Hunt Blog

Check out our latest threat hunting articles, tips and stories

https://hunt.io/images/blogs/tales-from-hunt_sm.webp

May 28, 2024

Tales from the Hunt: A Look at Yakit Security Tool

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available...

https://hunt.io/images/blogs/unearthing_sm.webp

May 21, 2024

Unearthing New Infrastructure by Revisiting Past Threat Reports

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among...

https://hunt.io/images/blogs/viper_nest_sm.webp

May 08, 2024

Into the Viper’s Nest: Observations from Hunt’s Scanning

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...

https://hunt.io/images/blogs/spark_sm.png

April 23, 2024

Spotting SparkRAT: Detection Tactics & Sandbox Findings

The Hunt Research Team vigilantly monitors GitHub, sifts through the IOC sections of threat intelligence reports...

https://hunt.io/images/blogs/supershell_sm.webp

April 16, 2024

In Plain Sight: Uncovering SuperShell & Cobalt Strike from an Open Directory

Hunt scans every corner of the public IPV4 space and constantly scours the Internet for open directories. Through...

https://hunt.io/images/blogs/blueshell_sm.webp

April 09, 2024

BlueShell: Four Years On, Still A Formidable Threat

Platforms like GitHub offer a valuable resource for developers and the open-source community. However, these sites also create a potential...

https://hunt.io/images/blogs/redguard_sm.webp

April 02, 2024

A Hunt How-To: Detecting RedGuard C2 Redirector

If you’re like me, you’ve likely read multiple reports on network intrusions involving a “standard” deployment...

https://hunt.io/images/blogs/coin_mainer.webp

March 28, 2024

Coin Miner and Mozi Botnet

Open directories can sometimes contain unexpected dangers in the hidden parts of the internet. Our recent investigation...

https://hunt.io/images/blogs/red_team_sm.webp

March 21, 2024

A Treasure Trove of Trouble: Open Directory Exposes Red Team Tools

While open directories are often seen as a goldmine for security researchers and blue teams searching for malware...