Tracking ShadowPad Infrastructure Via Non-Standard Certificates Read Now
Tracking ShadowPad Infrastructure Via Non-Standard Certificates

Hunt Blog

Check out our latest threat hunting articles, tips and stories

https://hunt.io/images/blogs/shadowpad_sm.png

February 09, 2024

Tracking ShadowPad Infrastructure Via Non-Standard Certificates

This post will examine ShadowPad infrastructure linked to a yet-to-be-identified threat actor. What makes this activity...

https://hunt.io/images/blogs/acc_malware_sm.png

February 01, 2024

The Accidental Malware Repository: Hunting & Collecting Malware Via Open Directories (Part 1)

This post will serve as the first in a long series of articles on using the platform to identify malicious infrastructure and hunt...

https://hunt.io/images/blogs/int_advanced_search_sm.png

January 30, 2024

Introducing Hunt Advanced Search

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...

https://hunt.io/images/blogs/malicious-infr-sm.png

January 24, 2024

How We Identify Malicious Infrastructure At Hunt.io

ShadowPad, Quasar RAT, HeadLace, Emotet, and SIGNBT (to name a few) often grab headlines and captivate readers...

https://hunt.io/images/blogs/c2-feed-sm-new.png

January 15, 2024

Introducing the Hunt.io C2 Feed

It’s been a while since we announced a new feature, and with 2024 already in full swing, it is time to highlight what’s...

https://hunt.io/images/blogs/blog-9-main-sm.png

November 14, 2023

Announcing IOC-Hunter

As the end of the year approaches, we continue to enhance our feature set by building on well-established threat-...

https://hunt.io/images/blogs/blog-8-main-sm.png

October 31, 2023

Gateway to Intrusion: Malware Delivery Via Open Directories

Attackers constantly devise new and sophisticated methods of delivering malware to infiltrate systems and exfiltrate...

https://hunt.io/images/blogs/blog_7_main_sm.png

October 25, 2023

How Hunt.io Identifies Services on Non-Standard Ports

The term “threat hunting” is generally associated with detecting malicious behavior on endpoints manually...

https://hunt.io/images/blogs/phishing_no_more_sm.png

October 12, 2023

Phish No More: A Hunt.io Guide to Gophish Detection

Phishing is more than a social engineering technique; it's a harrowing threat landscape where deception, innovation, and vigilance collide.

https://hunt.io/images/blogs/decoding-cyber-shadows-sm.png

September 28, 2023

JA4: Decoding Cyber Shadows

In the ever-evolving world of cybersecurity, few individuals embody the spirit of innovation and exploration as profoundly as John Althouse.

https://hunt.io/images/blogs/blog_statistic_preview.png

September 19, 2023

Hunt Platform Statistics Launch

Learn about the Hunt.io massive observation collection platform.

https://hunt.io/images/blogs/discovering-and-disrupting-malicious-infrastructure-lg.png

September 12, 2023

Discovering & Disrupting Malicious Infrastructure

Michael showcases how the Hunt platform can be leveraged to proactively identify infrastructure not yet publicly reported on from recent malware campaigns.

https://hunt.io/images/blogs/transparency-of-attacker-tooling-sm.png

August 17, 2023

Transparency of Attacker Tooling

How Open Directories Help with Threat Hunting and Incident Response.

https://hunt.io/images/blogs/lets-go-hunting-sm.png

August 01, 2023

Let's go Hunting

We are excited to unveil Hunt.io, a cutting-edge threat hunting solution that is set to transform the landscape of cybersecurity.