AlienVault OTX Threat Intelligence

API Connected Successfully

Displaying page 2 of available threat intelligence pulses.

Total pulses: 8,272

Brute Ratel C4 - C2 IP/Domain Tracker TLP:white
AlienVault
This pulse contains IOCs related to Brute Ratel C4 Infrastructure. Additions are automatically added based on several sources like: OTX sandboxes samples, internal tools, through the use of Shodan or Censys queries, shared intel from LevelBlue partners or external feeds.
brute ratel c4
IPv4 93
Created: Jul 28, 2022 8:11 AM Updated: Aug 27, 2025 8:02 PM
Mirai - C2 IP Addresses TLP:white
AlienVault
This pulse contains IOCs related to Mirai Infrastructure. Additions are automatically added based on several sources like: OTX sandboxes samples, internal tools, through the use of Shodan or Censys queries, shared intel from LevelBlue partners or external feeds.
IPv4 2844
Created: Jun 24, 2022 10:48 AM Updated: Aug 27, 2025 8:02 PM
Responder - C2 IP/Domain Tracker TLP:white
AlienVault
This pulse contains IOCs related to Responder Infrastructure. Additions are automatically added based on several sources like: OTX sandboxes samples, internal tools, through the use of Shodan or Censys queries, shared intel from LevelBlue partners or external feeds.
IPv4 4
Created: Jun 2, 2022 10:00 AM Updated: Aug 27, 2025 8:02 PM
RedLine - C2 IP/Domain Tracker TLP:white
AlienVault
This pulse contains IOCs related to RedLine Infrastructure. Additions are automatically added based on several sources like: OTX sandboxes samples, internal tools, through the use of Shodan or Censys queries, shared intel from LevelBlue partners or external feeds.
redline
domain 39 hostname 2 IPv4 3
Created: Jul 1, 2021 1:35 PM Updated: Aug 27, 2025 8:02 PM
UAC-0057 Keeps Pressure on Ukraine and Poland TLP:white
AlienVault
This report details recent cyber espionage campaigns targeting Ukraine and Poland, likely conducted by UAC-0057 (also known as UNC1151 or Ghostwriter). The threat actor used weaponized XLS spreadsheets with obfuscated VBA macros to drop first-stage DLL downloaders. C# and C++ downloaders were used to collect system information and retrieve next-stage payloads. The infrastructure leveraged domains impersonating legitimate websites, with consistent setups across campaigns. Notable evolutions include the use of Slack for command and control in some instances. The campaigns maintained disciplined targeting of Ukrainian and Polish organizations, consistent with UAC-0057's historical focus.
ukraine confuserex cobalt strike poland cyber espionage +4 more
FileHash-MD5 23 FileHash-SHA1 23 FileHash-SHA256 25 CVE 1 YARA 2 domain 11 hostname 1
Created: Aug 27, 2025 7:54 PM Updated: Aug 27, 2025 7:56 PM
AI Chat
AI Assistant
×
Hello! I'm the MM Computers AI assistant. How can I help you today?