Research
Malware
May 22, 2026
8 min read
Your security tools might have missed this one. DDoSAgent is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 21, 2026
8 min read
That email attachment your coworker just opened? It's copying every password they've ever saved. Right now. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 10, 2026
8 min read
It's open-source on GitHub. It's also on thousands of infected machines right now, giving attackers full remote control. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 10, 2026
8 min read
Your security tools might have missed this one. Cobalt Strike is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 09, 2026
8 min read
That 'free software' download just exfiltrated every password, cookie, and autofill entry on your machine in under 5 seconds. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 08, 2026
8 min read
Open-source. Free. And in the hands of thousands of attackers who use it to watch your every move through your own webcam. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 08, 2026
8 min read
For $58 on a hacking forum, anyone can buy full remote control of your computer. Camera, keyboard, files — everything. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 07, 2026
8 min read
It doesn't steal your data — it opens the door for everything else. Ransomware, stealers, miners. This loader delivers them all. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 07, 2026
8 min read
An attacker is reading your keystrokes, watching your screen, and downloading your files. The RAT that infected you cost $25. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 06, 2026
8 min read
Someone on your team opened an Excel file 10 minutes ago. Their browser passwords, email credentials, and keystrokes are already being sent to a server in Eastern Europe. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 05, 2026
8 min read
Your home router might be attacking websites right now and you'd never know. Millions are already compromised. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 05, 2026
8 min read
Your security tools might have missed this one. PhantomStealer is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 04, 2026
8 min read
Your security tools might have missed this one. XoriumStealer is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 04, 2026
8 min read
Your security tools might have missed this one. GuLoader is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 03, 2026
8 min read
Your security tools might have missed this one. RustyStealer is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 03, 2026
8 min read
Your security tools might have missed this one. Gafgyt is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 01, 2026
8 min read
Your security tools might have missed this one. LimeRAT is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
May 01, 2026
8 min read
Your security tools might have missed this one. ValleyRAT is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 30, 2026
8 min read
That email attachment your coworker just opened? It's copying every password they've ever saved. Right now. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 30, 2026
8 min read
An attacker is reading your keystrokes, watching your screen, and downloading your files. The RAT that infected you cost $25. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 29, 2026
8 min read
Your security tools might have missed this one. CountLoader is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 29, 2026
8 min read
Your security tools might have missed this one. ConnectWise is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 28, 2026
8 min read
Your home router might be attacking websites right now and you'd never know. Millions are already compromised. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 28, 2026
8 min read
Open-source. Free. And in the hands of thousands of attackers who use it to watch your every move through your own webcam. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 27, 2026
8 min read
Your security tools might have missed this one. Smoke Loader is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 27, 2026
8 min read
That 'free software' download just exfiltrated every password, cookie, and autofill entry on your machine in under 5 seconds. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 26, 2026
8 min read
It doesn't steal your data — it opens the door for everything else. Ransomware, stealers, miners. This loader delivers them all. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 26, 2026
8 min read
Your security tools might have missed this one. WeedHack is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 25, 2026
8 min read
Someone on your team opened an Excel file 10 minutes ago. Their browser passwords, email credentials, and keystrokes are already being sent to a server in Eastern Europe. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 25, 2026
8 min read
Your security tools might have missed this one. RustyStealer is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 24, 2026
8 min read
For $58 on a hacking forum, anyone can buy full remote control of your computer. Camera, keyboard, files — everything. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 24, 2026
8 min read
Your security tools might have missed this one. SnappyClient is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 23, 2026
8 min read
Your CPU is at 100% and your electric bill spiked. Someone is mining crypto on your machine and keeping the profit. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 23, 2026
8 min read
Built in 2013. Still infecting machines in 2026. This RAT refuses to die because it still works. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 22, 2026
8 min read
Your security tools might have missed this one. ConnectWise is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 22, 2026
8 min read
Your security tools might have missed this one. Gafgyt is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 21, 2026
8 min read
Your security tools might have missed this one. DarkComet is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 21, 2026
8 min read
Your security tools might have missed this one. Socks5Systemz is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 20, 2026
8 min read
Your home router might be attacking websites right now and you'd never know. Millions are already compromised. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
DeFi Hacks
Research
April 20, 2026
6 min read
Attackers drained $292M in rsETH from Kelp DAO via a LayerZero bridge exploit, triggering $9B in outflows from Aave. Plain-English breakdown of how the bridge was broken and what it means if you hold any yield-bearing wrapper token.
Read More
Research
Malware
April 17, 2026
8 min read
Your security tools might have missed this one. ValleyRAT is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 17, 2026
8 min read
Your security tools might have missed this one. Gh0stRAT is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 16, 2026
8 min read
That 'free software' download just exfiltrated every password, cookie, and autofill entry on your machine in under 5 seconds. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 16, 2026
8 min read
For $58 on a hacking forum, anyone can buy full remote control of your computer. Camera, keyboard, files — everything. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 15, 2026
8 min read
Your security tools might have missed this one. DattoRMM is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 15, 2026
8 min read
Your security tools might have missed this one. SantaStealer is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 14, 2026
8 min read
Your security tools might have missed this one. DiscordRAT is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 14, 2026
8 min read
Your security tools might have missed this one. Smoke Loader is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 13, 2026
8 min read
Your security tools might have missed this one. RatonRAT is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 13, 2026
8 min read
You downloaded one file. In the background, it silently installed three more programs you never asked for. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 12, 2026
8 min read
Your security tools might have missed this one. SalatStealer is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 12, 2026
8 min read
Your security tools might have missed this one. RustyStealer is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 11, 2026
8 min read
Your home router might be attacking websites right now and you'd never know. Millions are already compromised. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 11, 2026
8 min read
Your security tools might have missed this one. Expiro is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 08, 2026
8 min read
Your security tools might have missed this one. CVE-2026-39337 is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 08, 2026
8 min read
Open-source. Free. And in the hands of thousands of attackers who use it to watch your every move through your own webcam. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 07, 2026
8 min read
Your security tools might have missed this one. ACRStealer is actively targeting networks right now — here's what you need to know before it hits yours. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 07, 2026
8 min read
What CVE-2026-34208 is, how it works, and how to defend against it. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 07, 2026
8 min read
A commodity stealer hiding in phishing attachments. Here's the full picture. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 06, 2026
8 min read
What Supply Chain Attack is, how it works, and how to defend against it. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 06, 2026
8 min read
An info-stealer that doubles as a loader. Full breakdown inside. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 06, 2026
8 min read
What ConnectWise is, how it works, and how to defend against it. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 06, 2026
8 min read
A modular RAT that's been around for years and keeps evolving. Latest tricks inside. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 06, 2026
8 min read
The most prolific credential stealer of the year. Here's how to catch it. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
Research
Malware
April 05, 2026
8 min read
Cryptojacking malware quietly burning your electricity and CPU. Here's how to detect it. Full IOCs, attack chain, and defensive guidance from ThreatChain Research.
Read More
WEEKLY REPORT
Research
April 05, 2026
8 min read
ThreatChain's weekly roundup of the cybersecurity landscape. Critical CVEs, emerging malware trends, and what to patch this week.
Read More
WEEKLY REPORT
Research
April 05, 2026
8 min read
ThreatChain's weekly roundup of the cybersecurity landscape. Critical CVEs, emerging malware trends, and what to patch this week.
Read More
Research
Malware
April 05, 2026
8 min read
In-depth analysis of the Mirai malware family from the ThreatChain research team. Full IOCs, attack chain breakdown, and defensive recommendations.
Read More
Research
Malware
April 04, 2026
8 min read
In-depth analysis of the OffLoader malware family from the ThreatChain research team. Full IOCs, attack chain breakdown, and defensive recommendations.
Read More
Breaking
Malware
April 4, 2026
8 min read
A new wave of Mirai-based malware is actively compromising routers, cameras, and DVRs worldwide. Fresh samples uploaded to MalwareBazaar today target ARM and x86 IoT devices via CVE-2024-6047 command injection in GeoVision hardware. Full IOCs, attack chain analysis, and defensive recommendations inside.
Read More
Malware
April 1, 2026
9 min read
Downloaded a suspicious file? Before you open it, here is exactly how to check whether it is malicious using free hash-based detection, VirusTotal, and ThreatChain's decentralized threat database of 2.6 million known threats.
Read More
Crypto Scams
March 28, 2026
8 min read
Before you send crypto to any address, learn how to verify it is legitimate. We cover wallet scam tactics, red flags to spot, and how to use ThreatChain's database of 2,530 known scam wallets to protect yourself.
Read More
Hacks & Exploits
March 22, 2026
11 min read
From the Bybit breach to the Radiant Capital exploit, we break down the largest crypto hacks of 2025-2026, explain how each happened in plain language, and show you how to check if your funds were affected.
Read More
Education
March 15, 2026
10 min read
Threat intelligence is how organizations stay ahead of attackers. This guide explains the four types, where data comes from, and why decentralized community-driven platforms like ThreatChain are changing the game.
Read More
Earn
March 10, 2026
8 min read
Security researchers can now earn real crypto by submitting threat intelligence. Learn how the $THREAT token works, what you earn per submission, and how to become a validator staking 10K tokens.
Read More