Pulsedive Threat Intelligence
banner
pulsedive.com
Pulsedive Threat Intelligence
@pulsedive.com
Frictionless threat intelligence solutions for growing teams. On-demand searching, scanning & enrichment for the security community. Dive right in at pulsedive.com.
Our threat research team details KiwiStealer's capabilities and a malware analysis of how it exfiltrates data via HTTP POST requests in our latest blog: blog.pulsedive.com/unpacking-ki...
Unpacking KiwiStealer: Diving into BITTER APT’s Malware
Learn about KiwiStealer capabilities and malware analysis of how it exfiltrates data via HTTP POST requests.
blog.pulsedive.com
August 13, 2025 at 5:06 PM
Where do IPs and domains have a place in CTI workflows?
What can and should you do with them?

Here's our take: blog.pulsedive.com/collection-t...
Collection through Correlation: Operationalizing IP and Domain Indicators of Compromise
IP addresses and domains aren’t just for blocklists; when analyzed with the right tools, they can be operationalized to enrich alerts, support threat hunting, and uncover risk.
blog.pulsedive.com
June 30, 2025 at 3:05 PM
Community Resource Share: "Ransomch(.)at"
ransomch.at

A collection of real-world ransomware negotiations in support of analysis, data-driven insights, and industry collaboration.

The existing collection of chats from 23 ransomware brands so far include:
Akira
BlackBasta
Conti
Hive
Lockbit
REvil
Ransomch.at - a dive into ransomware negotiations
ransomch.at
June 9, 2025 at 3:46 PM
Newest threat research blog out now: Albabat 2.0.0 Decoded

We dig into Albabat's config file, executed ransomware commands, and ransom note.

Read: blog.pulsedive.com/albabat-2-0-...
Albabat 2.0.0 Decoded: A Config-Driven Design
This blog analyzes Albabat ransomware, exploring its config file, executed ransomware commands, and ransom note.
blog.pulsedive.com
May 16, 2025 at 5:49 PM
Just added 1.4K+ IOCs related to phishing kit Oriental Gudgeon, primarily targeting Japanese financial services cos.

Investigate shared properties & attributes:
pulsedive.com/threat/Orien...

Explore IOCs: pulsedive.com/explore/?q=t...

Credit to the urlscan team: urlscan.io/blog/2025/05...
May 12, 2025 at 6:19 PM
In March, the US DOJ unsealed an indictment against 12 Chinese nationals for involvement in global espionage operations, including 8 i-Soon employees. Operations were related to and some attacks attributed to Earth Lusca, also known as FishMonger and Aquatic Panda, amongst other aliases.
March 31, 2025 at 6:31 PM
Related Threats: Hellcat & Morpheus
pulsedive.com/threat/Hellc...
pulsedive.com/threat/Morph...

- Recent growth in activity for both RaaS brands
- Identical payloads suggest shared codebase
- Differing victims and contact details
March 24, 2025 at 3:55 PM
New analysis of Rilide delivery methods and intrusion chain out now: blog.pulsedive.com/rilide-an-in...

First reported in April 2023, Rilide is an information stealer masquerading as a browser extension targeting Chromium-based browsers.
Rilide: An Information Stealing Browser Extension
Learn about the information stealing browser extension Rilide, its delivery methods, and intrusion chain.
blog.pulsedive.com
March 21, 2025 at 3:25 PM
Community Share: "Black Basta Chat Leak - Organization & Infrastructure" by Cyber_0leg / Cybercrime Diaries
www.cybercrimediaries.com/post/black-b...

This blog examines exposed details of Black Basta, including its leadership hierarchies, business model, and technical infrastructure.
LinkedIn
This link will take you to a page that’s not on LinkedIn
lnkd.in
March 7, 2025 at 6:16 PM
New research on the PolarEdge botnet:
- Targeting edge devices (Cisco, QNAP, Synology, ASUS)
- Active since at least Q4 2023
- Compromised 2K+ unique IP addresses
- Report and analysis by Sekoia.io: lnkd.in/g4Wfi2Vt
- Pulsedive profile: pulsedive.com/threat/Polar...
March 5, 2025 at 3:55 PM
Browser extensions are commonly used, but present a significant security risk as a growing threat vector.

Our newest blog looks at examples from January 2025, including Cyberhaven and GraphQL Network Inspector, to discuss how threat actors compromise extensions.

blog.pulsedive.com/compromised-...
Compromised Browser Extensions - Jan 2025 | Pulsedive Blog
Learn how threat actors leverage browser extensions as an attack vector, including examples for Cyberhaven and GraphQL Network Inspector.
blog.pulsedive.com
February 25, 2025 at 5:21 PM
Just published a 101 guide on how to use Assemblyline, the open-source malware triage tool created by the Canadian Centre for Cyber Security.

Read: blog.pulsedive.com/assemblyline...
Assemblyline for Open Source Malware Triage | Tool Guide
Learn how to install and use Assemblyline, the open-source malware triage tool. This 101 includes an overview, deployment walkthrough, example use case, and resources.
blog.pulsedive.com
January 7, 2025 at 6:24 PM
Our recap of 2024:
- Key exploited vulnerabilities
- Top malware
- Outages
- Law enforcement actions
- Looking ahead to 2025

Read: blog.pulsedive.com/2024-in-revi...
Pulsedive Blog | 2024 In Review
A rewind of the year across the threat landscape and at Pulsedive.
blog.pulsedive.com
December 30, 2024 at 4:48 PM
Reposted by Pulsedive Threat Intelligence
just pushed an update to @pulsedive.com, should improve scan performance and Analyze bulk scan hangs.
December 10, 2024 at 12:15 AM
With 3 weeks left in 2024, we wanted to thank you for all you do in the security community.

So we're hosting a year-end sticker giveaway through Dec. 21- no purchase necessary.

To participate:
- Like this post 👍
- Fill out: forms.gle/nxLQQxNtRahS...
December 9, 2024 at 4:59 PM
Places to find infosec Black Friday deals:
"The Big List for Infosec" github.com/0x90n/InfoSe...
"For Security Professionals and Developers" github.com/davidalex89/...
"Tagged, Searchable, and All Year Round"
training.dfirdiva.com/current-disc...
GitHub - 0x90n/InfoSec-Black-Friday: All the deals for InfoSec related software/tools this Black Friday
All the deals for InfoSec related software/tools this Black Friday - 0x90n/InfoSec-Black-Friday
github.com
November 29, 2024 at 1:29 AM