach by incorporating additional patterns such as 'Try Fix', 'reCAPTCHA Verification Id:', and 'powershell -enc'.

Users can adapt and experiment with different queries in HuntSQL™ to search across IPs, URLs, and hostnames through the SQL API or within the Crawler tab.

For this post, we've limited our results to scans with a timestamp of March 26th or later, capturing the most recent domains matching ClickFix activity.

Below is the query we came up with:

SELECT timestamp, ip, url, body
FROM crawler
WHERE timestamp.day gt '2025-03-26'
AND 

(

body LIKE '%Robot 

OR Human%' 

OR body LIKE '%mshta%' 

OR body LIKE '%I am not a robot'

)
GROUP BY
timestamp,
ip,
url,
body

Running the query across Hunt's Crawler dataset returned 10 results that matched the string patterns we identified earlier.

Figure 1: Screenshot of the SQL query results in Hunt for ClickFix-related domains

Figure 1: Screenshot of the SQL query results in Hunt for ClickFix-related domains.

Looking at the domains in Figure 1, we see references to Microsoft 365, 'coins' (likely a reference to digital currencies), and another seeming to abuse Scaleway's Object storage service at s3.pl-waw[.]scw[.]cloud.

In the next section, we'll take a closer look at several of these web pages and the techniques used to deceive users and infect their systems.

Observed ClickFix Pages

Bitcoin-Themed Domain Poses as Cloudflare WAF to Deliver Lumma, CryptBot

The first site uncovered in our query, soubtcevent[.]com, presents a typical CAPTCHA-style verification page prompting users to prove they are not a robot. After clicking the button, a secondary prompt appears, mimicking a Cloudflare Web Application Firewall (WAF) check-asking the user to manually enter the word 'Cloudflare' into a system dialog box.

Figure 2: Verification prompt seen at soubtcevent[.]com

Figure 2: Verification prompt seen at soubtcevent[.]com.

Once the string is entered, a Base64-encoded PowerShell script is run. Decoding the string reveals a second script hosted at tlgrm-redirect[.]icu/1.txt.

Figure 3: Secondary PowerShell script hosted at tlgrm-redirect[.]icu

Figure 3: Secondary PowerShell script hosted at tlgrm-redirect[.]icu.

The second-stage code downloads three ZIP archives (1.zip, 2.zip, 3.zip) from mikropedik[.].in, and logs the success or failure of each attempt to tlgrmverif[.]cyou/log.php. When extracted:

  • 1.zip and 2.zip each contain Windows Portable Executables: verify1.exe and verify2.exe.

  • 3.zip includes verify3.exe alongside several DLLs.

At the time of analysis, verify1.exe was flagged as malicious by 39 of 73 vendors on VirusTotal. User comments suggest an association with the Lumma Stealer malware, and network activity includes callbacks to targett[.]top, a Telegram bot API endpoint, and meltmetu[.]live.

The malware also communicated with a Steam community profile page, likely to obtain URL paths for further infection of the target.

Figure 4: Steam community profile contacted by verify1.exe

Figure 4: Steam community profile contacted by verify1.exe.

verify2.exe follows a similar network pattern, initiating communication with 94.181.203[.]38:4057/15bff393f6b17fef247/wwqkigwk.87r61. The endpoint closely mirrors the aforementioned Steam user profiles in Figure 4. Where these files differ is that this executable was linked to CryptBot malware.

As of the time of writing, verify3.exe returned a score of 0 and had no comments indicating it was connected to a malware family.

On Mar 18, 2025, soubtcevent[.]com was promoted on X by a Japanese-language account associated with a cryptocurrency project named SOU BTC.

Figure 5: Mentions on X of the domain delivering the ClickFix technique

Figure 5: Mentions on X of the domain delivering the ClickFix technique.

Translating the text on the 18th from Japanese to English reads:

"Are you confident the market will bounce back quickly?

If you don't want to miss out on my top 100x chances, consider joining my private group.

Open for 1 hour. Best of luck."

It remains unclear whether the domain was compromised or if the individual promoting it is part of a cryptocurrency scam infecting users with information stealer malware. Regardless, users and defenders should be observant of prompts pretending to be associated with web application firewall software.

ClickFix Page Targets Zoho Office Suite Credentials

Unlike other attacks involving malware delivery, this example focuses on credential theft. The domain, timestesol[.]com, has the title 'Webmail Sign-in' and prompts for verification using the phrase 'I am not a robot,' which, if you remember, was one of our HuntSQL™ query keywords.

Figure 6: Robot verification prompt at timestesol[.]com/wl/editor/uploaded/mid/cgi/newnew.html

Figure 6: Robot verification prompt at timestesol[.]com/wl/editor/uploaded/mid/cgi/newnew.html.

After interacting with the verification button, users are redirected to a login prompt branded with the Zoho header and a message indicating their session has expired, urging them to re-enter their username/password to continue.

Figure 7: Screenshot of the Zoho login present after passing verification

Figure 7: Screenshot of the Zoho login present after passing verification.

Reviewing the webpage's source code reveals a hardcoded Telegram bot token, suggesting that once the users' email and password are entered, they are sent directly to an actor-controlled endpoint.

Figure 8: A Snippet of webpage source displaying the Telegram bot information

Figure 8: A Snippet of webpage source displaying the Telegram bot information.

Rather than relying on malware execution, this variant leverages ClickFix tactics to guide users into submitting credentials-an arguably more discreet approach. As awareness of clipboard-based delivery increases, phishing adaptations like this may offer a lower-friction path for threat actors targeting enterprise platforms.

Compromised Website Abused to Deliver PowerShell

Our final example involves using compromised infrastructure to deliver a fileless PowerShell payload.

Clicking the verification prompt at https[:]//riverview-pools[.]com/verify/index.html copies a PowerShell command to the user's clipboard.

Figure 7: Webpage source showing a PowerShell script being copied to the clipboard

Figure 7: Webpage source showing a PowerShell script being copied to the clipboard.

Visiting the script at http[:]//aatox[.]com/verify/45.ps1 reveals a Base64-encoded command that, once decoded, attempts to retrieve a second script (44.ps1) from a London-based website, which was likely compromised. As of this writing, the URL was inactive, suggesting the intrusion may have been remediated.

Together, these examples show how the ClickFix technique can be adapted for malware delivery, credential theft, and covert payload staging-often without relying on dedicated attacker infrastructure.

Final thoughts

ClickFix continues to gain traction as a low-friction method for delivering malware and harvesting credentials through deceptive browser-based prompts. By staging payloads in the clipboard and leaning on user interaction, it bypasses traditional download workflows and challenges conventional detection strategies.

In this post, we outlined how ClickFix is being used across a range of web-based delivery mechanisms-from clipboard-injected malware to credential harvesting and fileless payload staging. By focusing on the behavioral patterns of these pages, we were able to surface active infrastructure that may otherwise evade traditional detection pipelines.

Defender Recommendations

To reduce exposure to ClickFix-style delivery mechanisms, defenders should consider the following:

  • Monitor for clipboard-based execution involving PowerShell, mshta.exe, or Base64-encoded commands-especially when preceded by suspicious browser activity.

  • Alert on or block access to domains hosting verification-style lures that mimic CAPTCHA challenges or security checks.

  • Ensure endpoint detection tools are deployed and configured to log PowerShell activity, script-based execution, and unusual clipboard use.

  • Encourage users to enroll in multi-factor authentication (MFA) to mitigate the impact of potential credential harvesting campaigns.

ClickFix Network Observables and Indicators of Compromise (IOCs)

DomainIP AddressASNCountry
soubtcevent[.]com94.181.229[.]250JSC ER-Telecom HoldingRU
informepartne[.]com104.21.60[.]15CloudflareUS
securedmicrosoft365[.]com20.217.17[.]201MicrosoftIL
movmlyvvip88[.]xyz172.67.135[.]234CloudflareUS
staticpage-dispatch.s3.pl-waw.scw[.]cloud/device-sync.html151.115.10[.]3Scaleway S.a.s.PL
informationhuman[.]com104.21.48[.]1CloudflareUS
coinspaceteam[.]com94.181.229[.]250JSC ER-Telecom HoldingRU
informboomk[.]com104.21.16[.]1CloudflareUS
tlgrmverif[.]cyou94.181.229[.]250JSC ER-Telecom HoldingRU
micropedik[.]in94.181.229[.]250JSC ER-Telecom HoldingRU
targett[.]top104.16.198[.]133CloudflareUS

ClickFix Host Observables and Indicators of Compromise (IOCs)

FilenameSHA-256
1.zip1d4f24b5df63fb65947d1d1378b9686986a78bd4dc714511358bf0fea841bc51
verify1.exedad4ecd247efa876faac2e3f67130951b044043ca21c5db6281ba2b8fce7a089
2.zip638a472c16202c2b564a08b779b6640bcc933ba170d469370f83645130fa76b5
verify2.exe69c513f0ddf4416e0d47f778594fd76b96424359c7e9c2e5585ad0abaaf5dbc0
3.zip85fc09ce98fb126d4d47d4b75a96fb7e7ca6184bfcb9971cfae8d893f2912cf1
verify3.exee11d68ee9294a55de8548687935567d030dae3a594d40ea75f88598f30ebb76e
focus-beats-vol1.mp34f568e8305ea8a024c22b0b77547384950198156fb4217c0278e09bed17a144c`
1.txt909ed8a1351f9a21ebdd5d8efb4147145f12d5d24225dbd44cd2800a1f94a596

Related Posts:

A Practical Guide to Uncovering Malicious Infrastructure With Hunt.io
Mar 25, 2025

Learn how to track and map adversary infrastructure using Hunt, pivoting from a single IP to uncover hidden connections through infrastructure overlaps and key intelligence indicators.

A Practical Guide to Uncovering Malicious Infrastructure With Hunt.io
Mar 25, 2025

Learn how to track and map adversary infrastructure using Hunt, pivoting from a single IP to uncover hidden connections through infrastructure overlaps and key intelligence indicators.

Decoy Docs and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Sep 10, 2024

Compromising a browser can be a goldmine for attackers, offering extensive access to sensitive user data ...

Decoy Docs and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Sep 10, 2024

Compromising a browser can be a goldmine for attackers, offering extensive access to sensitive user data ...

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.

A Practical Guide to Uncovering Malicious Infrastructure With Hunt.io
Mar 25, 2025

Learn how to track and map adversary infrastructure using Hunt, pivoting from a single IP to uncover hidden connections through infrastructure overlaps and key intelligence indicators.

Decoy Docs and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Sep 10, 2024

Compromising a browser can be a goldmine for attackers, offering extensive access to sensitive user data ...

Unearthing New Infrastructure by Revisiting Past Threat Reports
May 21, 2024

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.