Click here to download all references as Bib-File.•
| 2026-01-28
⋅
Hunt.io
⋅
Exposed Open Directory Leaks a Full BYOB Deployment Across Windows, Linux, and macOS |
| 2026-01-14
⋅
Hunt.io
⋅
Inside China’s Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped Across Major ISPs |
| 2025-12-18
⋅
Acronis
⋅
Acronis TRU Alliance {Hunt.io}: Hunting DPRK threats - New Global Lazarus & Kimsuky campaigns BADCALL POOLRAT Quasar RAT |
| 2025-12-03
⋅
Hunt.io
⋅
Malicious VSCode Extension Launches Multi-Stage Attack Chain with Anivia Loader and OctoRAT OctoRAT |
| 2025-10-16
⋅
Hunt.io
⋅
Odyssey Stealer and AMOS Campaign Targets macOS Developers Through Fake Tools AMOS |
| 2025-09-18
⋅
Hunt.io
⋅
Tracking AsyncRAT via Trojanized ScreenConnect and Open Directories AsyncRAT |
| 2025-09-10
⋅
Hunt.io
⋅
AdaptixC2 Uncovered: Capabilities, Tactics & Hunting Strategies AdaptixC2 |
| 2025-09-02
⋅
Hunt.io
⋅
From Panel to Payload: Inside the TinyLoader Malware Operation XTinyLoader |
| 2025-08-20
⋅
Hunt.io
⋅
APT MuddyWater Deploys Multi-Stage Phishing to Target CFOs |
| 2025-08-14
⋅
Hunt.io
⋅
Hunt.io Exposes and Analyzes ERMAC V3.0 Banking Trojan Full Source Code Leak ERMAC |
| 2025-06-19
⋅
Hunt.io
⋅
Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure Cobalt Strike |
| 2025-06-05
⋅
Hunt.io
⋅
Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure AsyncRAT XWorm |
| 2025-05-05
⋅
Hunt.io
⋅
APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux |
| 2025-04-08
⋅
Hunt.io
⋅
State-Sponsored Tactics: How Gamaredon and ShadowPad Operate and Rotate Their Infrastructure ShadowPad |
| 2025-04-01
⋅
Hunt.io
⋅
Same Russian-Speaking Threat Actor, New Tactics: Abuse of Cloudflare Services for Phishing and Telegram to Filter Victim IPs Pyramid |
| 2025-03-11
⋅
Hunt.io
⋅
JSPSpy and ‘filebroser’: A Custom File Management Tool in Webshell Infrastructure |
| 2025-03-04
⋅
Hunt.io
⋅
Exposing Russian EFF Impersonators: The Inside Story on Stealc & Pyramid C2 Pyramid Stealc |
| 2025-02-27
⋅
Hunt.io
⋅
Uncovering Joker’s C2 Network: How Hunt’s SSL History Exposed Its Infrastructure Joker |
| 2025-02-20
⋅
Hunt.io
⋅
LightSpy Expands Command List to Include Social Media Platforms lightSpy |
| 2025-02-12
⋅
Hunt.io
⋅
Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt Pyramid |