Loading cloud

Loading Intelligence Archive...

Research Archive

Intelligence operations from the shadows.

Coming soon cloud

More Intelligence Coming Soon

Our researchers are currently analyzing multiple advanced persistent threats and emerging attack vectors. New findings will be published as investigations conclude.

APT Analysis Ransomware TTPs Blockchain Forensics Threat Hunting Playbooks
Latest Research
December 18, 2025

Scattered Spider: Many Names, One Syndicate

A financially motivated cybercrime collective that weaponizes social engineering over malware. This report maps Scattered Spider's infrastructure through domain impersonation patterns, JARM fingerprint pivoting, ASN correlation, and IOC clustering.

Cybercrime Social Engineering Threat Hunting UNC3944
Domain impersonation & JARM pivoting 50+ IOCs mapped
Read Full Analysis
Featured Research
November 20, 2025

Operation Black Mirror: ClickFix Campaign Analysis

A single Win+R command replaces the entire kill chain. This report dissects ClickFix tradecraft adopted by multiple APT clusters and commodity stealer crews, mapping their infrastructure, lures, and execution chains into reusable threat-hunting methodologies.

APT Malware Threat Hunting ClickFix
Active campaigns tracked Multi-family JS loader & PowerShell chain
Read Full Analysis
Inaugural Research
September 02, 2025

When the Bazaar Burned From Within: The Silent Breach of Nobitex

A full-stack investigation into how a single breach exposed internal wallet segregation, fiat on-ramps, trading engine connectivity, and operational secrets inside Iran’s largest crypto exchange. This inaugural report maps the incident across infrastructure, DFIR, and intelligence layers.

Breach Analysis Cryptocurrency Threat Intelligence DFIR
Exchange internals & wallet topology Multi-layer incident reconstruction
Read Full Analysis