Hunt.io is enhancing its threat intelligence with the IOC Hunter Feed and C2 Feed with attribution, providing enriched IOCs and linking them to known threat actors. This empowers security teams to better track adversary infrastructure and respond effectively.
Affected: Cybersecurity, threat detection, organizations
Affected: Cybersecurity, threat detection, organizations
Keypoints :
- Hunt.io introduces IOC Hunter Feed and C2 Feed with attribution.
- IOC Hunter Feed aggregates IOCs from various intelligence reports.
- C2 Feed connects malicious servers to known threat actors.
- Feeds feature advanced scanning technology and regular updates for accuracy.
- Users can access feeds via API with specified endpoints.
- Provides critical data such as IPs, hostnames, and threat actor metadata.
- Enhances detection and attribution of cyber threats.
MITRE Techniques :
- Initial Access (T1078) – Use of compromised credentials to access target networks.
- Command and Control (T1071) – Use of application-layer protocols to communicate.
- Exfiltration Over Command and Control Channel (T1041) – Exfiltration of data via compromised command and control servers.
- Data Obfuscation (T1001) – Techniques to conceal data during exfiltration.
- Web Service (T1071.001) – Communication through web services as part of Command and Control tactics.
Indicator of Compromise :
- [Domain] api.inmediavault.com
- [IP Address] 172.64.80.1
- [Hash] d9e52663715902e9ec51a7dd2fea5241c9714976e9541c02df66d1a42a3a7d2a (SHA-256)
- [Hash] 3FE88378D4EBDD3F27063D41DA0D4E69A0D3AAB549AEA28A0B8CD73DD9606891 (SHA-256)
- [Publication URL] https://medium.com/@cyberecht/shamoon-malware-e24823501b10
Full Story: https://hunt.io/blog/ioc-hunter-feed-attribution