Introducing Hunt 2.1:
AI File Analysis, IOC Feed Upgrades, Improved Threat Actor Intelligence, and More!

Published on

Published on

Published on

May 21, 2025

May 21, 2025

May 21, 2025

Introducing Hunt 2.1: AI File Analysis, IOC Feed Upgrades, Improved Threat Actor Intelligence, and More!
Introducing Hunt 2.1: AI File Analysis, IOC Feed Upgrades, Improved Threat Actor Intelligence, and More!
Introducing Hunt 2.1: AI File Analysis, IOC Feed Upgrades, Improved Threat Actor Intelligence, and More!
Introducing Hunt 2.1: AI File Analysis, IOC Feed Upgrades, Improved Threat Actor Intelligence, and More!

Introducing Hunt 2.1: AI File Analysis, IOC Feed Upgrades, Improved Threat Actor Intelligence, and More!

We're excited to announce Hunt 2.1, a new set of upgrades across Hunt.io, all built to help you cut through the noise and focus on what matters: identifying real threats faster. From smarter AI file analysis to more detailed IOC context, improved Threat Actor data, these updates are all about speeding up threat hunts and cutting out guesswork.

Here's a quick snapshot of what's new:

FeatureWhat's New?
AttackCapture™Auto tagging of exploits, attacker configs and victim/targets, directory stats and better code search.
Updated Bulk EnrichmentImproved IP Enrichment to show historical C2, Attack Capture data and IOC Hunter enrichments.
SQLNew data sets, impoved documentation and UI.
Improved SSL Certificate DataJA4X, fingerprinting, and issuer data shown cleanly, with pivot links.
Threat Actor AdditionsAdded ransomware and asliases by security vendor.
IntegrationsCyware integration updated with IOC Hunter.
Speed ImprovmentsMany speed improvments, UI Enhancments and bugf fixes.

AttackCapture™ Updates

  • Automated file tagging: AttackCapture™ now tags key elements automatically, like exploits, target file paths, GitHub README references, and tools, surfacing what matters (target lists, external domains, tool usage) without digging through raw data.

    AttackCapture™ Updates


  • UI Improvements: Number of UI updates, including a new Statistics modal for AttackCapture™ file extensions. The new Statistics tab shows counts and total sizes by file extension, giving you quick visibility into what types of files are being captured most often.

    For example, .py, .txt, and .md are among the top file types collected, helping you spot trends in tooling, script usage, or dropped artifacts across campaigns.

    UI Improvements


  • Support for exclusions in Code Search: We've improved search behavior to reduce noise. Now, when searching for a domain or company name, results no longer include irrelevant dictionary files like the Alexa Top 1M or wordlists.

    Support for exclusions in Code Search


  • Deep Text File Analysis: One-click summaries to help you make faster sense of threat data, highlighting intent, language, function, malicious indicators, and scanning patterns.

    Deep Text File Analysis


  • Sub-directory Stats: Now you can see the number of subdirectories tracked in each capture, along with total file count and size. This gives you a quick sense of how deep the directory structure goes.

General Updates

  • SQL schemas are now better organized: We've improved the HuntSQL™ interface to make schema navigation more intuitive. Dataset selection is now grouped by category, including Malware, Certificates, HTTP, Phishing, Open Directories, SSH, and more, so you can query faster without digging through cluttered lists.

    SQL schemas are now better organized


  • Improved Threat Actor Intelligence: We've made major upgrades to the Threat Actor data. You can now search across all known aliases, giving you a unified view of how different vendors refer to the same group.

    For example, APT28 is mapped to aliases like Fancy Bear (CrowdStrike), Forest Blizzard (Microsoft), and ITG05 (IBM), so you don't miss context just because the name changed.

    Improved Threat Actor Intelligence


    Every actor profile now includes:

    • Synonyms from across the industry

    • Country of origin

    • Linked infrastructure like IPs, hosts, and hashes

    • Reports and posts tied to the actor

    • Filters for industry targeting, type of incident, victim country, and more

    You can search by adversary name, and for example, quickly pivot into ransomware groups like RansomHub, AlphVM, or Royal. These are just a few among dozens of actor profiles that surface known infrastructure, related IOCs (IPs, hosts, SHA256s), and source material in one place.

    Threat actors


    Whether you're tracking state-sponsored operations or extortion gangs, results adapt to show all relevant activity tied to the group.

    Threat actors 2


  • Unified History View for IP Analysis: When viewing an IP, all historical data is now consolidated under a single History tab. This includes Timeline, SSL History, SSH History, Port History, and JARM History, so you can move between views without jumping around or losing track.

    Each section shows relevant metadata such as ASN, company, country, and timestamps, along with detailed infrastructure insights like active ports, JARM fingerprints, certificate subjects, and SSH key reuse. This layout simplifies infrastructure investigations and speeds up threat analysis.

    Unified History View for IP Analysis


  • Expanded Platform Stats View: We now break out platform-wide stats in more detail. You can see real-time rates for key categories like parsed certificates, HTTP pages, protocol detections, JARM hashes, SSH keys, and open ports. This gives a quick snapshot of current detection activity across the entire Hunt.io infrastructure.

    Expanded Platform Stats View


  • New Certificate Details and Pivots: We've introduced a redesigned certificate details page with clearer sections for JA4X, fingerprinting, validity periods, and issuer metadata.

    You can now pivot directly from fingerprints and JA4X hashes to related infrastructure. More pivot options are on the way to help speed up investigations across SSL and certificate-based tracking.

    New Certificate Details and Pivots


  • Bulk Extractor Redesign and IP Search Upgrades: The Bulk Extractor has a new look, now live for IPs, with domain support coming soon. We've added sorting to all IP search fields and now highlight malware in red, including recent historical threats, so you can spot them without extra clicks.

    Bulk Extractor Redesign and IP Search Upgrades


  • Open Directory Filenames Dataset: We've added a new listing for files seen in exposed open directories that weren't downloaded by AttackCapture™. It includes filenames, full file URLs, and metadata like hostname and directory flags, useful for pivoting into related infrastructure directly from HuntSQL™.

    Open Directory Filenames Dataset


  • Improved SQL Documentation: We've updated the HuntSQL™ docs with a clearer layout, better examples, and easier guidance for advanced queries like regex, time filters, and pivoting.

    Improved SQL Documentation


  • Open Directories Linked to Malware: You can now view exposed open directories connected to specific malware families. The following screenshot shows an example tied to RedLine Stealer, helping uncover infrastructure used for payload delivery or staging.

    Open Directories Linked to Malware


  • Cyware Integration Updated: This integration now supports our new IOC Hunter feed, so Cyware users can now pull in Hunt.io's IOC feed without extra steps.

API improvements

  • New fields added to the IOC Hunter feed: malware_name and description. We've added these new fields to each IOC, so you don't need to enrich them manually. This is a sample of what you'll get (notice the two fields at the bottom):

    {
        "value": "d9e52663715902e9ec51a7dd2fea5241c9714976e9541c02df66d1a42a3a7d2a",
        "ioc_type": "ioc_sha256",
        "threat_actor": {
            "id": 46,
            "uuid": "4f69ec6d-cb6b-42af-b8e2-920a2aa4be10",
            "name": "APT33",
            "origin": "APT33",
    
        ...
        ...
    
        "description": "The post discusses Shamoon malware, a wiper that targets devices on a shared network to erase operating systems. It details four waves of attacks since its emergence on August 15, 2012, primarily against Saudi organizations. Shamoon, also known as Disttrack and other aliases, is linked to the APT33 actor group and affects various Windows operating systems. The malware operates by overwriting the Master Boot Record (MBR), rendering systems inoperable. Notable victims include Saudi Aramco and Saipem, with Aramco suffering damage to 30,000 computers. The post lists several hashes associated with Shamoon's components, such as Spreader.exe and Trojan.Filerase.",
        "malware_name": "Shamoon"
    }
    


  • Advanced search is faster now; we've removed the slower aggregations that were holding things up.

Bug Fixes

  • Session Timeout Bug Fix: We had an annoying timeout issue that affected some of our users. This has been fixed.

  • Protocol Mismatch on Collections: Around 400,000 collections per day were failing due to incorrect protocol handling, causing the error: "The plain HTTP request was sent to HTTPS port." This was fixed on May 19, and collections now run correctly.


As always, if you run into any issues or have ideas for what we should tackle next, reach out. We're building Hunt.io with real threat hunters in mind, and that means staying close to the people using it every day.

We're excited to announce Hunt 2.1, a new set of upgrades across Hunt.io, all built to help you cut through the noise and focus on what matters: identifying real threats faster. From smarter AI file analysis to more detailed IOC context, improved Threat Actor data, these updates are all about speeding up threat hunts and cutting out guesswork.

Here's a quick snapshot of what's new:

FeatureWhat's New?
AttackCapture™Auto tagging of exploits, attacker configs and victim/targets, directory stats and better code search.
Updated Bulk EnrichmentImproved IP Enrichment to show historical C2, Attack Capture data and IOC Hunter enrichments.
SQLNew data sets, impoved documentation and UI.
Improved SSL Certificate DataJA4X, fingerprinting, and issuer data shown cleanly, with pivot links.
Threat Actor AdditionsAdded ransomware and asliases by security vendor.
IntegrationsCyware integration updated with IOC Hunter.
Speed ImprovmentsMany speed improvments, UI Enhancments and bugf fixes.

AttackCapture™ Updates

  • Automated file tagging: AttackCapture™ now tags key elements automatically, like exploits, target file paths, GitHub README references, and tools, surfacing what matters (target lists, external domains, tool usage) without digging through raw data.

    AttackCapture™ Updates


  • UI Improvements: Number of UI updates, including a new Statistics modal for AttackCapture™ file extensions. The new Statistics tab shows counts and total sizes by file extension, giving you quick visibility into what types of files are being captured most often.

    For example, .py, .txt, and .md are among the top file types collected, helping you spot trends in tooling, script usage, or dropped artifacts across campaigns.

    UI Improvements


  • Support for exclusions in Code Search: We've improved search behavior to reduce noise. Now, when searching for a domain or company name, results no longer include irrelevant dictionary files like the Alexa Top 1M or wordlists.

    Support for exclusions in Code Search


  • Deep Text File Analysis: One-click summaries to help you make faster sense of threat data, highlighting intent, language, function, malicious indicators, and scanning patterns.

    Deep Text File Analysis


  • Sub-directory Stats: Now you can see the number of subdirectories tracked in each capture, along with total file count and size. This gives you a quick sense of how deep the directory structure goes.

General Updates

  • SQL schemas are now better organized: We've improved the HuntSQL™ interface to make schema navigation more intuitive. Dataset selection is now grouped by category, including Malware, Certificates, HTTP, Phishing, Open Directories, SSH, and more, so you can query faster without digging through cluttered lists.

    SQL schemas are now better organized


  • Improved Threat Actor Intelligence: We've made major upgrades to the Threat Actor data. You can now search across all known aliases, giving you a unified view of how different vendors refer to the same group.

    For example, APT28 is mapped to aliases like Fancy Bear (CrowdStrike), Forest Blizzard (Microsoft), and ITG05 (IBM), so you don't miss context just because the name changed.

    Improved Threat Actor Intelligence


    Every actor profile now includes:

    • Synonyms from across the industry

    • Country of origin

    • Linked infrastructure like IPs, hosts, and hashes

    • Reports and posts tied to the actor

    • Filters for industry targeting, type of incident, victim country, and more

    You can search by adversary name, and for example, quickly pivot into ransomware groups like RansomHub, AlphVM, or Royal. These are just a few among dozens of actor profiles that surface known infrastructure, related IOCs (IPs, hosts, SHA256s), and source material in one place.

    Threat actors


    Whether you're tracking state-sponsored operations or extortion gangs, results adapt to show all relevant activity tied to the group.

    Threat actors 2


  • Unified History View for IP Analysis: When viewing an IP, all historical data is now consolidated under a single History tab. This includes Timeline, SSL History, SSH History, Port History, and JARM History, so you can move between views without jumping around or losing track.

    Each section shows relevant metadata such as ASN, company, country, and timestamps, along with detailed infrastructure insights like active ports, JARM fingerprints, certificate subjects, and SSH key reuse. This layout simplifies infrastructure investigations and speeds up threat analysis.

    Unified History View for IP Analysis


  • Expanded Platform Stats View: We now break out platform-wide stats in more detail. You can see real-time rates for key categories like parsed certificates, HTTP pages, protocol detections, JARM hashes, SSH keys, and open ports. This gives a quick snapshot of current detection activity across the entire Hunt.io infrastructure.

    Expanded Platform Stats View


  • New Certificate Details and Pivots: We've introduced a redesigned certificate details page with clearer sections for JA4X, fingerprinting, validity periods, and issuer metadata.

    You can now pivot directly from fingerprints and JA4X hashes to related infrastructure. More pivot options are on the way to help speed up investigations across SSL and certificate-based tracking.

    New Certificate Details and Pivots


  • Bulk Extractor Redesign and IP Search Upgrades: The Bulk Extractor has a new look, now live for IPs, with domain support coming soon. We've added sorting to all IP search fields and now highlight malware in red, including recent historical threats, so you can spot them without extra clicks.

    Bulk Extractor Redesign and IP Search Upgrades


  • Open Directory Filenames Dataset: We've added a new listing for files seen in exposed open directories that weren't downloaded by AttackCapture™. It includes filenames, full file URLs, and metadata like hostname and directory flags, useful for pivoting into related infrastructure directly from HuntSQL™.

    Open Directory Filenames Dataset


  • Improved SQL Documentation: We've updated the HuntSQL™ docs with a clearer layout, better examples, and easier guidance for advanced queries like regex, time filters, and pivoting.

    Improved SQL Documentation


  • Open Directories Linked to Malware: You can now view exposed open directories connected to specific malware families. The following screenshot shows an example tied to RedLine Stealer, helping uncover infrastructure used for payload delivery or staging.

    Open Directories Linked to Malware


  • Cyware Integration Updated: This integration now supports our new IOC Hunter feed, so Cyware users can now pull in Hunt.io's IOC feed without extra steps.

API improvements

  • New fields added to the IOC Hunter feed: malware_name and description. We've added these new fields to each IOC, so you don't need to enrich them manually. This is a sample of what you'll get (notice the two fields at the bottom):

    {
        "value": "d9e52663715902e9ec51a7dd2fea5241c9714976e9541c02df66d1a42a3a7d2a",
        "ioc_type": "ioc_sha256",
        "threat_actor": {
            "id": 46,
            "uuid": "4f69ec6d-cb6b-42af-b8e2-920a2aa4be10",
            "name": "APT33",
            "origin": "APT33",
    
        ...
        ...
    
        "description": "The post discusses Shamoon malware, a wiper that targets devices on a shared network to erase operating systems. It details four waves of attacks since its emergence on August 15, 2012, primarily against Saudi organizations. Shamoon, also known as Disttrack and other aliases, is linked to the APT33 actor group and affects various Windows operating systems. The malware operates by overwriting the Master Boot Record (MBR), rendering systems inoperable. Notable victims include Saudi Aramco and Saipem, with Aramco suffering damage to 30,000 computers. The post lists several hashes associated with Shamoon's components, such as Spreader.exe and Trojan.Filerase.",
        "malware_name": "Shamoon"
    }
    


  • Advanced search is faster now; we've removed the slower aggregations that were holding things up.

Bug Fixes

  • Session Timeout Bug Fix: We had an annoying timeout issue that affected some of our users. This has been fixed.

  • Protocol Mismatch on Collections: Around 400,000 collections per day were failing due to incorrect protocol handling, causing the error: "The plain HTTP request was sent to HTTPS port." This was fixed on May 19, and collections now run correctly.


As always, if you run into any issues or have ideas for what we should tackle next, reach out. We're building Hunt.io with real threat hunters in mind, and that means staying close to the people using it every day.

Related Posts:

URLx Just Got Bigger: 10.6B URLs for Recon and Malicious Infrastructure Hunting
Mar 27, 2025

Explore exposed infrastructure with URLx: 10.6B+ URLs, HTTPx integration, and advanced filtering - now live in Hunt.io.

URLx Just Got Bigger: 10.6B URLs for Recon and Malicious Infrastructure Hunting
Mar 27, 2025

Explore exposed infrastructure with URLx: 10.6B+ URLs, HTTPx integration, and advanced filtering - now live in Hunt.io.

Introducing Hunt 2.0: Deeper Threat Analysis & Enhanced Data for Cyber Intelligence
Mar 6, 2025

Our latest release delivers deeper threat analysis with improved threat actor, C2, malware data, and new integrations for robust cyber intelligence.

Introducing Hunt 2.0: Deeper Threat Analysis & Enhanced Data for Cyber Intelligence
Mar 6, 2025

Our latest release delivers deeper threat analysis with improved threat actor, C2, malware data, and new integrations for robust cyber intelligence.

Introducing IOC Hunter Feed and Attribution for Enhanced Threat Intelligence
Mar 20, 2025

Track threat actors and malicious infrastructure with Hunt.io’s IOC Hunter Feed and C2 Attribution. Get deeper visibility and context for better threat intelligence.

Introducing IOC Hunter Feed and Attribution for Enhanced Threat Intelligence
Mar 20, 2025

Track threat actors and malicious infrastructure with Hunt.io’s IOC Hunter Feed and C2 Attribution. Get deeper visibility and context for better threat intelligence.

URLx Just Got Bigger: 10.6B URLs for Recon and Malicious Infrastructure Hunting
Mar 27, 2025

Explore exposed infrastructure with URLx: 10.6B+ URLs, HTTPx integration, and advanced filtering - now live in Hunt.io.

Introducing Hunt 2.0: Deeper Threat Analysis & Enhanced Data for Cyber Intelligence
Mar 6, 2025

Our latest release delivers deeper threat analysis with improved threat actor, C2, malware data, and new integrations for robust cyber intelligence.

Introducing IOC Hunter Feed and Attribution for Enhanced Threat Intelligence
Mar 20, 2025

Track threat actors and malicious infrastructure with Hunt.io’s IOC Hunter Feed and C2 Attribution. Get deeper visibility and context for better threat intelligence.