AlienVault OTX Threat Intelligence

API Connected Successfully

Displaying page 6 of available threat intelligence pulses.

Total pulses: 8,277

Supershell - C2 IP/Domain Tracker TLP:amber
AlienVault
This pulse contains IOCs related to Supershell Infrastructure. Additions are automatically added based on several sources like: OTX sandboxes samples, internal tools, through the use of Shodan or Censys queries, shared intel from LevelBlue partners or external feeds.
Supershell
IPv4 32
Created: Jul 9, 2025 9:04 AM Updated: Aug 28, 2025 2:01 PM
DcRat - C2 IP/Domain Tracker TLP:amber
AlienVault
This pulse contains IOCs related to DcRat Infrastructure. Additions are automatically added based on several sources like: OTX sandboxes samples, internal tools, through the use of Shodan or Censys queries, shared intel from LevelBlue partners or external feeds.
dcrat rat
IPv4 11
Created: Jun 27, 2023 2:51 PM Updated: Aug 28, 2025 2:01 PM
Mythic C2 framework - C2 IP/Domain Tracker TLP:amber
AlienVault
This pulse contains IOCs related to Mythic Infrastructure. Additions are automatically added based on several sources like: OTX sandboxes samples, internal tools, through the use of Shodan or Censys queries, shared intel from LevelBlue partners or external feeds.
Mythic c2framework redteam
IPv4 23
Created: Jun 15, 2023 3:07 PM Updated: Aug 28, 2025 2:01 PM
Cobalt Strike - C2 IP/Domain Tracker TLP:white
AlienVault
This pulse contains IOCs related to Cobalt Strike Infrastructure. Additions are automatically added based on several sources like: OTX sandboxes samples, internal tools, through the use of Shodan or Censys queries, shared intel from LevelBlue partners or external feeds.
Cobalt Strike
hostname 1013 domain 872 URL 5462 IPv4 461
Created: Feb 26, 2020 2:51 PM Updated: Aug 28, 2025 2:01 PM
Malicious Appsuite PDF Editor Spreads Tamperedchef Malware TLP:white
AlienVault
A large cybercrime campaign has been observed involving multiple fraudulent websites promoted through Google advertising. The campaign aims to trick users into downloading and installing a trojanized PDF editor containing the TamperedChef information-stealing malware. The malware harvests sensitive data, including credentials and web cookies. The campaign began on June 26, 2025, with the PDF editor initially appearing harmless but later activating malicious capabilities. The threat actor used Google advertising to promote the PDF editor, with at least 5 different campaign IDs observed. The malware's activation occurred 56 days after the campaign's start, coinciding with a typical Google ad campaign duration. The threat actor has a history of distributing malicious code disguised as free utility tools, and this campaign has successfully affected several European organizations.
google advertising information stealer obfuscation credential theft tamperedchef +2 more
FileHash-MD5 12 FileHash-SHA1 10 FileHash-SHA256 63 domain 30 hostname 4
Created: Aug 28, 2025 1:34 PM Updated: Aug 28, 2025 1:36 PM
AI Chat
AI Assistant
×
Hello! I'm the MM Computers AI assistant. How can I help you today?