ThreatChain Blog

Security research, threat analysis, and decentralized intelligence insights from our research team.

Research Malware April 06, 2026 8 min read

Claude Code Source Leak: How One Packaging Mistake Created a Hacker Feeding Frenzy

What Supply Chain Attack is, how it works, and how to defend against it. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.

Read More
Research Malware April 06, 2026 8 min read

Vidar: The Silent Thief Hiding Inside That Free Software Download

An info-stealer that doubles as a loader. Full breakdown inside. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.

Read More
Research Malware April 06, 2026 8 min read

That "Payment Wire" Email Attachment? It's a Trojan Wearing Trusted Software as a Disguise

What ConnectWise is, how it works, and how to defend against it. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.

Read More
Research Malware April 06, 2026 8 min read

DCRat: The Cheap, Dangerous Malware That Lets Anyone Spy on Your Computer for $5

A modular RAT that's been around for years and keeps evolving. Latest tricks inside. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.

Read More
Research Malware April 06, 2026 8 min read

RedLine Stealer: The Password Thief Hiding in a 98-Kilobyte File

The most prolific credential stealer of the year. Here's how to catch it. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.

Read More
Research Malware April 05, 2026 8 min read

Your Computer Could Be Mining Cryptocurrency for Strangers Right Now — Here's How to Tell

Cryptojacking malware quietly burning your electricity and CPU. Here's how to detect it. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.

Read More
WEEKLY REPORT Research April 05, 2026 8 min read

ThreatChain Weekly: Chrome Zero-Day Hits KEV, WordPress Plugins Under Siege, and 4.4M Threats in 7 Days — Week of April 5, 2026

ThreatChain's weekly roundup of the cybersecurity landscape. Critical CVEs, emerging malware trends, and what to patch this week.

Read More
WEEKLY REPORT Research April 05, 2026 8 min read

ThreatChain Weekly: Chrome Zero-Day Hits KEV, WordPress Plugins Under Siege, and 2.8M New Phishing Domains — Week of April 5, 2026

ThreatChain's weekly roundup of the cybersecurity landscape. Critical CVEs, emerging malware trends, and what to patch this week.

Read More
Research Malware April 05, 2026 8 min read

Why Your Router Might Be Quietly Attacking Websites Right Now — And You'd Never Know

In-depth analysis of the Mirai malware family from the ThreatChain research team. Full IOCs, attack chain breakdown, and defensive recommendations.

Read More
Research Malware April 04, 2026 8 min read

Inside OffLoader: A GCleaner-Dropped Payload Slipping Past 95% of AV Engines

In-depth analysis of the OffLoader malware family from the ThreatChain research team. Full IOCs, attack chain breakdown, and defensive recommendations.

Read More
Breaking Malware April 4, 2026 8 min read

Boatnet: Inside the LZRD Mirai Variant Flooding IoT Devices Right Now

A new wave of Mirai-based malware is actively compromising routers, cameras, and DVRs worldwide. Fresh samples uploaded to MalwareBazaar today target ARM and x86 IoT devices via CVE-2024-6047 command injection in GeoVision hardware. Full IOCs, attack chain analysis, and defensive recommendations inside.

Read More
Malware April 1, 2026 9 min read

How to Check If a File Is Malware: Free Methods That Actually Work (2026)

Downloaded a suspicious file? Before you open it, here is exactly how to check whether it is malicious using free hash-based detection, VirusTotal, and ThreatChain's decentralized threat database of 2.6 million known threats.

Read More
Crypto Scams March 28, 2026 8 min read

Is This Crypto Wallet a Scam? How to Check Any Wallet Address (2026)

Before you send crypto to any address, learn how to verify it is legitimate. We cover wallet scam tactics, red flags to spot, and how to use ThreatChain's database of 2,530 known scam wallets to protect yourself.

Read More
Hacks & Exploits March 22, 2026 11 min read

The Biggest Crypto Hacks of 2026 (So Far): What Happened and How to Stay Safe

From the Bybit breach to the Radiant Capital exploit, we break down the largest crypto hacks of 2025-2026, explain how each happened in plain language, and show you how to check if your funds were affected.

Read More
Education March 15, 2026 10 min read

What Is Threat Intelligence? A Beginner's Guide for 2026

Threat intelligence is how organizations stay ahead of attackers. This guide explains the four types, where data comes from, and why decentralized community-driven platforms like ThreatChain are changing the game.

Read More
Earn March 10, 2026 8 min read

How to Earn Crypto Doing Security Research: $THREAT Token Guide

Security researchers can now earn real crypto by submitting threat intelligence. Learn how the $THREAT token works, what you earn per submission, and how to become a validator staking 10K tokens.

Read More
Free: 5 scans + 100 lookups/day | Pro: $4.99/day or $96.99/mo Upgrade