Threat Research
& Product Updates
Threat Research
& Product Updates
Threat Research
& Product Updates
Practical threat hunting research from real investigations powered by Hunt.io.
Practical threat hunting research from real investigations powered by Hunt.io.
Threat Research

Discover how we mapped over 18,000 active malware C2 servers across Chinese ISPs and cloud providers using host-centric telemetry. See which providers are most frequently abused and what it means for global threat monitoring.
Jan 14, 2026
•
13
min read
Threat Research
Threat Research

Discover how we mapped over 18,000 active malware C2 servers across Chinese ISPs and cloud providers using host-centric telemetry. See which providers are most frequently abused and what it means for global threat monitoring.
Jan 14, 2026
•
13
min read
Threat Research

Filters
Filters
Filters
Type
Victim Region
Malware
Attack Technique
Release Date
Threat Research

Dec 17, 2025
•
19
min read
Threat Research
Backdoor Installer
FRP/Rakshasa
Command & Control (C2)
Threat Research

Oct 16, 2025
•
17
min read
Threat Research
🇪🇺 Europe
🌎 North America
Odyssey Stealer
AMOS Spyware
Malware Delivery
Odyssey
AMOS
Oct 2025
Threat Research

Oct 9, 2025
•
17
min read
Threat Research
🌏 Asia
AdaptixC2
Command & Control (C2)
AdaptixC2
Oct 2025
Threat Research

Oct 1, 2025
•
20
min read
Threat Research
🌏 Asia
SideWinder
Phishing & Social Engineering
APT Sidewinder
Oct 2025
Threat Research

Sep 11, 2025
•
29
min read
Threat Research
🌎 North America
MaaS
Phishing & Social Engineering
Sep 2025
Threat Research

Sep 2, 2025
•
13
min read
Threat Research
🌍 Global
TinyLoader
RedLine Stealer
Malware Delivery
Sep 2025
Threat Research

Aug 20, 2025
•
16
min read
Threat Research
🌍 Middle East
PowGoop
MuddyWater RAT
Malware Delivery
MuddyWater
Aug 2025
Threat Research

Aug 8, 2025
•
21
min read
Threat Research
🌏 Asia
Phishing & Social Engineering
APT Sidewinder
Aug 2025
Threat Research

Jul 22, 2025
•
17
min read
Threat Research
🇮🇳 India
🌏 Asia
Phishing & Social Engineering
Malware Delivery
APT36
Jul 2025
Threat Research

May 15, 2025
•
7
min read
Threat Research
🌍 Middle East
Phishing & Social Engineering
May 2025
Threat Research

May 5, 2025
•
8
min read
Threat Research
🇮🇳 India
Phishing & Social Engineering
APT36
May 2025
Threat Research

Apr 22, 2025
•
9
min read
Threat Research
🌍 Middle East
Karkoff
SideTwist
PowBAT
Command & Control (C2)
APT34
Apr 2025
Threat Research

Apr 17, 2025
•
12
min read
Threat Research
🌍 Global
KEYPLUG
Tool & Infrastructure Exposure
Chinese APT
Apr 2025
Threat Research

Apr 15, 2025
•
10
min read
Threat Research
🌍 Global
Pterodo
ShadowPad
Phishing & Social Engineering
Gamaredon
ShadowPad ecosystem
Apr 2025
Threat Research

Apr 10, 2025
•
7
min read
Threat Research
🇪🇺 Europe
Gopish
Phishing & Social Engineering
Apr 2025
Threat Research

Apr 8, 2025
•
11
min read
Threat Research
🇪🇺 Europe
🌏 Asia
ShadowPad
Command & Control (C2)
Apr 2025
Threat Research

Apr 3, 2025
•
9
min read
Threat Research
🌏 Asia
ClickFix
Phishing & Social Engineering
APT36
Apr 2025
Threat Research

Mar 18, 2025
•
8
min read
Threat Research
🇰🇷 South Korea
Cobalt Strike
Malware Delivery
DPRK (North Korea)
Mar 2025
Threat Research

Mar 11, 2025
•
6
min read
Threat Research
JSPSpy
FileBrowser
Malware Delivery
Lazarus Group
Mar 2025
Threat Research

Mar 4, 2025
•
12
min read
Threat Research
🌍 Global
Stealc
Pyramid
Phishing & Social Engineering
Malware Delivery
Russian APT
Mar 2025
Threat Research

Feb 20, 2025
•
11
min read
Threat Research
🌏 Asia
LightSpy
Data Theft & Exfiltration
Chinese APT
Feb 2025
Threat Research

Feb 18, 2025
•
7
min read
Threat Research
🇨🇳 China
Backdoor Installer
Malware Delivery
Feb 2025
Threat Research

Feb 4, 2025
•
6
min read
Threat Research
🌏 Asia
Phishing & Social Engineering
GreenSpot APT
Feb 2025
Threat Research

Jan 28, 2025
•
9
min read
Threat Research
🌏 Asia
SparkRAT
Command & Control (C2)
DPRK (North Korea)
Jan 2025
Threat Research

Jan 23, 2025
•
15
min read
Threat Research
🌏 Asia
KEYPLUG
Certificate & TLS Abuse
APT41
GhostWolf
Jan 2025
Threat Research

Jan 21, 2025
•
8
min read
Threat Research
🌍 Global
Malicious Extension
Malware Delivery
Jan 2025
Threat Research

Jan 14, 2025
•
5
min read
Threat Research
🇰🇷 South Korea
Credential Reuse
DPRK (North Korea)
Jan 2025
Threat Research

Jan 9, 2025
•
7
min read
Threat Research
🌍 Global
Malicious Extension
Certificate & TLS Abuse
Jan 2025
Threat Research

Jan 7, 2025
•
9
min read
Threat Research
🌍 Global
Cobalt Strike
Command & Control (C2)
Jan 2025
Threat Research

Dec 12, 2024
•
6
min read
Threat Research
🇪🇺 Europe
🌎 North America
Oyster
IOC Pivoting
Vanilla Tempest
Dec 2024
Threat Research

Dec 5, 2024
•
7
min read
Threat Research
🌏 Asia
MoqHao
Phishing & Social Engineering
Dec 2024
Threat Research

Dec 3, 2024
•
8
min read
Threat Research
🌍 Global
Cobalt Strike
Command & Control (C2)
Dec 2024
Threat Research

Nov 21, 2024
•
7
min read
Threat Research
🌏 Asia
🇪🇺 Europe
DarkPeony
Certificate & TLS Abuse
Nov 2024
Threat Research

Nov 19, 2024
•
6
min read
Threat Research
🌍 Global
XenoRAT
Evasion & Obfuscation
DPRK (North Korea)
Nov 2024
Threat Research

Nov 12, 2024
•
7
min read
Threat Research
🌎 North America
Sliver
Ligolo-ng
Command & Control (C2)
Nov 2024
Threat Research

Nov 5, 2024
•
9
min read
Threat Research
🌍 Global
RunningRAT
XMRig
Botnet Activity, Cryptomining
Nov 2024
Threat Research

Oct 31, 2024
•
7
min read
Threat Research
Cobalt Strike
BrowserGhost
Tool & Infrastructure Exposure
Oct 2024
Threat Research

Oct 29, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
Phishing & Social Engineering
DPRK (North Korea)
Oct 2024
Threat Research

Oct 10, 2024
•
8
min read
Threat Research
🌏 Asia
PlugX
Tool & Infrastructure Exposure
Earth Baxia
Oct 2024
Threat Research

Oct 8, 2024
•
8
min read
Threat Research
🌍 Global
SpyNote
DDoS Scripts
Tool & Infrastructure Exposure
Oct 2024
Threat Research

Oct 1, 2024
•
8
min read
Threat Research
Packed Python Script
Evasion & Obfuscation
Oct 2024
Threat Research

Sep 10, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
Malicious Extension
Phishing & Social Engineering
Kimsuky
Sep 2024
Threat Research

Sep 3, 2024
•
10
min read
Threat Research
🌍 Global
ToneShell
Phishing & Social Engineering
Mustang Panda
Sep 2024
Threat Research

Aug 29, 2024
•
7
min read
Threat Research
🇰🇷 South Korea
Latrodectus
Fake Installer
Malware Delivery
Aug 2024
Threat Research

Jul 16, 2024
•
7
min read
Threat Research
🌍 Global
Poseidon
Gh0st RAT
Malware Delivery
Jul 2024
Threat Research

Jul 2, 2024
•
9
min read
Threat Research
🌏 Asia
🇪🇺 Europe
🌎 South America
Initial Access & Exploitation
Jul 2024
Threat Research

Jun 27, 2024
•
10
min read
Threat Research
🌍 Global
Geacon
Command & Control (C2)
Chinese APT
Jun 2024
Threat Research

Jun 18, 2024
•
7
min read
Threat Research
🌏 Asia
Tool & Infrastructure Exposure
Chinese APT
Jun 2024
Threat Research

Jun 12, 2024
•
7
min read
Threat Research
🌍 Global
Gh0st RAT
Pantegana RAT
Malware Delivery
DriftingCloud
Jun 2024
Threat Research

Jun 5, 2024
•
9
min read
Threat Research
PlugX
Tool & Infrastructure Exposure
Chinese APT
Jun 2024
Threat Research

May 30, 2024
•
7
min read
Threat Research
🌎 North America
🇪🇺 Europe
SolarMarker
Malware Delivery
Multi-Stage Infection
May 2024
Threat Research

Apr 16, 2024
•
5
min read
Threat Research
SuperShell
Cobalt Strike
Tool & Infrastructure Exposure
Apr 2024
Threat Research

Mar 19, 2024
•
4
min read
Threat Research
🌍 Global
W3LL
Phishing & Social Engineering
May 2024
Threat Research

Mar 5, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
🌍 Global
Phishing & Social Engineering
DPRK (North Korea)
May 2024
Threat Research

Feb 28, 2024
•
7
min read
Threat Research
🌍 Global
Pyramid
NK Dropper
Phishing & Social Engineering
DPRK (North Korea)
Feb 2024
Threat Research

Our research team identified over 17,500 internet-exposed OpenClaw, Clawdbot, and Moltbot instances vulnerable to CVE-2026-25253. This report documents detection methods and infrastructure analysis using Hunt.io.
Feb 3, 2026
•
19
min read
Threat Research
Threat Research

Analysis of an exposed BYOB command-and-control server revealing droppers, stagers, payloads, persistence mechanisms, and supporting infrastructure uncovered through proactive threat hunting
Jan 28, 2026
•
26
min read
Threat Research
BYOB
Command & Control (C2)
Threat Research

An in-depth analysis of a ClickFix phishing campaign hijacking Facebook sessions at scale. Learn how attackers abuse verification workflows, steal session cookies, bypass MFA, and target creators using cloud-hosted infrastructure.
Jan 21, 2026
•
27
min read
Threat Research
Threat Research

Discover how we mapped over 18,000 active malware C2 servers across Chinese ISPs and cloud providers using host-centric telemetry. See which providers are most frequently abused and what it means for global threat monitoring.
Jan 14, 2026
•
15
min read
Threat Research
Threat Research

See how automated detection, certificate analysis, and structured queries map Cobalt Strike C2 clusters and expose long-running infrastructure. Learn more.
Jan 6, 2026
•
13
min read
Threat Research
Threat Research

A look back at Hunt.io’s 2025 product releases, platform scale, and the threat research our community engaged with most throughout the year.
Dec 23, 2025
•
6
min read
Threat Research
Product News

Hunt 2.8 brings major improvements across IOC Hunter, AttackCapture™, IP search, and more accurate Reputation & Risk signals for domains and IPs.
Dec 18, 2025
•
4
min read
Product News
Threat Research

Deep investigation into DPRK activity, revealing new Lazarus and Kimsuky infrastructure through multi-stage hunts and exposed operational patterns.
Dec 17, 2025
•
19
min read
Threat Research
Backdoor Installer
FRP/Rakshasa
Command & Control (C2)
Threat Research

A detailed analysis of how React2Shell (CVE-2025-55182) was used to launch a multi-stage attack against a production Next.js app, exposing Node.js systems to real-world exploitation techniques and operational C2 infrastructure.
Dec 10, 2025
•
32
min read
Threat Research
Threat Research

A fake VSCode extension triggered a multi-stage attack deploying the Anivia loader and OctoRAT. Learn how the chain worked and where defenders can detect it. Learn more.
Dec 3, 2025
•
21
min read
Threat Research
Threat Research

Turn Part 1’s clues into action with 10+ HuntSQL™ recipes. Pivot on cert reuse, beacon traits, and enrichment to expose Cobalt Strike clusters. Learn more.
Nov 19, 2025
•
23
min read
Threat Research
Threat Research

Learn how to detect Cobalt Strike in open directories using AttackCapture™. We analyzed real files, SSL certificates, and servers to uncover live C2 infrastructure.
Nov 13, 2025
•
24
min read
Threat Research
Product News

Hunt 2.7 delivers faster C2 listings, new hostname and TLD search options, multi-value filtering, and IOC Hunter threat actor visibility on IP and domain searches. Explore what’s new in the latest release.
Nov 6, 2025
•
4
min read
Product News
Threat Research

Hunt.io maps phishing campaigns using shared ZIP payload infrastructure targeting financial institutions and government organizations across Asia. Learn more.
Oct 29, 2025
•
21
min read
Threat Research
Threat Research

In this interview, Joseph Harrison shares how his Air Force-minted discipline fuels his work in threat detection and digital forensics, and how he leverages Hunt.io’s data (especially JA4) to catch adversaries others miss.
Oct 23, 2025
•
15
min read
Threat Research
Product News

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.
Oct 20, 2025
•
4
min read
Product News
Threat Research

A large-scale macOS malware campaign mimics trusted dev tools to spread Odyssey Stealer and AMOS via fake Homebrew sites. Learn more.
Oct 16, 2025
•
17
min read
Threat Research
🇪🇺 Europe
🌎 North America
Odyssey Stealer
AMOS Spyware
Malware Delivery
Odyssey
AMOS
Threat Research

A deep dive into AdaptixC2: modular architecture, multi-protocol communication, evasion tactics, IOCs, and defense strategies.
Oct 9, 2025
•
17
min read
Threat Research
🌏 Asia
AdaptixC2
Command & Control (C2)
AdaptixC2
Threat Research

SideWinder’s Operation SouthNet: South Asia phishing on Netlify/pages.dev, Zimbra/Outlook lures, and open directories. Maritime focus. IOCs included. Learn more.
Oct 1, 2025
•
20
min read
Threat Research
🌏 Asia
SideWinder
Phishing & Social Engineering
APT Sidewinder
Threat Research

Beginner’s guide to hunting exposed C2 dashboards like Supershell, HookBot, Chaos, Unam, Mythic, and Metasploit using paths, titles, and hashes
Sep 25, 2025
•
16
min read
Threat Research
🌍 Global
Command & Control (C2)
Threat Research

Research on AsyncRAT campaigns using trojanized ScreenConnect installers and open directories, exposing resilient attacker infrastructure and C2 tactics. Learn more.
Sep 18, 2025
•
24
min read
Threat Research
🌍 Global
AsyncRAT
Command & Control (C2)
Threat Research

Hunt.io uncovers the 2025 Energy Phishing Wave, with Chevron, Conoco, PBF, and Phillips 66 targeted by large-scale cloning and brand abuse. Learn more.
Sep 11, 2025
•
29
min read
Threat Research
🌎 North America
MaaS
Phishing & Social Engineering
Threat Research

Daniel Plohmann discusses building Malpedia, advancing malware research with MCRIT, and how metalcore and music inspire his work beyond security.
Sep 9, 2025
•
13
min read
Threat Research
Threat Research

Investigation into TinyLoader malware stealing cryptocurrency via Redline Stealer, USB spread, and C2 infrastructure.
Sep 2, 2025
•
13
min read
Threat Research
🌍 Global
TinyLoader
RedLine Stealer
Malware Delivery
Product News

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.
Aug 21, 2025
•
4
min read
Product News
Threat Research

Hunt.io uncovers MuddyWater phishing campaigns using Firebase lures, VBS payloads, and NetBird for persistent remote access. Learn more.
Aug 20, 2025
•
16
min read
Threat Research
🌍 Middle East
PowGoop
MuddyWater RAT
Malware Delivery
MuddyWater
Threat Research

Hunt.io uncovers the complete ERMAC V3.0 source code, revealing its infrastructure, vulnerabilities, and expanded form injection capabilities.
Aug 14, 2025
•
16
min read
Threat Research
🌍 Global
ERMAC v3
Malware Delivery
Threat Research

APT Sidewinder targets South Asian government and military portals using Netlify-hosted phishing pages to harvest credentials. Learn more.
Aug 8, 2025
•
21
min read
Threat Research
🌏 Asia
Phishing & Social Engineering
APT Sidewinder
Threat Research

APT36 expands its campaign beyond defense, using phishing, .desktop lures, and the Poseidon backdoor to target Indian infrastructure.
Jul 31, 2025
•
13
min read
Threat Research
🇮🇳 India
Poseidon
Malware Delivery
APT36
Threat Research

Phishing campaign targets macOS with fake prompts that run AppleScript via terminal, stealing wallets, cookies, and sensitive files.
Jul 22, 2025
•
17
min read
Threat Research
🇮🇳 India
🌏 Asia
Phishing & Social Engineering
Malware Delivery
APT36
Threat Research

Over 630K hijacked gov.br subdomains were exploited in a black hat SEO campaign using cloaking, keyword stuffing, and redirect techniques. Learn more.
Jul 17, 2025
•
13
min read
Threat Research
🌎 South America
Poseidon
GhostRAT
Product News

Hunt 2.4 adds archive-aware search, deeper SQL visibility, and improved phishing intel to make threat hunting faster, clearer, and more powerful.
Jul 15, 2025
•
4
min read
Product News
Threat Research

Splunk’s Jose Hernandez talks building detections, curious hires, Hunt.io in action, and balancing threat research with chickens and family life.
Jul 8, 2025
•
17
min read
Threat Research
Threat Research

Explore 10.6B structured URLs with URLx. Find malware payloads, C2 paths, phishing campaigns, and exposed assets, fast.
Jun 26, 2025
•
16
min read
Threat Research
Product News

Hunt 2.3 is here: analyst-driven insights, easier pivots, better phishing workflows, and full SSO support for enterprise teams.
Jun 25, 2025
•
5
min read
Product News
Threat Research

Our threat hunters uncovered a PowerShell loader hosted by Chinese and Russian providers, linked to active Cobalt Strike infrastructure.
Jun 19, 2025
•
12
min read
Threat Research
🌍 Global
Cobalt Strike
Malware Delivery
Threat Research

TrustedSec CTO Justin Elze shares red teaming insights, offensive tooling tips, and how he uses Hunt.io and AttackCapture™, plus his passion for race car data.
Jun 17, 2025
•
11
min read
Threat Research
Product News

Explore Hunt 2.2: Auto-unpack zips in AttackCapture™, smarter SQL with WHOIS and Nmap, and full IP history consolidation, track abused hosting with Host Radar, and more.
Jun 12, 2025
•
5
min read
Product News
Threat Research

See how attackers abuse paste.ee to deliver XWorm and AsyncRAT, using obfuscated scripts and globally distributed C2 infrastructure.
Jun 5, 2025
•
10
min read
Threat Research
🌍 Global
AsyncRAT
XWorm
Malware Delivery
Threat Research

Track attacker infrastructure with Hunt.io’s real-time IOC pivoting and threat actor intelligence. Learn more.
May 29, 2025
•
8
min read
Threat Research
🌍 Global
IOC Pivoting
Product News

Discover the new Hunt.io updates: deep text assisted analysis, IOC feed improvements, improved threat actor data, and faster advanced search. Learn more.
May 21, 2025
•
7
min read
Product News
Threat Research

Shared SSH Keys Expose Coordinated Phishing Campaign Targeting Kuwaiti Fisheries and Telecom Sectors
Shared SSH keys expose coordinated phishing targeting Kuwaiti fisheries, telecoms, and insurers with cloned login portals and mobile payment lures. Learn more.
May 15, 2025
•
7
min read
Threat Research
🌍 Middle East
Phishing & Social Engineering
Threat Research

This post explores open-source proxy tools commonly used in attacker and red team infrastructure, and shows how defenders can detect IOX, FRP, Rakshasa, and Stowaway at scale using Hunt.io.
May 8, 2025
•
8
min read
Threat Research
🌏 Asia
FRP/Rakshasa
Command & Control (C2)
Threat Research

APT36-style phishing campaign mimics India’s Ministry of Defence to drop malware on Windows and Linux via spoofed press releases and HTA payloads.
May 5, 2025
•
8
min read
Threat Research
🇮🇳 India
Phishing & Social Engineering
APT36
Threat Research

APT34-like infrastructure mimicking an Iraqi academic institute and fake UK tech firms reveals early-stage staging on M247 servers. Learn what to track
Apr 22, 2025
•
9
min read
Threat Research
🌍 Middle East
Karkoff
SideTwist
PowBAT
Command & Control (C2)
APT34
Threat Research

Briefly exposed KeyPlug infrastructure revealed Fortinet exploits, encrypted webshells, and recon scripts targeting Shiseido, a major Japanese enterprise. Learn more..
Apr 17, 2025
•
12
min read
Threat Research
🌍 Global
KEYPLUG
Tool & Infrastructure Exposure
Chinese APT
Threat Research

Phishing campaign evades detection with server-side logic. See how employee portals are targeted—and how defenders can uncover them. Learn more.
Apr 15, 2025
•
10
min read
Threat Research
🌍 Global
Pterodo
ShadowPad
Phishing & Social Engineering
Gamaredon
ShadowPad ecosystem
Threat Research

Explore how the GoPhish framework was leveraged to stage infrastructure and domains spoofing Polish government and energy entities.
Apr 10, 2025
•
7
min read
Threat Research
🇪🇺 Europe
Gopish
Phishing & Social Engineering
Threat Research

Explore Gamaredon’s flux-like DNS and ShadowPad malware infrastructure, with insights into how these attacker networks are configured, rotated, and maintained.
Apr 8, 2025
•
11
min read
Threat Research
🇪🇺 Europe
🌏 Asia
ShadowPad
Command & Control (C2)
Threat Research

Learn how Hunt.io identifies early-stage ClickFix delivery pages across the web using advanced search capabilities to stay ahead of exploitation attempts.
Apr 3, 2025
•
9
min read
Threat Research
🌏 Asia
ClickFix
Phishing & Social Engineering
APT36
Threat Research

Learn how a Russian-speaking threat actor has evolved from impersonating EFF to now deploying Cloudflare-themed phishing with Telegram-based C2.
Apr 1, 2025
•
9
min read
Threat Research
🌍 Global
Product News

Explore exposed infrastructure with URLx: 10.6B+ URLs, HTTPx integration, and advanced filtering - now live in Hunt.io.
Mar 27, 2025
•
3
min read
Product News
Threat Research

Learn how to track and map adversary infrastructure using Hunt, pivoting from a single IP to uncover hidden connections through infrastructure overlaps and key intelligence indicators.
Mar 25, 2025
•
11
min read
Threat Research
🌍 Global
Malware Delivery
Product News

Track threat actors and malicious infrastructure with Hunt.io’s IOC Hunter Feed and C2 Attribution. Get deeper visibility and context for better threat intelligence.
Mar 20, 2025
•
7
min read
Product News
Threat Research

Discover how threat actors used a Rust loader to deploy Cobalt Strike ‘Cat’ against South Korean targets. Learn more.
Mar 18, 2025
•
8
min read
Threat Research
🇰🇷 South Korea
Cobalt Strike
Malware Delivery
DPRK (North Korea)
Threat Research

Discover how threat actors deploy a rebranded File Browser alongside JSPSpy for stealth file management on compromised servers.
Mar 11, 2025
•
6
min read
Threat Research
JSPSpy
FileBrowser
Malware Delivery
Lazarus Group
Product News

Our latest release delivers deeper threat analysis with improved threat actor, C2, malware data, and new integrations for robust cyber intelligence.
Mar 6, 2025
•
6
min read
Product News
Threat Research

Discover how an open directory exposed a threat actor impersonating EFF to target gamers and how we mapped their infrastructure to Stealc & Pyramid C2.
Mar 4, 2025
•
12
min read
Threat Research
🌍 Global
Stealc
Pyramid
Phishing & Social Engineering
Malware Delivery
Russian APT
Threat Research

Discover Joker malware infrastructure with Hunt SSL History, mapping its C2 network through certificate tracking of recent and past activity.
Feb 27, 2025
•
11
min read
Threat Research
🌍 Global
Joker
Certificate & TLS Abuse
Threat Research

A new LightSpy server expands its attack scope, targeting Facebook and Instagram database files. Explore its evolving capabilities and infrastructure.
Feb 20, 2025
•
11
min read
Threat Research
🌏 Asia
LightSpy
Data Theft & Exfiltration
Chinese APT
Threat Research

Read how attackers distribute backdoored Signal, Line, and Gmail installers through fraudulent download pages and how to defend against this campaign.
Feb 18, 2025
•
7
min read
Threat Research
🇨🇳 China
Backdoor Installer
Malware Delivery
Product News

Advanced Threat Hunting with New SSL Features: Unlocking HuntSQL™ Anomaly Flags for Deeper Detection
Hunt.io enhances SSL threat hunting with new anomaly flags in HuntSQL™, improving the detection of misconfigurations, expired certificates, and malware infrastructure.
Feb 13, 2025
•
7
min read
Product News
Threat Research

Discover how Pyramid, an open-source tool, enables post-exploitation. Learn detection methods using HTTP headers and recent findings in Hunt.
Feb 12, 2025
•
6
min read
Threat Research
Pyramid
Reconnaissance & Scanning
Threat Research

Attackers used open directories to spread SmokeLoader malware, luring Ukraine’s auto and banking sectors. Explore findings, execution, and tactics.
Feb 6, 2025
•
7
min read
Threat Research
🇪🇺 Europe
SmokeLoader
Threat Research

GreenSpot APT targets 163.com users via fake download pages and domain spoofing. Learn their tactics, risks, and how to protect your email accounts.
Feb 4, 2025
•
6
min read
Threat Research
🌏 Asia
Phishing & Social Engineering
GreenSpot APT
Threat Research

Explore how SSL intelligence and SSL history empower proactive threat hunting. Learn tools, real-world examples, and strategies to track cyber threats.
Jan 30, 2025
•
9
min read
Threat Research
Threat Research

Explore SparkRAT detection tactics, macOS targeting, and insights into recent DPRK-linked campaigns with actionable research findings.
Jan 28, 2025
•
9
min read
Threat Research
🌏 Asia
SparkRAT
Command & Control (C2)
DPRK (North Korea)
Threat Research

Uncover how Hunt’s TLS records reveal patterns in suspected KEYPLUG infrastructure, linking GhostWolf and RedGolf/APT41 to ongoing activity.
Jan 23, 2025
•
15
min read
Threat Research
🌏 Asia
KEYPLUG
Certificate & TLS Abuse
APT41
GhostWolf
Threat Research

Uncover a deceptive VS Code extension, masquerading as Zoom, that pilfers your Google Chrome cookies. Join us as we expose the techniques behind this alarming supply chain campaign.
Jan 21, 2025
•
8
min read
Threat Research
🌍 Global
Malicious Extension
Malware Delivery
Threat Research

Learn how a landing page mimicking “JustJoin,” tied to suspected DPRK cyber activity, has reappeared with new infrastructure linked through SSH key overlaps.
Jan 14, 2025
•
5
min read
Threat Research
🇰🇷 South Korea
Credential Reuse
DPRK (North Korea)
Threat Research

Read more about connections through a TLS certificate linking reported and unreported infrastructure tied to the Cyberhaven extension compromise.
Jan 9, 2025
•
7
min read
Threat Research
🌍 Global
Malicious Extension
Certificate & TLS Abuse
Threat Research

Learn how a Cobalt Strike server with a TLS certificate and prominent watermark showed a Golang-compiled beacon communicating with Visual Studio Code tunnels.
Jan 7, 2025
•
9
min read
Threat Research
🌍 Global
Cobalt Strike
Command & Control (C2)
Product News

Discover Hunt.io's 2024 highlights: major product launches, innovations like AttackCapture™, C2 Feed, and Hunt SQL, and a look ahead to 2025.
Dec 20, 2024
•
7
min read
Product News
Threat Research

Our latest analysis uncovers domains linked to the Oyster backdoor, revealing suspected Vanilla Tempest infrastructure and offering insights into server configuration patterns.
Dec 12, 2024
•
6
min read
Threat Research
🇪🇺 Europe
🌎 North America
Oyster
IOC Pivoting
Vanilla Tempest
Threat Research

Learn how the 'Million OK!!!' HTTP response previously linked to Kimsuky has reappeared on new IPs and domains. This update provides the latest insights into evolving infrastructure, helping defenders stay informed on potential North Korean threat activity.
Dec 10, 2024
•
6
min read
Threat Research
🇰🇷 South Korea
Beacon Reuse
Kimsuky
Threat Research

Discover how the MoqHao campaign leveraging iCloud and VK employs cross-platform tactics to steal credentials and distribute malicious APKs.
Dec 5, 2024
•
7
min read
Threat Research
🌏 Asia
MoqHao
Phishing & Social Engineering
Threat Research

Uncover the infrastructure and learn how a unique watermark led to the discovery of Cobalt Strike 4.10 team servers impersonating well-known brands.
Dec 3, 2024
•
8
min read
Threat Research
🌍 Global
Cobalt Strike
Command & Control (C2)
Threat Research

Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
Learn how threat actors leverage open directories to deliver XWorm malware disguised as popular software, providing insight into their tactics.
Nov 28, 2024
•
6
min read
Threat Research
🌍 Global
XWorm
Malware Delivery
Threat Research

Explore how DarkPeony's consistent use of certificates reveals ongoing infrastructure activity, indicating consistent operations across different regions.
Nov 21, 2024
•
7
min read
Threat Research
🌏 Asia
🇪🇺 Europe
DarkPeony
Certificate & TLS Abuse
Threat Research

Discover XenoRAT’s adoption of Excel XLL files and Confuser’s tactical shift from its usual methods, with our insights on adapting to evolving malware techniques.
Nov 19, 2024
•
6
min read
Threat Research
🌍 Global
XenoRAT
Evasion & Obfuscation
DPRK (North Korea)
Threat Research

Sliver C2 and Ligolo-ng join forces in a campaign likely targeting Y Combinator, revealing tactics and infrastructure aimed at the accelerator's network. Learn more.
Nov 12, 2024
•
7
min read
Threat Research
🌎 North America
Sliver
Ligolo-ng
Command & Control (C2)
Threat Research

Discover how a shared Font Awesome kit on Cloudflare platforms exposes over 60,000 phishing links targeting Microsoft, DHL, and more. Learn more.
Nov 7, 2024
•
7
min read
Threat Research
Threat Research

RunningRAT has shifted from access-driven tactics to crypto mining, using open directories to stage payloads and reduce direct C2 traffic.
Nov 5, 2024
•
9
min read
Threat Research
🌍 Global
RunningRAT
XMRig
Botnet Activity, Cryptomining
Threat Research

Discover an open directory of red team tools fit for Halloween, from Cobalt Strike to BrowserGhost.
Oct 31, 2024
•
7
min read
Threat Research
Cobalt Strike
BrowserGhost
Tool & Infrastructure Exposure
Threat Research

Explore a suspected North Korean-linked phishing campaign targeting Naver and how unknown actors use distinct TLS certificates to spoof Apple domains.
Oct 29, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
Phishing & Social Engineering
DPRK (North Korea)
Threat Research

Discover how an open directory of Rekoobe malware samples led to different domains resembling trading platforms, posing risks for traders and investors.
Oct 24, 2024
•
6
min read
Threat Research
🌍 Global
Rekoobe
Malware Delivery
Threat Research

Get an inside look at Warmcookie’s updated C2 infrastructure linked to its latest update. We reveal insights into newly identified servers that can assist defenders in identifying related servers.
Oct 17, 2024
•
6
min read
Threat Research
WarmCookie
Command & Control (C2)
Threat Research

Introducing Code Search on AttackCapture: Uncover Exploit Code, Reverse Shells, C2 Configs, and More
Read how CodeSearch helps security professionals to identify exploit code, reverse shells, and C2 configs across open directories, enhancing threat detection.
Oct 15, 2024
•
7
min read
Threat Research
Threat Research

Learn how basic tracking techniques using unusual certificates and redirects helped uncover Earth Baxia and a hidden cyber threat, providing practical insights for network defense.
Oct 10, 2024
•
8
min read
Threat Research
🌏 Asia
PlugX
Tool & Infrastructure Exposure
Earth Baxia
Threat Research

Explore our in-depth analysis of a cybercriminal’s server, revealing DDoS tools, SpyNote spyware, phishing sites, and ransomware tactics.
Oct 8, 2024
•
8
min read
Threat Research
🌍 Global
SpyNote
DDoS Scripts
Tool & Infrastructure Exposure
Product News

We’re excited to release Hunt SQL and to provide the power and flexibility of SQL to researchers, analysts and threat hunters alike.
Oct 3, 2024
•
1
min read
Product News
Threat Research

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection | Hunt.io
Oct 1, 2024
•
8
min read
Threat Research
Packed Python Script
Evasion & Obfuscation
Threat Research

Check out our new blog post on exposed files found in an open directory that reveal an attack with overlapping TTPs linked to the Stargazers network.
Sep 24, 2024
•
12
min read
Threat Research
Initial Access & Exploitation
Product News

Today Hunt is announcing our IP Enrichment API. You can get detailed data on every IPv4 Address and enrich any existing system.
Sep 17, 2024
•
1
min read
Product News
Threat Research

Compromising a browser can be a goldmine for attackers, offering extensive access to sensitive user data ...
Sep 10, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
Malicious Extension
Phishing & Social Engineering
Kimsuky
Threat Research

The ToneShell backdoor, frequently associated with Mustang Panda (also known as Stately Taurus and Earth Preta...
Sep 3, 2024
•
10
min read
Threat Research
🌍 Global
ToneShell
Phishing & Social Engineering
Mustang Panda
Threat Research

During a recent analysis of known Latrodectus infrastructure, our research team encountered a command-and-control...
Aug 29, 2024
•
7
min read
Threat Research
🇰🇷 South Korea
Latrodectus
Fake Installer
Malware Delivery
Product News

We originally launched our "Open Directory" feature in Hunt a year ago. The premise behind it was to get into the mind of the attacker by get a backstage view into their attacks. What we learned was that there was a ton of information that could be correlated and indexed. Today, we're reaffirming our commitment to getting into the tooling of attackers by launching AttackCapture™ by Hunt.io.
Aug 23, 2024
•
1
min read
Product News
Threat Research

In late 2023, Hunt Research published a blog post detailing how we uncover emerging and previously unknown Gophish infrastructure.
Aug 13, 2024
•
6
min read
Threat Research
Gophish
Phishing & Social Engineering
Threat Research

During routine research of newly identified open directories, the Hunt Research Team made a startling discovery: a...
Aug 7, 2024
•
7
min read
Threat Research
Tool & Infrastructure Exposure
Threat Research

Discover how macOS malware tricks users into downloading an app disguised as The Unarchiver app. The app contains a binary named “CryptoTrade” designed to steal sensitive user information.
Jul 30, 2024
•
7
min read
Threat Research
🌍 Global
CryptoTrade
Malware Delivery
Threat Research

Oyster backdoor, also known as Broomstick (IBM) and CleanUpLoader (RussianPanda – X), has been linked to...
Jul 23, 2024
•
6
min read
Threat Research
Oyster
IOC Pivoting
Threat Research

The Hunt Research Team recently stumbled upon Search Engine Optimization (SEO) poisoning campaigns posing as ...
Jul 16, 2024
•
7
min read
Threat Research
🌍 Global
Poseidon
Gh0st RAT
Malware Delivery
Threat Research

Reports on new malware families often leave subtle clues that lead researchers to uncover additional infrastructure not...
Jul 11, 2024
•
5
min read
Threat Research
🇪🇺 Europe
🌏 Asia
SpiceRAT
Malware Delivery
Threat Research

Nearly three years after ProxyLogon and ProxyShell wreaked widespread havoc on Microsoft Exchange servers, the Hunt
Jul 2, 2024
•
9
min read
Threat Research
🌏 Asia
🇪🇺 Europe
🌎 South America
Initial Access & Exploitation
Threat Research

The red-teaming tool Cobalt Strike has long been a staple for simulating attacks, predominantly targeting Windows ...
Jun 27, 2024
•
10
min read
Threat Research
🌍 Global
Geacon
Command & Control (C2)
Chinese APT
Threat Research

XenoRAT, an open-source malware available on GitHub, has been linked to a North Korean hacking group and unnamed...
Jun 25, 2024
•
8
min read
Threat Research
🌍 Global
XenoRAT
DPRK (North Korea)
Threat Research

In hidden corners of the Internet, open directories often serve as treasure troves, offering a glimpse into the unguarded...
Jun 20, 2024
•
6
min read
Threat Research
SpyNote
Malware Delivery
Threat Research

The Hunt Research Team recently identified an exposed web server used to target the Taiwanese Freeway Bureau and a...
Jun 18, 2024
•
7
min read
Threat Research
🌏 Asia
Tool & Infrastructure Exposure
Chinese APT
Threat Research

Gh0st and Pantegana remote access tools/trojans (RATs) may seem unlikely to be discussed, but both have made notable...
Jun 12, 2024
•
7
min read
Threat Research
🌍 Global
Gh0st RAT
Pantegana RAT
Malware Delivery
DriftingCloud
Threat Research

In this post, we'll detail the infrastructure of the LightSpy spyware framework and highlight the unique TLS certificate...
Jun 6, 2024
•
7
min read
Threat Research
🌏 Asia
LightSpy
Certificate & TLS Abuse
Threat Research

The threat actor(s) built and controlled at least one of the binaries on the same server, granting us access to numerous..
Jun 5, 2024
•
9
min read
Threat Research
PlugX
Tool & Infrastructure Exposure
Chinese APT
Threat Research

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.
May 30, 2024
•
7
min read
Threat Research
🌎 North America
🇪🇺 Europe
SolarMarker
Malware Delivery
Multi-Stage Infection
Threat Research

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.
May 28, 2024
•
5
min read
Threat Research
Yakit
Threat Research

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.
May 21, 2024
•
5
min read
Threat Research
Threat Research

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...
May 8, 2024
•
7
min read
Threat Research
Threat Research

The Hunt Research Team vigilantly monitors GitHub, sifts through the IOC sections of threat intelligence reports, and scours various online forums for emerging threats, ensuring our detections stay practical and current for our customers. Our focus frequently turns to lesser-known threats that can still wreak havoc on the networks of uninformed defenders.
Apr 23, 2024
•
5
min read
Threat Research
SparkRAT
Lateral Movement & Persistence
Threat Research

Hunt scans every corner of the public IPV4 space and constantly scours the Internet for open directories. Through...
Apr 16, 2024
•
5
min read
Threat Research
SuperShell
Cobalt Strike
Tool & Infrastructure Exposure
Threat Research

Platforms like GitHub offer a valuable resource for developers and the open-source community. However, these sites also create a potential...
Apr 9, 2024
•
6
min read
Threat Research
BlueShell
Malware Delivery
Threat Research

If you’re like me, you’ve likely read multiple reports on network intrusions involving a “standard” deployment...
Apr 2, 2024
•
7
min read
Threat Research
RedGuard
Command & Control (C2)
Threat Research

Open directories can sometimes contain unexpected dangers in the hidden parts of the internet. Our recent investigation...
Mar 28, 2024
•
7
min read
Threat Research
Mozi
XMRig
Botnet Activity, Cryptomining
Threat Research

While open directories are often seen as a goldmine for security researchers and blue teams searching for malware...
Mar 21, 2024
•
5
min read
Threat Research
Mimikatz
Tool & Infrastructure Exposure
Threat Research

The W3LL Phishing Kit, a phishing-as-a-service (PAaS) tool, was identified by Group-IB in 2022. What makes the kit...
Mar 19, 2024
•
4
min read
Threat Research
🌍 Global
W3LL
Phishing & Social Engineering
Threat Research

Described on its GitHub README as an "Integrated lightweight cross-platform penetration system," PrismX goe...
Mar 12, 2024
•
5
min read
Threat Research
PrismX
Reconnaissance & Scanning
Threat Research

Over the past month, Hunt has tracked an ongoing phishing campaign by a likely North Korean threat actor focused on...
Mar 5, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
🌍 Global
Phishing & Social Engineering
DPRK (North Korea)
Threat Research

Hunt is tracking an ongoing sophisticated phishing campaign targeting individuals in the Telegram groups focused on...
Feb 28, 2024
•
7
min read
Threat Research
🌍 Global
Pyramid
NK Dropper
Phishing & Social Engineering
DPRK (North Korea)
Threat Research

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...
Feb 14, 2024
•
3
min read
Threat Research
Threat Research

This post will examine ShadowPad infrastructure linked to a yet-to-be-identified threat actor. What makes this activity...
Feb 9, 2024
•
8
min read
Threat Research
🌏 Asia
ShadowPad
Certificate & TLS Abuse
Threat Research

Where national interests, strategic ambitions, and sometimes personal gain intertwine, state-linked cyber threat actors...
Feb 6, 2024
•
7
min read
Threat Research
Threat Research

This post will serve as the first in a long series of articles on using the platform to identify malicious infrastructure and hunt...
Feb 1, 2024
•
4
min read
Threat Research
Threat Research

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...
Jan 30, 2024
•
3
min read
Threat Research
Threat Research

ShadowPad, Quasar RAT, HeadLace, Emotet, and SIGNBT (to name a few) often grab headlines and captivate readers...
Jan 24, 2024
•
5
min read
Threat Research
Product News

It’s been a while since we announced a new feature, and with 2024 already in full swing, it is time to highlight what’s...
Jan 15, 2024
•
8
min read
Product News
Product News

As the end of the year approaches, we continue to enhance our feature set by building on well-established threat-...
Nov 14, 2023
•
3
min read
Product News
Threat Research

Attackers constantly devise new and sophisticated methods of delivering malware to infiltrate systems and exfiltrate...
Oct 31, 2023
•
4
min read
Threat Research
Malware Delivery
Threat Research

The term “threat hunting” is generally associated with detecting malicious behavior on endpoints manually...
Oct 25, 2023
•
4
min read
Threat Research
Threat Research

Phishing is more than a social engineering technique; it's a harrowing threat landscape where deception, innovation, and vigilance collide.
Oct 12, 2023
•
5
min read
Threat Research
Threat Research

In the ever-evolving world of cybersecurity, few individuals embody the spirit of innovation and exploration as profoundly as John Althouse.
Sep 28, 2023
•
10
min read
Threat Research
Threat Research

Learn about the Hunt.io massive observation collection platform.
Sep 19, 2023
•
3
min read
Threat Research
Threat Research

Michael showcases how the Hunt platform can be leveraged to proactively identify infrastructure not yet publicly reported on from recent malware campaigns.
Sep 12, 2023
•
5
min read
Threat Research
Threat Research

How Open Directories Help with Threat Hunting and Incident Response.
Aug 17, 2023
•
4
min read
Threat Research
Threat Research

We are excited to unveil Hunt.io, a cutting-edge threat hunting solution that is set to transform the landscape of cybersecurity.
Aug 1, 2023
•
5
min read
Threat Research
Threat Research

Our research team identified over 17,500 internet-exposed OpenClaw, Clawdbot, and Moltbot instances vulnerable to CVE-2026-25253. This report documents detection methods and infrastructure analysis using Hunt.io.
Feb 3, 2026
•
19
min read
Threat Research
Threat Research

Analysis of an exposed BYOB command-and-control server revealing droppers, stagers, payloads, persistence mechanisms, and supporting infrastructure uncovered through proactive threat hunting
Jan 28, 2026
•
26
min read
Threat Research
BYOB
Command & Control (C2)
Threat Research

An in-depth analysis of a ClickFix phishing campaign hijacking Facebook sessions at scale. Learn how attackers abuse verification workflows, steal session cookies, bypass MFA, and target creators using cloud-hosted infrastructure.
Jan 21, 2026
•
27
min read
Threat Research
Threat Research

Discover how we mapped over 18,000 active malware C2 servers across Chinese ISPs and cloud providers using host-centric telemetry. See which providers are most frequently abused and what it means for global threat monitoring.
Jan 14, 2026
•
15
min read
Threat Research
Threat Research

See how automated detection, certificate analysis, and structured queries map Cobalt Strike C2 clusters and expose long-running infrastructure. Learn more.
Jan 6, 2026
•
13
min read
Threat Research
Threat Research

A look back at Hunt.io’s 2025 product releases, platform scale, and the threat research our community engaged with most throughout the year.
Dec 23, 2025
•
6
min read
Threat Research
Product News

Hunt 2.8 brings major improvements across IOC Hunter, AttackCapture™, IP search, and more accurate Reputation & Risk signals for domains and IPs.
Dec 18, 2025
•
4
min read
Product News
Threat Research

Deep investigation into DPRK activity, revealing new Lazarus and Kimsuky infrastructure through multi-stage hunts and exposed operational patterns.
Dec 17, 2025
•
19
min read
Threat Research
Backdoor Installer
FRP/Rakshasa
Command & Control (C2)
Threat Research

A detailed analysis of how React2Shell (CVE-2025-55182) was used to launch a multi-stage attack against a production Next.js app, exposing Node.js systems to real-world exploitation techniques and operational C2 infrastructure.
Dec 10, 2025
•
32
min read
Threat Research
Threat Research

A fake VSCode extension triggered a multi-stage attack deploying the Anivia loader and OctoRAT. Learn how the chain worked and where defenders can detect it. Learn more.
Dec 3, 2025
•
21
min read
Threat Research
Threat Research

Turn Part 1’s clues into action with 10+ HuntSQL™ recipes. Pivot on cert reuse, beacon traits, and enrichment to expose Cobalt Strike clusters. Learn more.
Nov 19, 2025
•
23
min read
Threat Research
Threat Research

Learn how to detect Cobalt Strike in open directories using AttackCapture™. We analyzed real files, SSL certificates, and servers to uncover live C2 infrastructure.
Nov 13, 2025
•
24
min read
Threat Research
Product News

Hunt 2.7 delivers faster C2 listings, new hostname and TLD search options, multi-value filtering, and IOC Hunter threat actor visibility on IP and domain searches. Explore what’s new in the latest release.
Nov 6, 2025
•
4
min read
Product News
Threat Research

Hunt.io maps phishing campaigns using shared ZIP payload infrastructure targeting financial institutions and government organizations across Asia. Learn more.
Oct 29, 2025
•
21
min read
Threat Research
Threat Research

In this interview, Joseph Harrison shares how his Air Force-minted discipline fuels his work in threat detection and digital forensics, and how he leverages Hunt.io’s data (especially JA4) to catch adversaries others miss.
Oct 23, 2025
•
15
min read
Threat Research
Product News

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.
Oct 20, 2025
•
4
min read
Product News
Threat Research

A large-scale macOS malware campaign mimics trusted dev tools to spread Odyssey Stealer and AMOS via fake Homebrew sites. Learn more.
Oct 16, 2025
•
17
min read
Threat Research
🇪🇺 Europe
🌎 North America
Odyssey Stealer
AMOS Spyware
Malware Delivery
Odyssey
AMOS
Threat Research

A deep dive into AdaptixC2: modular architecture, multi-protocol communication, evasion tactics, IOCs, and defense strategies.
Oct 9, 2025
•
17
min read
Threat Research
🌏 Asia
AdaptixC2
Command & Control (C2)
AdaptixC2
Threat Research

SideWinder’s Operation SouthNet: South Asia phishing on Netlify/pages.dev, Zimbra/Outlook lures, and open directories. Maritime focus. IOCs included. Learn more.
Oct 1, 2025
•
20
min read
Threat Research
🌏 Asia
SideWinder
Phishing & Social Engineering
APT Sidewinder
Threat Research

Beginner’s guide to hunting exposed C2 dashboards like Supershell, HookBot, Chaos, Unam, Mythic, and Metasploit using paths, titles, and hashes
Sep 25, 2025
•
16
min read
Threat Research
🌍 Global
Command & Control (C2)
Threat Research

Research on AsyncRAT campaigns using trojanized ScreenConnect installers and open directories, exposing resilient attacker infrastructure and C2 tactics. Learn more.
Sep 18, 2025
•
24
min read
Threat Research
🌍 Global
AsyncRAT
Command & Control (C2)
Threat Research

Hunt.io uncovers the 2025 Energy Phishing Wave, with Chevron, Conoco, PBF, and Phillips 66 targeted by large-scale cloning and brand abuse. Learn more.
Sep 11, 2025
•
29
min read
Threat Research
🌎 North America
MaaS
Phishing & Social Engineering
Threat Research

Daniel Plohmann discusses building Malpedia, advancing malware research with MCRIT, and how metalcore and music inspire his work beyond security.
Sep 9, 2025
•
13
min read
Threat Research
Threat Research

Investigation into TinyLoader malware stealing cryptocurrency via Redline Stealer, USB spread, and C2 infrastructure.
Sep 2, 2025
•
13
min read
Threat Research
🌍 Global
TinyLoader
RedLine Stealer
Malware Delivery
Product News

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.
Aug 21, 2025
•
4
min read
Product News
Threat Research

Hunt.io uncovers MuddyWater phishing campaigns using Firebase lures, VBS payloads, and NetBird for persistent remote access. Learn more.
Aug 20, 2025
•
16
min read
Threat Research
🌍 Middle East
PowGoop
MuddyWater RAT
Malware Delivery
MuddyWater
Threat Research

Hunt.io uncovers the complete ERMAC V3.0 source code, revealing its infrastructure, vulnerabilities, and expanded form injection capabilities.
Aug 14, 2025
•
16
min read
Threat Research
🌍 Global
ERMAC v3
Malware Delivery
Threat Research

APT Sidewinder targets South Asian government and military portals using Netlify-hosted phishing pages to harvest credentials. Learn more.
Aug 8, 2025
•
21
min read
Threat Research
🌏 Asia
Phishing & Social Engineering
APT Sidewinder
Threat Research

APT36 expands its campaign beyond defense, using phishing, .desktop lures, and the Poseidon backdoor to target Indian infrastructure.
Jul 31, 2025
•
13
min read
Threat Research
🇮🇳 India
Poseidon
Malware Delivery
APT36
Threat Research

Phishing campaign targets macOS with fake prompts that run AppleScript via terminal, stealing wallets, cookies, and sensitive files.
Jul 22, 2025
•
17
min read
Threat Research
🇮🇳 India
🌏 Asia
Phishing & Social Engineering
Malware Delivery
APT36
Threat Research

Over 630K hijacked gov.br subdomains were exploited in a black hat SEO campaign using cloaking, keyword stuffing, and redirect techniques. Learn more.
Jul 17, 2025
•
13
min read
Threat Research
🌎 South America
Poseidon
GhostRAT
Product News

Hunt 2.4 adds archive-aware search, deeper SQL visibility, and improved phishing intel to make threat hunting faster, clearer, and more powerful.
Jul 15, 2025
•
4
min read
Product News
Threat Research

Splunk’s Jose Hernandez talks building detections, curious hires, Hunt.io in action, and balancing threat research with chickens and family life.
Jul 8, 2025
•
17
min read
Threat Research
Threat Research

Explore 10.6B structured URLs with URLx. Find malware payloads, C2 paths, phishing campaigns, and exposed assets, fast.
Jun 26, 2025
•
16
min read
Threat Research
Product News

Hunt 2.3 is here: analyst-driven insights, easier pivots, better phishing workflows, and full SSO support for enterprise teams.
Jun 25, 2025
•
5
min read
Product News
Threat Research

Our threat hunters uncovered a PowerShell loader hosted by Chinese and Russian providers, linked to active Cobalt Strike infrastructure.
Jun 19, 2025
•
12
min read
Threat Research
🌍 Global
Cobalt Strike
Malware Delivery
Threat Research

TrustedSec CTO Justin Elze shares red teaming insights, offensive tooling tips, and how he uses Hunt.io and AttackCapture™, plus his passion for race car data.
Jun 17, 2025
•
11
min read
Threat Research
Product News

Explore Hunt 2.2: Auto-unpack zips in AttackCapture™, smarter SQL with WHOIS and Nmap, and full IP history consolidation, track abused hosting with Host Radar, and more.
Jun 12, 2025
•
5
min read
Product News
Threat Research

See how attackers abuse paste.ee to deliver XWorm and AsyncRAT, using obfuscated scripts and globally distributed C2 infrastructure.
Jun 5, 2025
•
10
min read
Threat Research
🌍 Global
AsyncRAT
XWorm
Malware Delivery
Threat Research

Track attacker infrastructure with Hunt.io’s real-time IOC pivoting and threat actor intelligence. Learn more.
May 29, 2025
•
8
min read
Threat Research
🌍 Global
IOC Pivoting
Product News

Discover the new Hunt.io updates: deep text assisted analysis, IOC feed improvements, improved threat actor data, and faster advanced search. Learn more.
May 21, 2025
•
7
min read
Product News
Threat Research

Shared SSH Keys Expose Coordinated Phishing Campaign Targeting Kuwaiti Fisheries and Telecom Sectors
Shared SSH keys expose coordinated phishing targeting Kuwaiti fisheries, telecoms, and insurers with cloned login portals and mobile payment lures. Learn more.
May 15, 2025
•
7
min read
Threat Research
🌍 Middle East
Phishing & Social Engineering
Threat Research

This post explores open-source proxy tools commonly used in attacker and red team infrastructure, and shows how defenders can detect IOX, FRP, Rakshasa, and Stowaway at scale using Hunt.io.
May 8, 2025
•
8
min read
Threat Research
🌏 Asia
FRP/Rakshasa
Command & Control (C2)
Threat Research

APT36-style phishing campaign mimics India’s Ministry of Defence to drop malware on Windows and Linux via spoofed press releases and HTA payloads.
May 5, 2025
•
8
min read
Threat Research
🇮🇳 India
Phishing & Social Engineering
APT36
Threat Research

APT34-like infrastructure mimicking an Iraqi academic institute and fake UK tech firms reveals early-stage staging on M247 servers. Learn what to track
Apr 22, 2025
•
9
min read
Threat Research
🌍 Middle East
Karkoff
SideTwist
PowBAT
Command & Control (C2)
APT34
Threat Research

Briefly exposed KeyPlug infrastructure revealed Fortinet exploits, encrypted webshells, and recon scripts targeting Shiseido, a major Japanese enterprise. Learn more..
Apr 17, 2025
•
12
min read
Threat Research
🌍 Global
KEYPLUG
Tool & Infrastructure Exposure
Chinese APT
Threat Research

Phishing campaign evades detection with server-side logic. See how employee portals are targeted—and how defenders can uncover them. Learn more.
Apr 15, 2025
•
10
min read
Threat Research
🌍 Global
Pterodo
ShadowPad
Phishing & Social Engineering
Gamaredon
ShadowPad ecosystem
Threat Research

Explore how the GoPhish framework was leveraged to stage infrastructure and domains spoofing Polish government and energy entities.
Apr 10, 2025
•
7
min read
Threat Research
🇪🇺 Europe
Gopish
Phishing & Social Engineering
Threat Research

Explore Gamaredon’s flux-like DNS and ShadowPad malware infrastructure, with insights into how these attacker networks are configured, rotated, and maintained.
Apr 8, 2025
•
11
min read
Threat Research
🇪🇺 Europe
🌏 Asia
ShadowPad
Command & Control (C2)
Threat Research

Learn how Hunt.io identifies early-stage ClickFix delivery pages across the web using advanced search capabilities to stay ahead of exploitation attempts.
Apr 3, 2025
•
9
min read
Threat Research
🌏 Asia
ClickFix
Phishing & Social Engineering
APT36
Threat Research

Learn how a Russian-speaking threat actor has evolved from impersonating EFF to now deploying Cloudflare-themed phishing with Telegram-based C2.
Apr 1, 2025
•
9
min read
Threat Research
🌍 Global
Product News

Explore exposed infrastructure with URLx: 10.6B+ URLs, HTTPx integration, and advanced filtering - now live in Hunt.io.
Mar 27, 2025
•
3
min read
Product News
Threat Research

Learn how to track and map adversary infrastructure using Hunt, pivoting from a single IP to uncover hidden connections through infrastructure overlaps and key intelligence indicators.
Mar 25, 2025
•
11
min read
Threat Research
🌍 Global
Malware Delivery
Product News

Track threat actors and malicious infrastructure with Hunt.io’s IOC Hunter Feed and C2 Attribution. Get deeper visibility and context for better threat intelligence.
Mar 20, 2025
•
7
min read
Product News
Threat Research

Discover how threat actors used a Rust loader to deploy Cobalt Strike ‘Cat’ against South Korean targets. Learn more.
Mar 18, 2025
•
8
min read
Threat Research
🇰🇷 South Korea
Cobalt Strike
Malware Delivery
DPRK (North Korea)
Threat Research

Discover how threat actors deploy a rebranded File Browser alongside JSPSpy for stealth file management on compromised servers.
Mar 11, 2025
•
6
min read
Threat Research
JSPSpy
FileBrowser
Malware Delivery
Lazarus Group
Product News

Our latest release delivers deeper threat analysis with improved threat actor, C2, malware data, and new integrations for robust cyber intelligence.
Mar 6, 2025
•
6
min read
Product News
Threat Research

Discover how an open directory exposed a threat actor impersonating EFF to target gamers and how we mapped their infrastructure to Stealc & Pyramid C2.
Mar 4, 2025
•
12
min read
Threat Research
🌍 Global
Stealc
Pyramid
Phishing & Social Engineering
Malware Delivery
Russian APT
Threat Research

Discover Joker malware infrastructure with Hunt SSL History, mapping its C2 network through certificate tracking of recent and past activity.
Feb 27, 2025
•
11
min read
Threat Research
🌍 Global
Joker
Certificate & TLS Abuse
Threat Research

A new LightSpy server expands its attack scope, targeting Facebook and Instagram database files. Explore its evolving capabilities and infrastructure.
Feb 20, 2025
•
11
min read
Threat Research
🌏 Asia
LightSpy
Data Theft & Exfiltration
Chinese APT
Threat Research

Read how attackers distribute backdoored Signal, Line, and Gmail installers through fraudulent download pages and how to defend against this campaign.
Feb 18, 2025
•
7
min read
Threat Research
🇨🇳 China
Backdoor Installer
Malware Delivery
Product News

Advanced Threat Hunting with New SSL Features: Unlocking HuntSQL™ Anomaly Flags for Deeper Detection
Hunt.io enhances SSL threat hunting with new anomaly flags in HuntSQL™, improving the detection of misconfigurations, expired certificates, and malware infrastructure.
Feb 13, 2025
•
7
min read
Product News
Threat Research

Discover how Pyramid, an open-source tool, enables post-exploitation. Learn detection methods using HTTP headers and recent findings in Hunt.
Feb 12, 2025
•
6
min read
Threat Research
Pyramid
Reconnaissance & Scanning
Threat Research

Attackers used open directories to spread SmokeLoader malware, luring Ukraine’s auto and banking sectors. Explore findings, execution, and tactics.
Feb 6, 2025
•
7
min read
Threat Research
🇪🇺 Europe
SmokeLoader
Threat Research

GreenSpot APT targets 163.com users via fake download pages and domain spoofing. Learn their tactics, risks, and how to protect your email accounts.
Feb 4, 2025
•
6
min read
Threat Research
🌏 Asia
Phishing & Social Engineering
GreenSpot APT
Threat Research

Explore how SSL intelligence and SSL history empower proactive threat hunting. Learn tools, real-world examples, and strategies to track cyber threats.
Jan 30, 2025
•
9
min read
Threat Research
Threat Research

Explore SparkRAT detection tactics, macOS targeting, and insights into recent DPRK-linked campaigns with actionable research findings.
Jan 28, 2025
•
9
min read
Threat Research
🌏 Asia
SparkRAT
Command & Control (C2)
DPRK (North Korea)
Threat Research

Uncover how Hunt’s TLS records reveal patterns in suspected KEYPLUG infrastructure, linking GhostWolf and RedGolf/APT41 to ongoing activity.
Jan 23, 2025
•
15
min read
Threat Research
🌏 Asia
KEYPLUG
Certificate & TLS Abuse
APT41
GhostWolf
Threat Research

Uncover a deceptive VS Code extension, masquerading as Zoom, that pilfers your Google Chrome cookies. Join us as we expose the techniques behind this alarming supply chain campaign.
Jan 21, 2025
•
8
min read
Threat Research
🌍 Global
Malicious Extension
Malware Delivery
Threat Research

Learn how a landing page mimicking “JustJoin,” tied to suspected DPRK cyber activity, has reappeared with new infrastructure linked through SSH key overlaps.
Jan 14, 2025
•
5
min read
Threat Research
🇰🇷 South Korea
Credential Reuse
DPRK (North Korea)
Threat Research

Read more about connections through a TLS certificate linking reported and unreported infrastructure tied to the Cyberhaven extension compromise.
Jan 9, 2025
•
7
min read
Threat Research
🌍 Global
Malicious Extension
Certificate & TLS Abuse
Threat Research

Learn how a Cobalt Strike server with a TLS certificate and prominent watermark showed a Golang-compiled beacon communicating with Visual Studio Code tunnels.
Jan 7, 2025
•
9
min read
Threat Research
🌍 Global
Cobalt Strike
Command & Control (C2)
Product News

Discover Hunt.io's 2024 highlights: major product launches, innovations like AttackCapture™, C2 Feed, and Hunt SQL, and a look ahead to 2025.
Dec 20, 2024
•
7
min read
Product News
Threat Research

Our latest analysis uncovers domains linked to the Oyster backdoor, revealing suspected Vanilla Tempest infrastructure and offering insights into server configuration patterns.
Dec 12, 2024
•
6
min read
Threat Research
🇪🇺 Europe
🌎 North America
Oyster
IOC Pivoting
Vanilla Tempest
Threat Research

Learn how the 'Million OK!!!' HTTP response previously linked to Kimsuky has reappeared on new IPs and domains. This update provides the latest insights into evolving infrastructure, helping defenders stay informed on potential North Korean threat activity.
Dec 10, 2024
•
6
min read
Threat Research
🇰🇷 South Korea
Beacon Reuse
Kimsuky
Threat Research

Discover how the MoqHao campaign leveraging iCloud and VK employs cross-platform tactics to steal credentials and distribute malicious APKs.
Dec 5, 2024
•
7
min read
Threat Research
🌏 Asia
MoqHao
Phishing & Social Engineering
Threat Research

Uncover the infrastructure and learn how a unique watermark led to the discovery of Cobalt Strike 4.10 team servers impersonating well-known brands.
Dec 3, 2024
•
8
min read
Threat Research
🌍 Global
Cobalt Strike
Command & Control (C2)
Threat Research

Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
Learn how threat actors leverage open directories to deliver XWorm malware disguised as popular software, providing insight into their tactics.
Nov 28, 2024
•
6
min read
Threat Research
🌍 Global
XWorm
Malware Delivery
Threat Research

Explore how DarkPeony's consistent use of certificates reveals ongoing infrastructure activity, indicating consistent operations across different regions.
Nov 21, 2024
•
7
min read
Threat Research
🌏 Asia
🇪🇺 Europe
DarkPeony
Certificate & TLS Abuse
Threat Research

Discover XenoRAT’s adoption of Excel XLL files and Confuser’s tactical shift from its usual methods, with our insights on adapting to evolving malware techniques.
Nov 19, 2024
•
6
min read
Threat Research
🌍 Global
XenoRAT
Evasion & Obfuscation
DPRK (North Korea)
Threat Research

Sliver C2 and Ligolo-ng join forces in a campaign likely targeting Y Combinator, revealing tactics and infrastructure aimed at the accelerator's network. Learn more.
Nov 12, 2024
•
7
min read
Threat Research
🌎 North America
Sliver
Ligolo-ng
Command & Control (C2)
Threat Research

Discover how a shared Font Awesome kit on Cloudflare platforms exposes over 60,000 phishing links targeting Microsoft, DHL, and more. Learn more.
Nov 7, 2024
•
7
min read
Threat Research
Threat Research

RunningRAT has shifted from access-driven tactics to crypto mining, using open directories to stage payloads and reduce direct C2 traffic.
Nov 5, 2024
•
9
min read
Threat Research
🌍 Global
RunningRAT
XMRig
Botnet Activity, Cryptomining
Threat Research

Discover an open directory of red team tools fit for Halloween, from Cobalt Strike to BrowserGhost.
Oct 31, 2024
•
7
min read
Threat Research
Cobalt Strike
BrowserGhost
Tool & Infrastructure Exposure
Threat Research

Explore a suspected North Korean-linked phishing campaign targeting Naver and how unknown actors use distinct TLS certificates to spoof Apple domains.
Oct 29, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
Phishing & Social Engineering
DPRK (North Korea)
Threat Research

Discover how an open directory of Rekoobe malware samples led to different domains resembling trading platforms, posing risks for traders and investors.
Oct 24, 2024
•
6
min read
Threat Research
🌍 Global
Rekoobe
Malware Delivery
Threat Research

Get an inside look at Warmcookie’s updated C2 infrastructure linked to its latest update. We reveal insights into newly identified servers that can assist defenders in identifying related servers.
Oct 17, 2024
•
6
min read
Threat Research
WarmCookie
Command & Control (C2)
Threat Research

Introducing Code Search on AttackCapture: Uncover Exploit Code, Reverse Shells, C2 Configs, and More
Read how CodeSearch helps security professionals to identify exploit code, reverse shells, and C2 configs across open directories, enhancing threat detection.
Oct 15, 2024
•
7
min read
Threat Research
Threat Research

Learn how basic tracking techniques using unusual certificates and redirects helped uncover Earth Baxia and a hidden cyber threat, providing practical insights for network defense.
Oct 10, 2024
•
8
min read
Threat Research
🌏 Asia
PlugX
Tool & Infrastructure Exposure
Earth Baxia
Threat Research

Explore our in-depth analysis of a cybercriminal’s server, revealing DDoS tools, SpyNote spyware, phishing sites, and ransomware tactics.
Oct 8, 2024
•
8
min read
Threat Research
🌍 Global
SpyNote
DDoS Scripts
Tool & Infrastructure Exposure
Product News

We’re excited to release Hunt SQL and to provide the power and flexibility of SQL to researchers, analysts and threat hunters alike.
Oct 3, 2024
•
1
min read
Product News
Threat Research

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection | Hunt.io
Oct 1, 2024
•
8
min read
Threat Research
Packed Python Script
Evasion & Obfuscation
Threat Research

Check out our new blog post on exposed files found in an open directory that reveal an attack with overlapping TTPs linked to the Stargazers network.
Sep 24, 2024
•
12
min read
Threat Research
Initial Access & Exploitation
Product News

Today Hunt is announcing our IP Enrichment API. You can get detailed data on every IPv4 Address and enrich any existing system.
Sep 17, 2024
•
1
min read
Product News
Threat Research

Compromising a browser can be a goldmine for attackers, offering extensive access to sensitive user data ...
Sep 10, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
Malicious Extension
Phishing & Social Engineering
Kimsuky
Threat Research

The ToneShell backdoor, frequently associated with Mustang Panda (also known as Stately Taurus and Earth Preta...
Sep 3, 2024
•
10
min read
Threat Research
🌍 Global
ToneShell
Phishing & Social Engineering
Mustang Panda
Threat Research

During a recent analysis of known Latrodectus infrastructure, our research team encountered a command-and-control...
Aug 29, 2024
•
7
min read
Threat Research
🇰🇷 South Korea
Latrodectus
Fake Installer
Malware Delivery
Product News

We originally launched our "Open Directory" feature in Hunt a year ago. The premise behind it was to get into the mind of the attacker by get a backstage view into their attacks. What we learned was that there was a ton of information that could be correlated and indexed. Today, we're reaffirming our commitment to getting into the tooling of attackers by launching AttackCapture™ by Hunt.io.
Aug 23, 2024
•
1
min read
Product News
Threat Research

In late 2023, Hunt Research published a blog post detailing how we uncover emerging and previously unknown Gophish infrastructure.
Aug 13, 2024
•
6
min read
Threat Research
Gophish
Phishing & Social Engineering
Threat Research

During routine research of newly identified open directories, the Hunt Research Team made a startling discovery: a...
Aug 7, 2024
•
7
min read
Threat Research
Tool & Infrastructure Exposure
Threat Research

Discover how macOS malware tricks users into downloading an app disguised as The Unarchiver app. The app contains a binary named “CryptoTrade” designed to steal sensitive user information.
Jul 30, 2024
•
7
min read
Threat Research
🌍 Global
CryptoTrade
Malware Delivery
Threat Research

Oyster backdoor, also known as Broomstick (IBM) and CleanUpLoader (RussianPanda – X), has been linked to...
Jul 23, 2024
•
6
min read
Threat Research
Oyster
IOC Pivoting
Threat Research

The Hunt Research Team recently stumbled upon Search Engine Optimization (SEO) poisoning campaigns posing as ...
Jul 16, 2024
•
7
min read
Threat Research
🌍 Global
Poseidon
Gh0st RAT
Malware Delivery
Threat Research

Reports on new malware families often leave subtle clues that lead researchers to uncover additional infrastructure not...
Jul 11, 2024
•
5
min read
Threat Research
🇪🇺 Europe
🌏 Asia
SpiceRAT
Malware Delivery
Threat Research

Nearly three years after ProxyLogon and ProxyShell wreaked widespread havoc on Microsoft Exchange servers, the Hunt
Jul 2, 2024
•
9
min read
Threat Research
🌏 Asia
🇪🇺 Europe
🌎 South America
Initial Access & Exploitation
Threat Research

The red-teaming tool Cobalt Strike has long been a staple for simulating attacks, predominantly targeting Windows ...
Jun 27, 2024
•
10
min read
Threat Research
🌍 Global
Geacon
Command & Control (C2)
Chinese APT
Threat Research

XenoRAT, an open-source malware available on GitHub, has been linked to a North Korean hacking group and unnamed...
Jun 25, 2024
•
8
min read
Threat Research
🌍 Global
XenoRAT
DPRK (North Korea)
Threat Research

In hidden corners of the Internet, open directories often serve as treasure troves, offering a glimpse into the unguarded...
Jun 20, 2024
•
6
min read
Threat Research
SpyNote
Malware Delivery
Threat Research

The Hunt Research Team recently identified an exposed web server used to target the Taiwanese Freeway Bureau and a...
Jun 18, 2024
•
7
min read
Threat Research
🌏 Asia
Tool & Infrastructure Exposure
Chinese APT
Threat Research

Gh0st and Pantegana remote access tools/trojans (RATs) may seem unlikely to be discussed, but both have made notable...
Jun 12, 2024
•
7
min read
Threat Research
🌍 Global
Gh0st RAT
Pantegana RAT
Malware Delivery
DriftingCloud
Threat Research

In this post, we'll detail the infrastructure of the LightSpy spyware framework and highlight the unique TLS certificate...
Jun 6, 2024
•
7
min read
Threat Research
🌏 Asia
LightSpy
Certificate & TLS Abuse
Threat Research

The threat actor(s) built and controlled at least one of the binaries on the same server, granting us access to numerous..
Jun 5, 2024
•
9
min read
Threat Research
PlugX
Tool & Infrastructure Exposure
Chinese APT
Threat Research

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.
May 30, 2024
•
7
min read
Threat Research
🌎 North America
🇪🇺 Europe
SolarMarker
Malware Delivery
Multi-Stage Infection
Threat Research

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.
May 28, 2024
•
5
min read
Threat Research
Yakit
Threat Research

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.
May 21, 2024
•
5
min read
Threat Research
Threat Research

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...
May 8, 2024
•
7
min read
Threat Research
Threat Research

The Hunt Research Team vigilantly monitors GitHub, sifts through the IOC sections of threat intelligence reports, and scours various online forums for emerging threats, ensuring our detections stay practical and current for our customers. Our focus frequently turns to lesser-known threats that can still wreak havoc on the networks of uninformed defenders.
Apr 23, 2024
•
5
min read
Threat Research
SparkRAT
Lateral Movement & Persistence
Threat Research

Hunt scans every corner of the public IPV4 space and constantly scours the Internet for open directories. Through...
Apr 16, 2024
•
5
min read
Threat Research
SuperShell
Cobalt Strike
Tool & Infrastructure Exposure
Threat Research

Platforms like GitHub offer a valuable resource for developers and the open-source community. However, these sites also create a potential...
Apr 9, 2024
•
6
min read
Threat Research
BlueShell
Malware Delivery
Threat Research

If you’re like me, you’ve likely read multiple reports on network intrusions involving a “standard” deployment...
Apr 2, 2024
•
7
min read
Threat Research
RedGuard
Command & Control (C2)
Threat Research

Open directories can sometimes contain unexpected dangers in the hidden parts of the internet. Our recent investigation...
Mar 28, 2024
•
7
min read
Threat Research
Mozi
XMRig
Botnet Activity, Cryptomining
Threat Research

While open directories are often seen as a goldmine for security researchers and blue teams searching for malware...
Mar 21, 2024
•
5
min read
Threat Research
Mimikatz
Tool & Infrastructure Exposure
Threat Research

The W3LL Phishing Kit, a phishing-as-a-service (PAaS) tool, was identified by Group-IB in 2022. What makes the kit...
Mar 19, 2024
•
4
min read
Threat Research
🌍 Global
W3LL
Phishing & Social Engineering
Threat Research

Described on its GitHub README as an "Integrated lightweight cross-platform penetration system," PrismX goe...
Mar 12, 2024
•
5
min read
Threat Research
PrismX
Reconnaissance & Scanning
Threat Research

Over the past month, Hunt has tracked an ongoing phishing campaign by a likely North Korean threat actor focused on...
Mar 5, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
🌍 Global
Phishing & Social Engineering
DPRK (North Korea)
Threat Research

Hunt is tracking an ongoing sophisticated phishing campaign targeting individuals in the Telegram groups focused on...
Feb 28, 2024
•
7
min read
Threat Research
🌍 Global
Pyramid
NK Dropper
Phishing & Social Engineering
DPRK (North Korea)
Threat Research

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...
Feb 14, 2024
•
3
min read
Threat Research
Threat Research

This post will examine ShadowPad infrastructure linked to a yet-to-be-identified threat actor. What makes this activity...
Feb 9, 2024
•
8
min read
Threat Research
🌏 Asia
ShadowPad
Certificate & TLS Abuse
Threat Research

Where national interests, strategic ambitions, and sometimes personal gain intertwine, state-linked cyber threat actors...
Feb 6, 2024
•
7
min read
Threat Research
Threat Research

This post will serve as the first in a long series of articles on using the platform to identify malicious infrastructure and hunt...
Feb 1, 2024
•
4
min read
Threat Research
Threat Research

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...
Jan 30, 2024
•
3
min read
Threat Research
Threat Research

ShadowPad, Quasar RAT, HeadLace, Emotet, and SIGNBT (to name a few) often grab headlines and captivate readers...
Jan 24, 2024
•
5
min read
Threat Research
Product News

It’s been a while since we announced a new feature, and with 2024 already in full swing, it is time to highlight what’s...
Jan 15, 2024
•
8
min read
Product News
Product News

As the end of the year approaches, we continue to enhance our feature set by building on well-established threat-...
Nov 14, 2023
•
3
min read
Product News
Threat Research

Attackers constantly devise new and sophisticated methods of delivering malware to infiltrate systems and exfiltrate...
Oct 31, 2023
•
4
min read
Threat Research
Malware Delivery
Threat Research

The term “threat hunting” is generally associated with detecting malicious behavior on endpoints manually...
Oct 25, 2023
•
4
min read
Threat Research
Threat Research

Phishing is more than a social engineering technique; it's a harrowing threat landscape where deception, innovation, and vigilance collide.
Oct 12, 2023
•
5
min read
Threat Research
Threat Research

In the ever-evolving world of cybersecurity, few individuals embody the spirit of innovation and exploration as profoundly as John Althouse.
Sep 28, 2023
•
10
min read
Threat Research
Threat Research

Learn about the Hunt.io massive observation collection platform.
Sep 19, 2023
•
3
min read
Threat Research
Threat Research

Michael showcases how the Hunt platform can be leveraged to proactively identify infrastructure not yet publicly reported on from recent malware campaigns.
Sep 12, 2023
•
5
min read
Threat Research
Threat Research

How Open Directories Help with Threat Hunting and Incident Response.
Aug 17, 2023
•
4
min read
Threat Research
Threat Research

We are excited to unveil Hunt.io, a cutting-edge threat hunting solution that is set to transform the landscape of cybersecurity.
Aug 1, 2023
•
5
min read
Threat Research
Threat Research

Our research team identified over 17,500 internet-exposed OpenClaw, Clawdbot, and Moltbot instances vulnerable to CVE-2026-25253. This report documents detection methods and infrastructure analysis using Hunt.io.
Feb 3, 2026
•
19
min read
Threat Research
Threat Research

Analysis of an exposed BYOB command-and-control server revealing droppers, stagers, payloads, persistence mechanisms, and supporting infrastructure uncovered through proactive threat hunting
Jan 28, 2026
•
26
min read
Threat Research
BYOB
Command & Control (C2)
Threat Research

An in-depth analysis of a ClickFix phishing campaign hijacking Facebook sessions at scale. Learn how attackers abuse verification workflows, steal session cookies, bypass MFA, and target creators using cloud-hosted infrastructure.
Jan 21, 2026
•
27
min read
Threat Research
Threat Research

Discover how we mapped over 18,000 active malware C2 servers across Chinese ISPs and cloud providers using host-centric telemetry. See which providers are most frequently abused and what it means for global threat monitoring.
Jan 14, 2026
•
15
min read
Threat Research
Threat Research

See how automated detection, certificate analysis, and structured queries map Cobalt Strike C2 clusters and expose long-running infrastructure. Learn more.
Jan 6, 2026
•
13
min read
Threat Research
Threat Research

A look back at Hunt.io’s 2025 product releases, platform scale, and the threat research our community engaged with most throughout the year.
Dec 23, 2025
•
6
min read
Threat Research
Product News

Hunt 2.8 brings major improvements across IOC Hunter, AttackCapture™, IP search, and more accurate Reputation & Risk signals for domains and IPs.
Dec 18, 2025
•
4
min read
Product News
Threat Research

Deep investigation into DPRK activity, revealing new Lazarus and Kimsuky infrastructure through multi-stage hunts and exposed operational patterns.
Dec 17, 2025
•
19
min read
Threat Research
Backdoor Installer
FRP/Rakshasa
Command & Control (C2)
Threat Research

A detailed analysis of how React2Shell (CVE-2025-55182) was used to launch a multi-stage attack against a production Next.js app, exposing Node.js systems to real-world exploitation techniques and operational C2 infrastructure.
Dec 10, 2025
•
32
min read
Threat Research
Threat Research

A fake VSCode extension triggered a multi-stage attack deploying the Anivia loader and OctoRAT. Learn how the chain worked and where defenders can detect it. Learn more.
Dec 3, 2025
•
21
min read
Threat Research
Threat Research

Turn Part 1’s clues into action with 10+ HuntSQL™ recipes. Pivot on cert reuse, beacon traits, and enrichment to expose Cobalt Strike clusters. Learn more.
Nov 19, 2025
•
23
min read
Threat Research
Threat Research

Learn how to detect Cobalt Strike in open directories using AttackCapture™. We analyzed real files, SSL certificates, and servers to uncover live C2 infrastructure.
Nov 13, 2025
•
24
min read
Threat Research
Product News

Hunt 2.7 delivers faster C2 listings, new hostname and TLD search options, multi-value filtering, and IOC Hunter threat actor visibility on IP and domain searches. Explore what’s new in the latest release.
Nov 6, 2025
•
4
min read
Product News
Threat Research

Hunt.io maps phishing campaigns using shared ZIP payload infrastructure targeting financial institutions and government organizations across Asia. Learn more.
Oct 29, 2025
•
21
min read
Threat Research
Threat Research

In this interview, Joseph Harrison shares how his Air Force-minted discipline fuels his work in threat detection and digital forensics, and how he leverages Hunt.io’s data (especially JA4) to catch adversaries others miss.
Oct 23, 2025
•
15
min read
Threat Research
Product News

Hunt 2.6 launches with IP Risk & Reputation, SQL download via API, integration upgrades, enhanced IP search, and much more. Keep reading.
Oct 20, 2025
•
4
min read
Product News
Threat Research

A large-scale macOS malware campaign mimics trusted dev tools to spread Odyssey Stealer and AMOS via fake Homebrew sites. Learn more.
Oct 16, 2025
•
17
min read
Threat Research
🇪🇺 Europe
🌎 North America
Odyssey Stealer
AMOS Spyware
Malware Delivery
Odyssey
AMOS
Threat Research

A deep dive into AdaptixC2: modular architecture, multi-protocol communication, evasion tactics, IOCs, and defense strategies.
Oct 9, 2025
•
17
min read
Threat Research
🌏 Asia
AdaptixC2
Command & Control (C2)
AdaptixC2
Threat Research

SideWinder’s Operation SouthNet: South Asia phishing on Netlify/pages.dev, Zimbra/Outlook lures, and open directories. Maritime focus. IOCs included. Learn more.
Oct 1, 2025
•
20
min read
Threat Research
🌏 Asia
SideWinder
Phishing & Social Engineering
APT Sidewinder
Threat Research

Beginner’s guide to hunting exposed C2 dashboards like Supershell, HookBot, Chaos, Unam, Mythic, and Metasploit using paths, titles, and hashes
Sep 25, 2025
•
16
min read
Threat Research
🌍 Global
Command & Control (C2)
Threat Research

Research on AsyncRAT campaigns using trojanized ScreenConnect installers and open directories, exposing resilient attacker infrastructure and C2 tactics. Learn more.
Sep 18, 2025
•
24
min read
Threat Research
🌍 Global
AsyncRAT
Command & Control (C2)
Threat Research

Hunt.io uncovers the 2025 Energy Phishing Wave, with Chevron, Conoco, PBF, and Phillips 66 targeted by large-scale cloning and brand abuse. Learn more.
Sep 11, 2025
•
29
min read
Threat Research
🌎 North America
MaaS
Phishing & Social Engineering
Threat Research

Daniel Plohmann discusses building Malpedia, advancing malware research with MCRIT, and how metalcore and music inspire his work beyond security.
Sep 9, 2025
•
13
min read
Threat Research
Threat Research

Investigation into TinyLoader malware stealing cryptocurrency via Redline Stealer, USB spread, and C2 infrastructure.
Sep 2, 2025
•
13
min read
Threat Research
🌍 Global
TinyLoader
RedLine Stealer
Malware Delivery
Product News

Hunt 2.5 introduces IP pivots, faster HuntSQL queries, a full-screen app view, and a refreshed IP database. Explore the latest improvements.
Aug 21, 2025
•
4
min read
Product News
Threat Research

Hunt.io uncovers MuddyWater phishing campaigns using Firebase lures, VBS payloads, and NetBird for persistent remote access. Learn more.
Aug 20, 2025
•
16
min read
Threat Research
🌍 Middle East
PowGoop
MuddyWater RAT
Malware Delivery
MuddyWater
Threat Research

Hunt.io uncovers the complete ERMAC V3.0 source code, revealing its infrastructure, vulnerabilities, and expanded form injection capabilities.
Aug 14, 2025
•
16
min read
Threat Research
🌍 Global
ERMAC v3
Malware Delivery
Threat Research

APT Sidewinder targets South Asian government and military portals using Netlify-hosted phishing pages to harvest credentials. Learn more.
Aug 8, 2025
•
21
min read
Threat Research
🌏 Asia
Phishing & Social Engineering
APT Sidewinder
Threat Research

APT36 expands its campaign beyond defense, using phishing, .desktop lures, and the Poseidon backdoor to target Indian infrastructure.
Jul 31, 2025
•
13
min read
Threat Research
🇮🇳 India
Poseidon
Malware Delivery
APT36
Threat Research

Phishing campaign targets macOS with fake prompts that run AppleScript via terminal, stealing wallets, cookies, and sensitive files.
Jul 22, 2025
•
17
min read
Threat Research
🇮🇳 India
🌏 Asia
Phishing & Social Engineering
Malware Delivery
APT36
Threat Research

Over 630K hijacked gov.br subdomains were exploited in a black hat SEO campaign using cloaking, keyword stuffing, and redirect techniques. Learn more.
Jul 17, 2025
•
13
min read
Threat Research
🌎 South America
Poseidon
GhostRAT
Product News

Hunt 2.4 adds archive-aware search, deeper SQL visibility, and improved phishing intel to make threat hunting faster, clearer, and more powerful.
Jul 15, 2025
•
4
min read
Product News
Threat Research

Splunk’s Jose Hernandez talks building detections, curious hires, Hunt.io in action, and balancing threat research with chickens and family life.
Jul 8, 2025
•
17
min read
Threat Research
Threat Research

Explore 10.6B structured URLs with URLx. Find malware payloads, C2 paths, phishing campaigns, and exposed assets, fast.
Jun 26, 2025
•
16
min read
Threat Research
Product News

Hunt 2.3 is here: analyst-driven insights, easier pivots, better phishing workflows, and full SSO support for enterprise teams.
Jun 25, 2025
•
5
min read
Product News
Threat Research

Our threat hunters uncovered a PowerShell loader hosted by Chinese and Russian providers, linked to active Cobalt Strike infrastructure.
Jun 19, 2025
•
12
min read
Threat Research
🌍 Global
Cobalt Strike
Malware Delivery
Threat Research

TrustedSec CTO Justin Elze shares red teaming insights, offensive tooling tips, and how he uses Hunt.io and AttackCapture™, plus his passion for race car data.
Jun 17, 2025
•
11
min read
Threat Research
Product News

Explore Hunt 2.2: Auto-unpack zips in AttackCapture™, smarter SQL with WHOIS and Nmap, and full IP history consolidation, track abused hosting with Host Radar, and more.
Jun 12, 2025
•
5
min read
Product News
Threat Research

See how attackers abuse paste.ee to deliver XWorm and AsyncRAT, using obfuscated scripts and globally distributed C2 infrastructure.
Jun 5, 2025
•
10
min read
Threat Research
🌍 Global
AsyncRAT
XWorm
Malware Delivery
Threat Research

Track attacker infrastructure with Hunt.io’s real-time IOC pivoting and threat actor intelligence. Learn more.
May 29, 2025
•
8
min read
Threat Research
🌍 Global
IOC Pivoting
Product News

Discover the new Hunt.io updates: deep text assisted analysis, IOC feed improvements, improved threat actor data, and faster advanced search. Learn more.
May 21, 2025
•
7
min read
Product News
Threat Research

Shared SSH Keys Expose Coordinated Phishing Campaign Targeting Kuwaiti Fisheries and Telecom Sectors
Shared SSH keys expose coordinated phishing targeting Kuwaiti fisheries, telecoms, and insurers with cloned login portals and mobile payment lures. Learn more.
May 15, 2025
•
7
min read
Threat Research
🌍 Middle East
Phishing & Social Engineering
Threat Research

This post explores open-source proxy tools commonly used in attacker and red team infrastructure, and shows how defenders can detect IOX, FRP, Rakshasa, and Stowaway at scale using Hunt.io.
May 8, 2025
•
8
min read
Threat Research
🌏 Asia
FRP/Rakshasa
Command & Control (C2)
Threat Research

APT36-style phishing campaign mimics India’s Ministry of Defence to drop malware on Windows and Linux via spoofed press releases and HTA payloads.
May 5, 2025
•
8
min read
Threat Research
🇮🇳 India
Phishing & Social Engineering
APT36
Threat Research

APT34-like infrastructure mimicking an Iraqi academic institute and fake UK tech firms reveals early-stage staging on M247 servers. Learn what to track
Apr 22, 2025
•
9
min read
Threat Research
🌍 Middle East
Karkoff
SideTwist
PowBAT
Command & Control (C2)
APT34
Threat Research

Briefly exposed KeyPlug infrastructure revealed Fortinet exploits, encrypted webshells, and recon scripts targeting Shiseido, a major Japanese enterprise. Learn more..
Apr 17, 2025
•
12
min read
Threat Research
🌍 Global
KEYPLUG
Tool & Infrastructure Exposure
Chinese APT
Threat Research

Phishing campaign evades detection with server-side logic. See how employee portals are targeted—and how defenders can uncover them. Learn more.
Apr 15, 2025
•
10
min read
Threat Research
🌍 Global
Pterodo
ShadowPad
Phishing & Social Engineering
Gamaredon
ShadowPad ecosystem
Threat Research

Explore how the GoPhish framework was leveraged to stage infrastructure and domains spoofing Polish government and energy entities.
Apr 10, 2025
•
7
min read
Threat Research
🇪🇺 Europe
Gopish
Phishing & Social Engineering
Threat Research

Explore Gamaredon’s flux-like DNS and ShadowPad malware infrastructure, with insights into how these attacker networks are configured, rotated, and maintained.
Apr 8, 2025
•
11
min read
Threat Research
🇪🇺 Europe
🌏 Asia
ShadowPad
Command & Control (C2)
Threat Research

Learn how Hunt.io identifies early-stage ClickFix delivery pages across the web using advanced search capabilities to stay ahead of exploitation attempts.
Apr 3, 2025
•
9
min read
Threat Research
🌏 Asia
ClickFix
Phishing & Social Engineering
APT36
Threat Research

Learn how a Russian-speaking threat actor has evolved from impersonating EFF to now deploying Cloudflare-themed phishing with Telegram-based C2.
Apr 1, 2025
•
9
min read
Threat Research
🌍 Global
Product News

Explore exposed infrastructure with URLx: 10.6B+ URLs, HTTPx integration, and advanced filtering - now live in Hunt.io.
Mar 27, 2025
•
3
min read
Product News
Threat Research

Learn how to track and map adversary infrastructure using Hunt, pivoting from a single IP to uncover hidden connections through infrastructure overlaps and key intelligence indicators.
Mar 25, 2025
•
11
min read
Threat Research
🌍 Global
Malware Delivery
Product News

Track threat actors and malicious infrastructure with Hunt.io’s IOC Hunter Feed and C2 Attribution. Get deeper visibility and context for better threat intelligence.
Mar 20, 2025
•
7
min read
Product News
Threat Research

Discover how threat actors used a Rust loader to deploy Cobalt Strike ‘Cat’ against South Korean targets. Learn more.
Mar 18, 2025
•
8
min read
Threat Research
🇰🇷 South Korea
Cobalt Strike
Malware Delivery
DPRK (North Korea)
Threat Research

Discover how threat actors deploy a rebranded File Browser alongside JSPSpy for stealth file management on compromised servers.
Mar 11, 2025
•
6
min read
Threat Research
JSPSpy
FileBrowser
Malware Delivery
Lazarus Group
Product News

Our latest release delivers deeper threat analysis with improved threat actor, C2, malware data, and new integrations for robust cyber intelligence.
Mar 6, 2025
•
6
min read
Product News
Threat Research

Discover how an open directory exposed a threat actor impersonating EFF to target gamers and how we mapped their infrastructure to Stealc & Pyramid C2.
Mar 4, 2025
•
12
min read
Threat Research
🌍 Global
Stealc
Pyramid
Phishing & Social Engineering
Malware Delivery
Russian APT
Threat Research

Discover Joker malware infrastructure with Hunt SSL History, mapping its C2 network through certificate tracking of recent and past activity.
Feb 27, 2025
•
11
min read
Threat Research
🌍 Global
Joker
Certificate & TLS Abuse
Threat Research

A new LightSpy server expands its attack scope, targeting Facebook and Instagram database files. Explore its evolving capabilities and infrastructure.
Feb 20, 2025
•
11
min read
Threat Research
🌏 Asia
LightSpy
Data Theft & Exfiltration
Chinese APT
Threat Research

Read how attackers distribute backdoored Signal, Line, and Gmail installers through fraudulent download pages and how to defend against this campaign.
Feb 18, 2025
•
7
min read
Threat Research
🇨🇳 China
Backdoor Installer
Malware Delivery
Product News

Advanced Threat Hunting with New SSL Features: Unlocking HuntSQL™ Anomaly Flags for Deeper Detection
Hunt.io enhances SSL threat hunting with new anomaly flags in HuntSQL™, improving the detection of misconfigurations, expired certificates, and malware infrastructure.
Feb 13, 2025
•
7
min read
Product News
Threat Research

Discover how Pyramid, an open-source tool, enables post-exploitation. Learn detection methods using HTTP headers and recent findings in Hunt.
Feb 12, 2025
•
6
min read
Threat Research
Pyramid
Reconnaissance & Scanning
Threat Research

Attackers used open directories to spread SmokeLoader malware, luring Ukraine’s auto and banking sectors. Explore findings, execution, and tactics.
Feb 6, 2025
•
7
min read
Threat Research
🇪🇺 Europe
SmokeLoader
Threat Research

GreenSpot APT targets 163.com users via fake download pages and domain spoofing. Learn their tactics, risks, and how to protect your email accounts.
Feb 4, 2025
•
6
min read
Threat Research
🌏 Asia
Phishing & Social Engineering
GreenSpot APT
Threat Research

Explore how SSL intelligence and SSL history empower proactive threat hunting. Learn tools, real-world examples, and strategies to track cyber threats.
Jan 30, 2025
•
9
min read
Threat Research
Threat Research

Explore SparkRAT detection tactics, macOS targeting, and insights into recent DPRK-linked campaigns with actionable research findings.
Jan 28, 2025
•
9
min read
Threat Research
🌏 Asia
SparkRAT
Command & Control (C2)
DPRK (North Korea)
Threat Research

Uncover how Hunt’s TLS records reveal patterns in suspected KEYPLUG infrastructure, linking GhostWolf and RedGolf/APT41 to ongoing activity.
Jan 23, 2025
•
15
min read
Threat Research
🌏 Asia
KEYPLUG
Certificate & TLS Abuse
APT41
GhostWolf
Threat Research

Uncover a deceptive VS Code extension, masquerading as Zoom, that pilfers your Google Chrome cookies. Join us as we expose the techniques behind this alarming supply chain campaign.
Jan 21, 2025
•
8
min read
Threat Research
🌍 Global
Malicious Extension
Malware Delivery
Threat Research

Learn how a landing page mimicking “JustJoin,” tied to suspected DPRK cyber activity, has reappeared with new infrastructure linked through SSH key overlaps.
Jan 14, 2025
•
5
min read
Threat Research
🇰🇷 South Korea
Credential Reuse
DPRK (North Korea)
Threat Research

Read more about connections through a TLS certificate linking reported and unreported infrastructure tied to the Cyberhaven extension compromise.
Jan 9, 2025
•
7
min read
Threat Research
🌍 Global
Malicious Extension
Certificate & TLS Abuse
Threat Research

Learn how a Cobalt Strike server with a TLS certificate and prominent watermark showed a Golang-compiled beacon communicating with Visual Studio Code tunnels.
Jan 7, 2025
•
9
min read
Threat Research
🌍 Global
Cobalt Strike
Command & Control (C2)
Product News

Discover Hunt.io's 2024 highlights: major product launches, innovations like AttackCapture™, C2 Feed, and Hunt SQL, and a look ahead to 2025.
Dec 20, 2024
•
7
min read
Product News
Threat Research

Our latest analysis uncovers domains linked to the Oyster backdoor, revealing suspected Vanilla Tempest infrastructure and offering insights into server configuration patterns.
Dec 12, 2024
•
6
min read
Threat Research
🇪🇺 Europe
🌎 North America
Oyster
IOC Pivoting
Vanilla Tempest
Threat Research

Learn how the 'Million OK!!!' HTTP response previously linked to Kimsuky has reappeared on new IPs and domains. This update provides the latest insights into evolving infrastructure, helping defenders stay informed on potential North Korean threat activity.
Dec 10, 2024
•
6
min read
Threat Research
🇰🇷 South Korea
Beacon Reuse
Kimsuky
Threat Research

Discover how the MoqHao campaign leveraging iCloud and VK employs cross-platform tactics to steal credentials and distribute malicious APKs.
Dec 5, 2024
•
7
min read
Threat Research
🌏 Asia
MoqHao
Phishing & Social Engineering
Threat Research

Uncover the infrastructure and learn how a unique watermark led to the discovery of Cobalt Strike 4.10 team servers impersonating well-known brands.
Dec 3, 2024
•
8
min read
Threat Research
🌍 Global
Cobalt Strike
Command & Control (C2)
Threat Research

Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
Learn how threat actors leverage open directories to deliver XWorm malware disguised as popular software, providing insight into their tactics.
Nov 28, 2024
•
6
min read
Threat Research
🌍 Global
XWorm
Malware Delivery
Threat Research

Explore how DarkPeony's consistent use of certificates reveals ongoing infrastructure activity, indicating consistent operations across different regions.
Nov 21, 2024
•
7
min read
Threat Research
🌏 Asia
🇪🇺 Europe
DarkPeony
Certificate & TLS Abuse
Threat Research

Discover XenoRAT’s adoption of Excel XLL files and Confuser’s tactical shift from its usual methods, with our insights on adapting to evolving malware techniques.
Nov 19, 2024
•
6
min read
Threat Research
🌍 Global
XenoRAT
Evasion & Obfuscation
DPRK (North Korea)
Threat Research

Sliver C2 and Ligolo-ng join forces in a campaign likely targeting Y Combinator, revealing tactics and infrastructure aimed at the accelerator's network. Learn more.
Nov 12, 2024
•
7
min read
Threat Research
🌎 North America
Sliver
Ligolo-ng
Command & Control (C2)
Threat Research

Discover how a shared Font Awesome kit on Cloudflare platforms exposes over 60,000 phishing links targeting Microsoft, DHL, and more. Learn more.
Nov 7, 2024
•
7
min read
Threat Research
Threat Research

RunningRAT has shifted from access-driven tactics to crypto mining, using open directories to stage payloads and reduce direct C2 traffic.
Nov 5, 2024
•
9
min read
Threat Research
🌍 Global
RunningRAT
XMRig
Botnet Activity, Cryptomining
Threat Research

Discover an open directory of red team tools fit for Halloween, from Cobalt Strike to BrowserGhost.
Oct 31, 2024
•
7
min read
Threat Research
Cobalt Strike
BrowserGhost
Tool & Infrastructure Exposure
Threat Research

Explore a suspected North Korean-linked phishing campaign targeting Naver and how unknown actors use distinct TLS certificates to spoof Apple domains.
Oct 29, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
Phishing & Social Engineering
DPRK (North Korea)
Threat Research

Discover how an open directory of Rekoobe malware samples led to different domains resembling trading platforms, posing risks for traders and investors.
Oct 24, 2024
•
6
min read
Threat Research
🌍 Global
Rekoobe
Malware Delivery
Threat Research

Get an inside look at Warmcookie’s updated C2 infrastructure linked to its latest update. We reveal insights into newly identified servers that can assist defenders in identifying related servers.
Oct 17, 2024
•
6
min read
Threat Research
WarmCookie
Command & Control (C2)
Threat Research

Introducing Code Search on AttackCapture: Uncover Exploit Code, Reverse Shells, C2 Configs, and More
Read how CodeSearch helps security professionals to identify exploit code, reverse shells, and C2 configs across open directories, enhancing threat detection.
Oct 15, 2024
•
7
min read
Threat Research
Threat Research

Learn how basic tracking techniques using unusual certificates and redirects helped uncover Earth Baxia and a hidden cyber threat, providing practical insights for network defense.
Oct 10, 2024
•
8
min read
Threat Research
🌏 Asia
PlugX
Tool & Infrastructure Exposure
Earth Baxia
Threat Research

Explore our in-depth analysis of a cybercriminal’s server, revealing DDoS tools, SpyNote spyware, phishing sites, and ransomware tactics.
Oct 8, 2024
•
8
min read
Threat Research
🌍 Global
SpyNote
DDoS Scripts
Tool & Infrastructure Exposure
Product News

We’re excited to release Hunt SQL and to provide the power and flexibility of SQL to researchers, analysts and threat hunters alike.
Oct 3, 2024
•
1
min read
Product News
Threat Research

Unboxing the Threat: How Malicious Python Scripts Use the BoxedApp SDK to Evade Detection | Hunt.io
Oct 1, 2024
•
8
min read
Threat Research
Packed Python Script
Evasion & Obfuscation
Threat Research

Check out our new blog post on exposed files found in an open directory that reveal an attack with overlapping TTPs linked to the Stargazers network.
Sep 24, 2024
•
12
min read
Threat Research
Initial Access & Exploitation
Product News

Today Hunt is announcing our IP Enrichment API. You can get detailed data on every IPv4 Address and enrich any existing system.
Sep 17, 2024
•
1
min read
Product News
Threat Research

Compromising a browser can be a goldmine for attackers, offering extensive access to sensitive user data ...
Sep 10, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
Malicious Extension
Phishing & Social Engineering
Kimsuky
Threat Research

The ToneShell backdoor, frequently associated with Mustang Panda (also known as Stately Taurus and Earth Preta...
Sep 3, 2024
•
10
min read
Threat Research
🌍 Global
ToneShell
Phishing & Social Engineering
Mustang Panda
Threat Research

During a recent analysis of known Latrodectus infrastructure, our research team encountered a command-and-control...
Aug 29, 2024
•
7
min read
Threat Research
🇰🇷 South Korea
Latrodectus
Fake Installer
Malware Delivery
Product News

We originally launched our "Open Directory" feature in Hunt a year ago. The premise behind it was to get into the mind of the attacker by get a backstage view into their attacks. What we learned was that there was a ton of information that could be correlated and indexed. Today, we're reaffirming our commitment to getting into the tooling of attackers by launching AttackCapture™ by Hunt.io.
Aug 23, 2024
•
1
min read
Product News
Threat Research

In late 2023, Hunt Research published a blog post detailing how we uncover emerging and previously unknown Gophish infrastructure.
Aug 13, 2024
•
6
min read
Threat Research
Gophish
Phishing & Social Engineering
Threat Research

During routine research of newly identified open directories, the Hunt Research Team made a startling discovery: a...
Aug 7, 2024
•
7
min read
Threat Research
Tool & Infrastructure Exposure
Threat Research

Discover how macOS malware tricks users into downloading an app disguised as The Unarchiver app. The app contains a binary named “CryptoTrade” designed to steal sensitive user information.
Jul 30, 2024
•
7
min read
Threat Research
🌍 Global
CryptoTrade
Malware Delivery
Threat Research

Oyster backdoor, also known as Broomstick (IBM) and CleanUpLoader (RussianPanda – X), has been linked to...
Jul 23, 2024
•
6
min read
Threat Research
Oyster
IOC Pivoting
Threat Research

The Hunt Research Team recently stumbled upon Search Engine Optimization (SEO) poisoning campaigns posing as ...
Jul 16, 2024
•
7
min read
Threat Research
🌍 Global
Poseidon
Gh0st RAT
Malware Delivery
Threat Research

Reports on new malware families often leave subtle clues that lead researchers to uncover additional infrastructure not...
Jul 11, 2024
•
5
min read
Threat Research
🇪🇺 Europe
🌏 Asia
SpiceRAT
Malware Delivery
Threat Research

Nearly three years after ProxyLogon and ProxyShell wreaked widespread havoc on Microsoft Exchange servers, the Hunt
Jul 2, 2024
•
9
min read
Threat Research
🌏 Asia
🇪🇺 Europe
🌎 South America
Initial Access & Exploitation
Threat Research

The red-teaming tool Cobalt Strike has long been a staple for simulating attacks, predominantly targeting Windows ...
Jun 27, 2024
•
10
min read
Threat Research
🌍 Global
Geacon
Command & Control (C2)
Chinese APT
Threat Research

XenoRAT, an open-source malware available on GitHub, has been linked to a North Korean hacking group and unnamed...
Jun 25, 2024
•
8
min read
Threat Research
🌍 Global
XenoRAT
DPRK (North Korea)
Threat Research

In hidden corners of the Internet, open directories often serve as treasure troves, offering a glimpse into the unguarded...
Jun 20, 2024
•
6
min read
Threat Research
SpyNote
Malware Delivery
Threat Research

The Hunt Research Team recently identified an exposed web server used to target the Taiwanese Freeway Bureau and a...
Jun 18, 2024
•
7
min read
Threat Research
🌏 Asia
Tool & Infrastructure Exposure
Chinese APT
Threat Research

Gh0st and Pantegana remote access tools/trojans (RATs) may seem unlikely to be discussed, but both have made notable...
Jun 12, 2024
•
7
min read
Threat Research
🌍 Global
Gh0st RAT
Pantegana RAT
Malware Delivery
DriftingCloud
Threat Research

In this post, we'll detail the infrastructure of the LightSpy spyware framework and highlight the unique TLS certificate...
Jun 6, 2024
•
7
min read
Threat Research
🌏 Asia
LightSpy
Certificate & TLS Abuse
Threat Research

The threat actor(s) built and controlled at least one of the binaries on the same server, granting us access to numerous..
Jun 5, 2024
•
9
min read
Threat Research
PlugX
Tool & Infrastructure Exposure
Chinese APT
Threat Research

Following Recorded Future's (RF) report, "Exploring the Depths of SolarMarker's Multi-tiered Infrastructure," the Hunt Research Team leveraged the IOCs provided to discover a method of identifying clusters of SolarMarker servers in the wild.
May 30, 2024
•
7
min read
Threat Research
🌎 North America
🇪🇺 Europe
SolarMarker
Malware Delivery
Multi-Stage Infection
Threat Research

In our previous post on the Viper framework, we briefly covered the Yakit Security tool, which is publicly available on GitHub. In this post, we'll discuss its features and cover additional red team tools co-hosted with the project, as discovered during our internet-wide scans.
May 28, 2024
•
5
min read
Threat Research
Yakit
Threat Research

Suppose you know David Bianco’s “Pyramid of Pain” model. In that case, you know that IP addresses are among the lower indicators of compromise due to their short lifespan and ease of change to legitimate purposes.
May 21, 2024
•
5
min read
Threat Research
Threat Research

From initial access and privilege escalation to lateral movement and data collection, the open-source platform Viper...
May 8, 2024
•
7
min read
Threat Research
Threat Research

The Hunt Research Team vigilantly monitors GitHub, sifts through the IOC sections of threat intelligence reports, and scours various online forums for emerging threats, ensuring our detections stay practical and current for our customers. Our focus frequently turns to lesser-known threats that can still wreak havoc on the networks of uninformed defenders.
Apr 23, 2024
•
5
min read
Threat Research
SparkRAT
Lateral Movement & Persistence
Threat Research

Hunt scans every corner of the public IPV4 space and constantly scours the Internet for open directories. Through...
Apr 16, 2024
•
5
min read
Threat Research
SuperShell
Cobalt Strike
Tool & Infrastructure Exposure
Threat Research

Platforms like GitHub offer a valuable resource for developers and the open-source community. However, these sites also create a potential...
Apr 9, 2024
•
6
min read
Threat Research
BlueShell
Malware Delivery
Threat Research

If you’re like me, you’ve likely read multiple reports on network intrusions involving a “standard” deployment...
Apr 2, 2024
•
7
min read
Threat Research
RedGuard
Command & Control (C2)
Threat Research

Open directories can sometimes contain unexpected dangers in the hidden parts of the internet. Our recent investigation...
Mar 28, 2024
•
7
min read
Threat Research
Mozi
XMRig
Botnet Activity, Cryptomining
Threat Research

While open directories are often seen as a goldmine for security researchers and blue teams searching for malware...
Mar 21, 2024
•
5
min read
Threat Research
Mimikatz
Tool & Infrastructure Exposure
Threat Research

The W3LL Phishing Kit, a phishing-as-a-service (PAaS) tool, was identified by Group-IB in 2022. What makes the kit...
Mar 19, 2024
•
4
min read
Threat Research
🌍 Global
W3LL
Phishing & Social Engineering
Threat Research

Described on its GitHub README as an "Integrated lightweight cross-platform penetration system," PrismX goe...
Mar 12, 2024
•
5
min read
Threat Research
PrismX
Reconnaissance & Scanning
Threat Research

Over the past month, Hunt has tracked an ongoing phishing campaign by a likely North Korean threat actor focused on...
Mar 5, 2024
•
11
min read
Threat Research
🇰🇷 South Korea
🌍 Global
Phishing & Social Engineering
DPRK (North Korea)
Threat Research

Hunt is tracking an ongoing sophisticated phishing campaign targeting individuals in the Telegram groups focused on...
Feb 28, 2024
•
7
min read
Threat Research
🌍 Global
Pyramid
NK Dropper
Phishing & Social Engineering
DPRK (North Korea)
Threat Research

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...
Feb 14, 2024
•
3
min read
Threat Research
Threat Research

This post will examine ShadowPad infrastructure linked to a yet-to-be-identified threat actor. What makes this activity...
Feb 9, 2024
•
8
min read
Threat Research
🌏 Asia
ShadowPad
Certificate & TLS Abuse
Threat Research

Where national interests, strategic ambitions, and sometimes personal gain intertwine, state-linked cyber threat actors...
Feb 6, 2024
•
7
min read
Threat Research
Threat Research

This post will serve as the first in a long series of articles on using the platform to identify malicious infrastructure and hunt...
Feb 1, 2024
•
4
min read
Threat Research
Threat Research

Have you ever run multiple searches seeking to identify malicious infrastructure only to be left frustrated and with ...
Jan 30, 2024
•
3
min read
Threat Research
Threat Research

ShadowPad, Quasar RAT, HeadLace, Emotet, and SIGNBT (to name a few) often grab headlines and captivate readers...
Jan 24, 2024
•
5
min read
Threat Research
Product News

It’s been a while since we announced a new feature, and with 2024 already in full swing, it is time to highlight what’s...
Jan 15, 2024
•
8
min read
Product News
Product News

As the end of the year approaches, we continue to enhance our feature set by building on well-established threat-...
Nov 14, 2023
•
3
min read
Product News
Threat Research

Attackers constantly devise new and sophisticated methods of delivering malware to infiltrate systems and exfiltrate...
Oct 31, 2023
•
4
min read
Threat Research
Malware Delivery
Threat Research

The term “threat hunting” is generally associated with detecting malicious behavior on endpoints manually...
Oct 25, 2023
•
4
min read
Threat Research
Threat Research

Phishing is more than a social engineering technique; it's a harrowing threat landscape where deception, innovation, and vigilance collide.
Oct 12, 2023
•
5
min read
Threat Research
Threat Research

In the ever-evolving world of cybersecurity, few individuals embody the spirit of innovation and exploration as profoundly as John Althouse.
Sep 28, 2023
•
10
min read
Threat Research
Threat Research

Learn about the Hunt.io massive observation collection platform.
Sep 19, 2023
•
3
min read
Threat Research
Threat Research

Michael showcases how the Hunt platform can be leveraged to proactively identify infrastructure not yet publicly reported on from recent malware campaigns.
Sep 12, 2023
•
5
min read
Threat Research
Threat Research

How Open Directories Help with Threat Hunting and Incident Response.
Aug 17, 2023
•
4
min read
Threat Research
Threat Research

We are excited to unveil Hunt.io, a cutting-edge threat hunting solution that is set to transform the landscape of cybersecurity.
Aug 1, 2023
•
5
min read
Threat Research
Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

©2026 Hunt Intelligence, Inc.
Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

©2025 Hunt Intelligence, Inc.
Hunt adversary infrastructure in real time. Surface C2 servers, enrich IOCs,
and map attacker activity at scale with our unified threat hunting platform.

©2026 Hunt Intelligence, Inc.