Advertisement · 728 × 90

Posts by Pulsedive Threat Intelligence

Preview
Unpacking KiwiStealer: Diving into BITTER APT’s Malware Learn about KiwiStealer capabilities and malware analysis of how it exfiltrates data via HTTP POST requests.

Our threat research team details KiwiStealer's capabilities and a malware analysis of how it exfiltrates data via HTTP POST requests in our latest blog: blog.pulsedive.com/unpacking-ki...

8 months ago 0 0 0 0
Preview
Collection through Correlation: Operationalizing IP and Domain Indicators of Compromise IP addresses and domains aren’t just for blocklists; when analyzed with the right tools, they can be operationalized to enrich alerts, support threat hunting, and uncover risk.

Where do IPs and domains have a place in CTI workflows?
What can and should you do with them?

Here's our take: blog.pulsedive.com/collection-t...

9 months ago 0 0 0 0
Ransomch.at - a dive into ransomware negotiations

Community Resource Share: "Ransomch(.)at"
ransomch.at

A collection of real-world ransomware negotiations in support of analysis, data-driven insights, and industry collaboration.

The existing collection of chats from 23 ransomware brands so far include:
Akira
BlackBasta
Conti
Hive
Lockbit
REvil

10 months ago 1 0 0 0
Preview
Albabat 2.0.0 Decoded: A Config-Driven Design This blog analyzes Albabat ransomware, exploring its config file, executed ransomware commands, and ransom note.

Newest threat research blog out now: Albabat 2.0.0 Decoded

We dig into Albabat's config file, executed ransomware commands, and ransom note.

Read: blog.pulsedive.com/albabat-2-0-...

11 months ago 0 0 0 0
Post image

Just added 1.4K+ IOCs related to phishing kit Oriental Gudgeon, primarily targeting Japanese financial services cos.

Investigate shared properties & attributes:
pulsedive.com/threat/Orien...

Explore IOCs: pulsedive.com/explore/?q=t...

Credit to the urlscan team: urlscan.io/blog/2025/05...

11 months ago 0 0 0 0

Learn more:
US DOJ Release: www.justice.gov/opa/pr/justi...
Threat Profile: pulsedive.com/threat/Earth...

1 year ago 0 0 0 0
Post image

In March, the US DOJ unsealed an indictment against 12 Chinese nationals for involvement in global espionage operations, including 8 i-Soon employees. Operations were related to and some attacks attributed to Earth Lusca, also known as FishMonger and Aquatic Panda, amongst other aliases.

1 year ago 0 0 1 0
Post image

Related Threats: Hellcat & Morpheus
pulsedive.com/threat/Hellc...
pulsedive.com/threat/Morph...

- Recent growth in activity for both RaaS brands
- Identical payloads suggest shared codebase
- Differing victims and contact details

1 year ago 0 0 0 0
Post image

This analysis covers the three known mechanisms for delivery (including PPT, Twitter, Google Ads lures) as well as the complete intrusion chain.

1 year ago 0 0 0 0
Advertisement
Preview
Rilide: An Information Stealing Browser Extension Learn about the information stealing browser extension Rilide, its delivery methods, and intrusion chain.

New analysis of Rilide delivery methods and intrusion chain out now: blog.pulsedive.com/rilide-an-in...

First reported in April 2023, Rilide is an information stealer masquerading as a browser extension targeting Chromium-based browsers.

1 year ago 0 0 1 0
LinkedIn This link will take you to a page that’s not on LinkedIn

Community Share: "Black Basta Chat Leak - Organization & Infrastructure" by Cyber_0leg / Cybercrime Diaries
www.cybercrimediaries.com/post/black-b...

This blog examines exposed details of Black Basta, including its leadership hierarchies, business model, and technical infrastructure.

1 year ago 0 0 0 0
Post image

New research on the PolarEdge botnet:
- Targeting edge devices (Cisco, QNAP, Synology, ASUS)
- Active since at least Q4 2023
- Compromised 2K+ unique IP addresses
- Report and analysis by Sekoia.io: lnkd.in/g4Wfi2Vt
- Pulsedive profile: pulsedive.com/threat/Polar...

1 year ago 0 0 0 0
Preview
Compromised Browser Extensions - Jan 2025 | Pulsedive Blog Learn how threat actors leverage browser extensions as an attack vector, including examples for Cyberhaven and GraphQL Network Inspector.

Browser extensions are commonly used, but present a significant security risk as a growing threat vector.

Our newest blog looks at examples from January 2025, including Cyberhaven and GraphQL Network Inspector, to discuss how threat actors compromise extensions.

blog.pulsedive.com/compromised-...

1 year ago 1 1 0 0
Post image

Our guide includes how to install and use Assemblyline, an example walkthrough, and helpful resources.

1 year ago 0 0 0 0

The tool is ideal for blue teams, CTI researchers, and IR professionals looking to automate and streamline malware samples processing. It is especially helpful for security teams handling large volumes of malware and seeking a scalable, customizable solution for efficient triage.

1 year ago 0 0 1 0
Preview
Assemblyline for Open Source Malware Triage | Tool Guide Learn how to install and use Assemblyline, the open-source malware triage tool. This 101 includes an overview, deployment walkthrough, example use case, and resources.

Just published a 101 guide on how to use Assemblyline, the open-source malware triage tool created by the Canadian Centre for Cyber Security.

Read: blog.pulsedive.com/assemblyline...

1 year ago 0 0 1 0
Post image
1 year ago 0 0 0 0
Post image Post image Post image

Plus, catch a rewind of Pulsedive at the end, including most read blogs and product updates.

1 year ago 1 0 1 0
Preview
Pulsedive Blog | 2024 In Review A rewind of the year across the threat landscape and at Pulsedive.

Our recap of 2024:
- Key exploited vulnerabilities
- Top malware
- Outages
- Law enforcement actions
- Looking ahead to 2025

Read: blog.pulsedive.com/2024-in-revi...

1 year ago 1 1 1 0
Advertisement

just pushed an update to @pulsedive.com, should improve scan performance and Analyze bulk scan hangs.

1 year ago 2 2 0 0
Post image

With 3 weeks left in 2024, we wanted to thank you for all you do in the security community.

So we're hosting a year-end sticker giveaway through Dec. 21- no purchase necessary.

To participate:
- Like this post 👍
- Fill out: forms.gle/nxLQQxNtRahS...

1 year ago 3 2 0 0
Preview
GitHub - 0x90n/InfoSec-Black-Friday: All the deals for InfoSec related software/tools this Black Friday All the deals for InfoSec related software/tools this Black Friday - 0x90n/InfoSec-Black-Friday

Places to find infosec Black Friday deals:
"The Big List for Infosec" github.com/0x90n/InfoSe...
"For Security Professionals and Developers" github.com/davidalex89/...
"Tagged, Searchable, and All Year Round"
training.dfirdiva.com/current-disc...

1 year ago 5 4 0 0