Research
Threat Intelligence
Behavioral investigations from live multi-node honeypot sensors. Post-compromise analysis - what attackers do after they're in.
Investigation
March 2026 · Ongoing
98% of SSH Intrusions Come from One Worm
Erratum
Corrected Credential Model - 345gs5662d34 is a probe, not a hardcoded password
Mar 29
→
Update
Six More Days, Two Nodes - 666 sessions, 4 behavioral profiles, DE + FR
Mar 30
→
New
Two Bot Pools, Coordinated Timing - IP-segregated pools, ~50s synchronization gap
Mar 31
→
Atlas
RF-001 - MDRFCKR Behavioral Dossier · interactive stage reconstruction
Apr 1
↗
New
One Family, Three Execution Programs - HASSH splits dota into three distinct programs
Apr 8
→
In Pipeline
Cross-Persona Asymmetry - Same Worm, Different Targets
Collecting