{
  "type": "Domain",
  "indicator": "taketheright.com",
  "general": {
    "sections": [
      "general",
      "geo",
      "url_list",
      "passive_dns",
      "malware",
      "whois",
      "http_scans"
    ],
    "whois": "http://whois.domaintools.com/taketheright.com",
    "alexa": "http://www.alexa.com/siteinfo/taketheright.com",
    "indicator": "taketheright.com",
    "type": "domain",
    "type_title": "Domain",
    "validation": [],
    "base_indicator": {
      "id": 2342451216,
      "indicator": "taketheright.com",
      "type": "domain",
      "title": "",
      "description": "",
      "content": "",
      "access_type": "public",
      "access_reason": ""
    },
    "pulse_info": {
      "count": 5,
      "pulses": [
        {
          "id": "676306f0c8585adcdf26393c",
          "name": "Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising",
          "description": "A large-scale fake captcha campaign has been distributing Lumma info-stealer malware through malvertising techniques. The campaign, relying on a single ad network, delivers over 1 million daily ad impressions, causing thousands of daily victims to lose their accounts and money. The malicious activity is propagated through a network of 3,000+ content sites funneling traffic. The campaign uses deceptive captcha pages that trick users into executing PowerShell commands, instantly installing stealer malware. The ad network Monetag, a subsidiary of PropellerAds, is identified as the primary facilitator. The threat actors leverage services like BeMob for cloaking, showcasing the fragmented accountability in the ad ecosystem. The campaign's success highlights the need for stronger proactive measures in ad networks and the importance of user caution when encountering free content online.",
          "modified": "2024-12-19T15:07:29.449000",
          "created": "2024-12-18T17:31:28.951000",
          "tags": [
            "malvertising",
            "powershell",
            "lumma stealer",
            "fake captcha"
          ],
          "references": [
            "https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lumma",
              "display_name": "Lumma",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1132.001",
              "name": "Standard Encoding",
              "display_name": "T1132.001 - Standard Encoding"
            },
            {
              "id": "T1056.001",
              "name": "Keylogging",
              "display_name": "T1056.001 - Keylogging"
            },
            {
              "id": "T1204.002",
              "name": "Malicious File",
              "display_name": "T1204.002 - Malicious File"
            },
            {
              "id": "T1566.002",
              "name": "Spearphishing Link",
              "display_name": "T1566.002 - Spearphishing Link"
            },
            {
              "id": "T1608.001",
              "name": "Upload Malware",
              "display_name": "T1608.001 - Upload Malware"
            },
            {
              "id": "T1185",
              "name": "Man in the Browser",
              "display_name": "T1185 - Man in the Browser"
            },
            {
              "id": "T1568",
              "name": "Dynamic Resolution",
              "display_name": "T1568 - Dynamic Resolution"
            },
            {
              "id": "T1059.001",
              "name": "PowerShell",
              "display_name": "T1059.001 - PowerShell"
            },
            {
              "id": "T1102.002",
              "name": "Bidirectional Communication",
              "display_name": "T1102.002 - Bidirectional Communication"
            },
            {
              "id": "T1071.001",
              "name": "Web Protocols",
              "display_name": "T1071.001 - Web Protocols"
            },
            {
              "id": "T1056.004",
              "name": "Credential API Hooking",
              "display_name": "T1056.004 - Credential API Hooking"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 50,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "api",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "AlienVault",
            "id": "2",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
            "is_subscribed": true,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 29,
            "FileHash-MD5": 1,
            "hostname": 2
          },
          "indicator_count": 32,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 376757,
          "modified_text": "481 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "67c0cdc35112c5919563a334",
          "name": "Intel is bad awy",
          "description": "",
          "modified": "2025-03-29T20:01:20.482000",
          "created": "2025-02-27T20:40:35.539000",
          "tags": [
            "sign",
            "github",
            "find",
            "view",
            "search",
            "strong",
            "code issues",
            "pull",
            "breadcrumbs",
            "damn",
            "star",
            "footer",
            "sha1",
            "helldown linux",
            "iocs helldown",
            "windows payload",
            "icon",
            "darkrace",
            "donex",
            "ransom",
            "defanged file",
            "hashes",
            "ipv4",
            "sha256",
            "c2 ip",
            "address",
            "plugin",
            "brazanbamboo c2",
            "panel",
            "archive file",
            "bha006",
            "telegram bot",
            "token",
            "chat id",
            "sha256 hashes",
            "iocs",
            "intermediary",
            "landing",
            "aitm server",
            "compromise note",
            "hashes payload",
            "loader",
            "dropper",
            "ips https",
            "urls https",
            "duoyi",
            "ioc url",
            "ipv4 address",
            "c2 server",
            "sample sha256",
            "remcos",
            "decrypted",
            "urls http",
            "payload",
            "amos stealer",
            "stealc c2",
            "rhadamanthys c2",
            "phishing urls",
            "google meet",
            "amos steaker",
            "html payload",
            "stealc payload",
            "md5 hashes",
            "sha1 hashes",
            "iocs zip",
            "lnk file",
            "msi file",
            "payload url",
            "eldorado",
            "linux",
            "service dll",
            "cheat engine",
            "c2 domain",
            "compromise",
            "urls",
            "iocs files",
            "network ip",
            "domain",
            "malware hash",
            "noopldr type1",
            "noopldr type2",
            "download url",
            "email addresses",
            "block",
            "ioc http",
            "iocs hash",
            "url https",
            "ghostgambit",
            "hidden rootkit",
            "gh0strat",
            "mekotio banking",
            "financial",
            "latin america",
            "detected",
            "zipmsi",
            "downloader",
            "ip address",
            "cobalt strike",
            "first seen",
            "seen",
            "pantegana",
            "tls certificate",
            "fingerprint",
            "samples",
            "trojanspy",
            "msi",
            "subdomains",
            "reddit",
            "wetransfer",
            "ioc hash",
            "file hashes",
            "ip addresses",
            "fake captcha",
            "html",
            "hta script",
            "lumma payload",
            "filehashsha256",
            "indicator type",
            "sha256 lnk",
            "ports",
            "first stage",
            "md5 file",
            "domains",
            "reddelta c2",
            "servers",
            "octoberdecember",
            "shortcut",
            "files",
            "solo airfield",
            "quoc",
            "bctt",
            "kongtuke",
            "mintsloader c2",
            "js download",
            "c2 http",
            "boinc c2",
            "c2 address",
            "analyzed",
            "file name",
            "na stark",
            "na majestic",
            "description",
            "trojanized",
            "beavertail",
            "anydesk module",
            "domain hosting",
            "first",
            "details",
            "monitor",
            "sites",
            "fake chrome",
            "payload host",
            "c2 https",
            "examples",
            "atomic stealer",
            "c2 servers",
            "cthulhu stealer",
            "server http",
            "l files",
            "original",
            "iocs malicious",
            "mirrowsimps",
            "defanged",
            "strike loaders",
            "plugx",
            "plugx c2",
            "sspiuacbypass",
            "malware",
            "malware c2",
            "filehashmd5",
            "site",
            "orgvgodpayment",
            "quite solsjoas",
            "ioc sha256",
            "similar sha256",
            "http",
            "url hundreds",
            "url samples",
            "filehash",
            "guidloader",
            "finaldraft elf",
            "type name",
            "reference",
            "finaldraft",
            "sha256 pfman",
            "pathloader",
            "atomic https",
            "systembc",
            "ghostsocks",
            "invisibleferret",
            "vant",
            "rspackcore",
            "monero",
            "sha256 hash",
            "code snippets",
            "psexec",
            "ituneshelper",
            "pscp",
            "sftp",
            "googleupdate",
            "meshagent",
            "ultravnc",
            "file",
            "bootkitty iocs",
            "phpsert",
            "phpsert variant",
            "createdump tool",
            "visual studio",
            "code",
            "server",
            "sql injection",
            "studio code",
            "ssh access",
            "hta file",
            "vbshower c2",
            "powershower c2",
            "cloud",
            "hta md5",
            "domain name",
            "links",
            "c http",
            "horns",
            "version",
            "version b",
            "version c",
            "version d",
            "version e",
            "burnsrat c",
            "a http",
            "github users",
            "shell commands",
            "vssadmin delete",
            "userprofile",
            "public",
            "registry keys",
            "phobos",
            "lettointago",
            "carljohnson1948",
            "samuelwhite1821",
            "file hash",
            "lockbit",
            "indicatortype",
            "data",
            "mlpea",
            "w32neshtad",
            "gmer",
            "neshta",
            "opswat oesis",
            "v4 removal"
          ],
          "references": [
            "Bootkitty",
            "Glove-Stealer",
            "Fake Discount Sites Exploit Black Friday",
            "Helldown Ransomware",
            "HawkEye Malware",
            "PXA Stealer",
            "Iranian Hackers Use GitHub and Phishing to Evade Detection in SnailResin Attack",
            "BrazenBamboo",
            "SpyGlace",
            "RustyStealer and New Ymir Ransomware",
            "PyPI-AIOCPA",
            "Python NodeStealer",
            "romcom-exploits-firefox-and-windows",
            "Rockstar-Phishing",
            "Silent Skimmer Gets Loud (Again)",
            "SteelFox Trojan",
            "WezRat Malware",
            "Avast-Anti-Root-KIt",
            "Winos4.0 RAT",
            "APT36",
            "WolfsBane Backdoor",
            "APT-K-47",
            "Remcos RAT",
            "babbleloader",
            "Bitter APT",
            "UAC-0194\u2019s Exploitation of CVE-2024-43451 in Ukraine for Phishing",
            "CloudScout_ Evasive Panda scouting cloud services",
            "clickfix-tactic",
            "Akira Ransomware",
            "Bumblebee Malware",
            "ELDORADO RANSOMWARE",
            "Evasive Panda Uses MACMA and MgBot Malware to Target US and Taiwan",
            "Demodex rootkit",
            "BugSleep Malware",
            "HotPage.exe (malware)",
            "Qilin Ransomware",
            "NOOPDOOR Malware",
            "Shadowroot Ransomware",
            "play ransomware",
            "MALLOX RANSOMWARE",
            "New Malware Campaign Abusing RDPWrapper and Tailscale to Target Cryptocurrency Users",
            "ACR Stealer",
            "Suspicious Domains Exploiting the Recent CrowdStrike Outage!",
            "Gh0stGambit",
            "MEKOTIO BANKING TROJAN",
            "TAG-100",
            "Fake game sites lead to information stealers",
            "Chrome Extensions Hijacked, 2.6 Million Users Impacted",
            "macOS Users Targeted by the New Variant of Banshee Infostealer",
            "Hundreds of fake Reddit sites push Lumma Stealer malware",
            "GamaCopy APT Group Mimicking GamaRedon",
            "InvisibleFerret Malware Leveraging Python for Targeted Attacks",
            "Fake CAPTCHA Campaign That Spreads LUMMA Info Stealer",
            "REF5961 Group Deploys EAGERBEE Backdoor Against Critical Sectors",
            "Phishing Campaigns Fuel Compiled AutoIt Malware Distribution",
            "The great Google Ads heist_ criminals ransack advertiser accounts via fake Google ads",
            "New Star Blizzard spear-phishing campaign targets WhatsApp accounts",
            "RansomHub Affiliate leverages Python-based backdoor",
            "Sliver Implant Targets German Entities with DLL Sideloading and Proxying Techniques",
            "Advanced Evasion Techniques Used by NonEuclid RAT",
            "The Return of PlugX Malware with Fresh Tricks",
            "The Growing Risk of Sneaky 2FA for Microsoft and Gmail Accounts",
            "Weaponized Software Targeting Chinese Organizations",
            "Threat Surge as Lumma Stealer Expands Its Reach",
            "Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain",
            "MintsLoader_Stealc",
            "North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks",
            "North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware",
            "Rat Race_ ValleyRAT Malware Targets Organizations with New Delivery Techniques",
            "Salt Typhoon  Target U.S. Telecom Networks",
            "SecTopRAT",
            "Stealers on the Rise",
            "Snake Keylogger",
            "AsyncRAT Reloaded",
            "The BadPilot campaign_ Seashell Blizzard subgroup conducts multiyear global access operation",
            "FatalRAT",
            "SystemBC RAT Poses New Risks to Linux System",
            "Unveiling Silent Lynx APT Targeting Entities Across Kyrgyzstan & Neighbouring Nations",
            "FERRET Malware Targets macOS in Sophisticated North Korean Attacks",
            "Espionage Campaign Targeting South Asian Entities",
            "Astral Stealer Strikes Again Stealing More Than Just Your Cookies",
            "The New Ransomware Menace Vgod Gains Momentum",
            "Microsoft Advertisers Phished via Malicious Google Ads",
            "LegionLoader Malware Expands Global Reach",
            "NEW.txt",
            "From Stealers to Ransomware PureCrypter Delivers It All",
            "New Phishing Campaign Abuses Webflow, SEO, and Fake CAPTCHAs",
            "FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux",
            "LockBit Ransomware Attack Leveraging Cobalt Strike",
            "Rspack_Compromised_Packages",
            "SmokeLoader",
            "Sock5Systemz-PROXY-AM",
            "solana-backdoor",
            "U.S. Organization in China Targeted by Attackers",
            "UAC-0185 attacks warned by CERT-UA",
            "BellaCpp",
            "bootkitty(logofail)",
            "Visual Studio Code Remote tunnels",
            "Cloud Atlas seen using a new tool in its attacks",
            "Christmas-Themed LNK Files Used for Malware Delivery",
            "DarkGate",
            "MirrorFace Campain",
            "horns-hooves",
            "Developers Targeted by New \u2018OtterCookie\u2019 Malware with Fake Job Offers",
            "NetSupport RAT and BurnsRAT",
            "Cybercriminals Leverage Fake CAPTCHAs for Malware Delivery",
            "MUT-1244-GitHub",
            "Phobos ransomware",
            "Python Malware in Zebo-0.1.0 and Cometlogger-0.1 Found Stealing User Data",
            "PUMAKIT",
            "OtterCookie used by Contagious Interview",
            "Ransomware-Lockbit3-IOCs.csv"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Mekotio Banking",
              "display_name": "Mekotio Banking",
              "target": null
            },
            {
              "id": "TrojanSpy",
              "display_name": "TrojanSpy",
              "target": null
            },
            {
              "id": "MSI",
              "display_name": "MSI",
              "target": null
            },
            {
              "id": "InvisibleFerret",
              "display_name": "InvisibleFerret",
              "target": null
            },
            {
              "id": "Vant",
              "display_name": "Vant",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1140",
              "name": "Deobfuscate/Decode Files or Information",
              "display_name": "T1140 - Deobfuscate/Decode Files or Information"
            },
            {
              "id": "T1176",
              "name": "Browser Extensions",
              "display_name": "T1176 - Browser Extensions"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 84,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "Badderawy",
            "id": "310597",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "FileHash-MD5": 950,
            "FileHash-SHA1": 847,
            "FileHash-SHA256": 1060,
            "hostname": 1158,
            "domain": 867,
            "URL": 813,
            "email": 77,
            "CIDR": 2,
            "CVE": 9
          },
          "indicator_count": 5783,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 27,
          "modified_text": "381 days ago ",
          "is_modified": true,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "67605e1014eb611bf6c3ea80",
          "name": "\u201cDeceptionAds\u201d \u2014 Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising",
          "description": "Guardio Labs reported on a large-scale fake captcha campaign distributing Lumma Stealer that circumvents general security measures like Safe Browsing. The campaign relies entirely on a single ad network for propagation (malvertising), Monetag, a subsidiary of ProepllerAds previously tracked by Infoblox under the name \u201cVane Viper.\u201d These ads, leveraging BeMob for tracking, receive over 1 million daily \u201cimpressions,\u201d potentially causing thousands of daily infections of Lumma Stealer\u00a0through a network of\u00a03,000+\u00a0sites using Monetag scripts. The research dissects this campaign and provides insights into the malvertising industry\u2019s infrastructure, tactics, and key players.",
          "modified": "2024-12-16T17:06:24.698000",
          "created": "2024-12-16T17:06:24.698000",
          "tags": [
            "Malvertising",
            "Lumma Stealer",
            "BeMob Ad Tracking"
          ],
          "references": [
            "https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Lumma Stealer",
              "display_name": "Lumma Stealer",
              "target": null
            }
          ],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 8,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "eric.ford",
            "id": "42510",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_42510/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 92,
            "URL": 94,
            "FileHash-MD5": 1,
            "hostname": 4
          },
          "indicator_count": 191,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 128,
          "modified_text": "484 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "676049d097dee16008d10a76",
          "name": "\u201cDeceptionAds\u201d \u2014 Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising",
          "description": "Research by Guardio Labs sheds light on the dark side of the internet advertising industry, revealing how malvertising on steroids is thriving and how web users are vulnerable to the threat of cyber-thieves.",
          "modified": "2024-12-16T15:40:00.031000",
          "created": "2024-12-16T15:40:00.031000",
          "tags": [
            "monetag",
            "bemob",
            "infoblox",
            "facebook",
            "guardio labs",
            "powershell",
            "system",
            "javascript",
            "js snippet",
            "service",
            "download",
            "example",
            "rest",
            "captcha lumma",
            "monetag tds"
          ],
          "references": [
            "https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6"
          ],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [
            {
              "id": "Captcha Lumma",
              "display_name": "Captcha Lumma",
              "target": null
            },
            {
              "id": "Monetag TDS",
              "display_name": "Monetag TDS",
              "target": null
            }
          ],
          "attack_ids": [
            {
              "id": "T1189",
              "name": "Drive-by Compromise",
              "display_name": "T1189 - Drive-by Compromise"
            },
            {
              "id": "T1036",
              "name": "Masquerading",
              "display_name": "T1036 - Masquerading"
            },
            {
              "id": "T1055",
              "name": "Process Injection",
              "display_name": "T1055 - Process Injection"
            },
            {
              "id": "T1566",
              "name": "Phishing",
              "display_name": "T1566 - Phishing"
            }
          ],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 5,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "CyberHunter_NL",
            "id": "171283",
            "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_171283/resized/80/avatar_3b9c358f36.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 92,
            "URL": 94,
            "FileHash-MD5": 1,
            "hostname": 4
          },
          "indicator_count": 191,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 843,
          "modified_text": "484 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": true,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        },
        {
          "id": "6747ae5423483853dd03a506",
          "name": "ClickFix Baddys via RussianPanda's Workflow",
          "description": "https://malasada.tech/clickfix-baddys-via-russianpandas-workflow/",
          "modified": "2024-11-27T23:42:12.555000",
          "created": "2024-11-27T23:42:12.555000",
          "tags": [
            "ClickFix"
          ],
          "references": [],
          "public": 1,
          "adversary": "",
          "targeted_countries": [],
          "malware_families": [],
          "attack_ids": [],
          "industries": [],
          "TLP": "white",
          "cloned_from": null,
          "export_count": 0,
          "upvotes_count": 0,
          "downvotes_count": 0,
          "votes_count": 0,
          "locked": false,
          "pulse_source": "web",
          "validator_count": 0,
          "comment_count": 0,
          "follower_count": 0,
          "vote": 0,
          "author": {
            "username": "malasada.tech",
            "id": "277538",
            "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
            "is_subscribed": false,
            "is_following": false
          },
          "indicator_type_counts": {
            "domain": 147,
            "hostname": 8
          },
          "indicator_count": 155,
          "is_author": false,
          "is_subscribing": null,
          "subscriber_count": 28,
          "modified_text": "503 days ago ",
          "is_modified": false,
          "groups": [],
          "in_group": false,
          "threat_hunter_scannable": false,
          "threat_hunter_has_agents": 1,
          "related_indicator_type": "domain",
          "related_indicator_is_active": 1
        }
      ],
      "references": [
        "SecTopRAT",
        "From Stealers to Ransomware PureCrypter Delivers It All",
        "SystemBC RAT Poses New Risks to Linux System",
        "TAG-100",
        "UAC-0185 attacks warned by CERT-UA",
        "DarkGate",
        "FatalRAT",
        "Helldown Ransomware",
        "Snake Keylogger",
        "Threat Surge as Lumma Stealer Expands Its Reach",
        "SpyGlace",
        "PUMAKIT",
        "AsyncRAT Reloaded",
        "U.S. Organization in China Targeted by Attackers",
        "solana-backdoor",
        "Rockstar-Phishing",
        "Fake Discount Sites Exploit Black Friday",
        "Phobos ransomware",
        "WolfsBane Backdoor",
        "New Star Blizzard spear-phishing campaign targets WhatsApp accounts",
        "Glove-Stealer",
        "Phishing Campaigns Fuel Compiled AutoIt Malware Distribution",
        "APT36",
        "The BadPilot campaign_ Seashell Blizzard subgroup conducts multiyear global access operation",
        "Shadowroot Ransomware",
        "BellaCpp",
        "Silent Skimmer Gets Loud (Again)",
        "Iranian Hackers Use GitHub and Phishing to Evade Detection in SnailResin Attack",
        "Astral Stealer Strikes Again Stealing More Than Just Your Cookies",
        "Gh0stGambit",
        "Bitter APT",
        "REF5961 Group Deploys EAGERBEE Backdoor Against Critical Sectors",
        "Fake game sites lead to information stealers",
        "MUT-1244-GitHub",
        "HotPage.exe (malware)",
        "Hundreds of fake Reddit sites push Lumma Stealer malware",
        "Python NodeStealer",
        "Sliver Implant Targets German Entities with DLL Sideloading and Proxying Techniques",
        "GamaCopy APT Group Mimicking GamaRedon",
        "Akira Ransomware",
        "Remcos RAT",
        "Winos4.0 RAT",
        "Chrome Extensions Hijacked, 2.6 Million Users Impacted",
        "FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux",
        "North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware",
        "LockBit Ransomware Attack Leveraging Cobalt Strike",
        "CloudScout_ Evasive Panda scouting cloud services",
        "BugSleep Malware",
        "Evasive Panda Uses MACMA and MgBot Malware to Target US and Taiwan",
        "HawkEye Malware",
        "Visual Studio Code Remote tunnels",
        "Espionage Campaign Targeting South Asian Entities",
        "New Phishing Campaign Abuses Webflow, SEO, and Fake CAPTCHAs",
        "Weaponized Software Targeting Chinese Organizations",
        "Bootkitty",
        "The Return of PlugX Malware with Fresh Tricks",
        "BrazenBamboo",
        "MALLOX RANSOMWARE",
        "Cybercriminals Leverage Fake CAPTCHAs for Malware Delivery",
        "Ransomware-Lockbit3-IOCs.csv",
        "The Growing Risk of Sneaky 2FA for Microsoft and Gmail Accounts",
        "Demodex rootkit",
        "NetSupport RAT and BurnsRAT",
        "Microsoft Advertisers Phished via Malicious Google Ads",
        "https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6",
        "NOOPDOOR Malware",
        "InvisibleFerret Malware Leveraging Python for Targeted Attacks",
        "ELDORADO RANSOMWARE",
        "Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain",
        "horns-hooves",
        "bootkitty(logofail)",
        "LegionLoader Malware Expands Global Reach",
        "Qilin Ransomware",
        "clickfix-tactic",
        "MirrorFace Campain",
        "Advanced Evasion Techniques Used by NonEuclid RAT",
        "OtterCookie used by Contagious Interview",
        "MintsLoader_Stealc",
        "The great Google Ads heist_ criminals ransack advertiser accounts via fake Google ads",
        "North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks",
        "babbleloader",
        "Suspicious Domains Exploiting the Recent CrowdStrike Outage!",
        "play ransomware",
        "APT-K-47",
        "NEW.txt",
        "RansomHub Affiliate leverages Python-based backdoor",
        "SmokeLoader",
        "Fake CAPTCHA Campaign That Spreads LUMMA Info Stealer",
        "Rat Race_ ValleyRAT Malware Targets Organizations with New Delivery Techniques",
        "ACR Stealer",
        "PyPI-AIOCPA",
        "Cloud Atlas seen using a new tool in its attacks",
        "Developers Targeted by New \u2018OtterCookie\u2019 Malware with Fake Job Offers",
        "PXA Stealer",
        "WezRat Malware",
        "UAC-0194\u2019s Exploitation of CVE-2024-43451 in Ukraine for Phishing",
        "Bumblebee Malware",
        "Sock5Systemz-PROXY-AM",
        "macOS Users Targeted by the New Variant of Banshee Infostealer",
        "RustyStealer and New Ymir Ransomware",
        "MEKOTIO BANKING TROJAN",
        "Avast-Anti-Root-KIt",
        "New Malware Campaign Abusing RDPWrapper and Tailscale to Target Cryptocurrency Users",
        "Python Malware in Zebo-0.1.0 and Cometlogger-0.1 Found Stealing User Data",
        "SteelFox Trojan",
        "Rspack_Compromised_Packages",
        "FERRET Malware Targets macOS in Sophisticated North Korean Attacks",
        "romcom-exploits-firefox-and-windows",
        "Christmas-Themed LNK Files Used for Malware Delivery",
        "The New Ransomware Menace Vgod Gains Momentum",
        "Salt Typhoon  Target U.S. Telecom Networks",
        "Stealers on the Rise",
        "Unveiling Silent Lynx APT Targeting Entities Across Kyrgyzstan & Neighbouring Nations"
      ],
      "related": {
        "alienvault": {
          "adversary": [],
          "malware_families": [
            "Lumma"
          ],
          "industries": []
        },
        "other": {
          "adversary": [],
          "malware_families": [
            "Trojanspy",
            "Lumma stealer",
            "Captcha lumma",
            "Vant",
            "Invisibleferret",
            "Msi",
            "Monetag tds",
            "Mekotio banking"
          ],
          "industries": []
        }
      }
    },
    "false_positive": []
  },
  "geo": {},
  "geo_ipapicom": {},
  "pulse_count": 5,
  "pulses": [
    {
      "id": "676306f0c8585adcdf26393c",
      "name": "Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising",
      "description": "A large-scale fake captcha campaign has been distributing Lumma info-stealer malware through malvertising techniques. The campaign, relying on a single ad network, delivers over 1 million daily ad impressions, causing thousands of daily victims to lose their accounts and money. The malicious activity is propagated through a network of 3,000+ content sites funneling traffic. The campaign uses deceptive captcha pages that trick users into executing PowerShell commands, instantly installing stealer malware. The ad network Monetag, a subsidiary of PropellerAds, is identified as the primary facilitator. The threat actors leverage services like BeMob for cloaking, showcasing the fragmented accountability in the ad ecosystem. The campaign's success highlights the need for stronger proactive measures in ad networks and the importance of user caution when encountering free content online.",
      "modified": "2024-12-19T15:07:29.449000",
      "created": "2024-12-18T17:31:28.951000",
      "tags": [
        "malvertising",
        "powershell",
        "lumma stealer",
        "fake captcha"
      ],
      "references": [
        "https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Lumma",
          "display_name": "Lumma",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1132.001",
          "name": "Standard Encoding",
          "display_name": "T1132.001 - Standard Encoding"
        },
        {
          "id": "T1056.001",
          "name": "Keylogging",
          "display_name": "T1056.001 - Keylogging"
        },
        {
          "id": "T1204.002",
          "name": "Malicious File",
          "display_name": "T1204.002 - Malicious File"
        },
        {
          "id": "T1566.002",
          "name": "Spearphishing Link",
          "display_name": "T1566.002 - Spearphishing Link"
        },
        {
          "id": "T1608.001",
          "name": "Upload Malware",
          "display_name": "T1608.001 - Upload Malware"
        },
        {
          "id": "T1185",
          "name": "Man in the Browser",
          "display_name": "T1185 - Man in the Browser"
        },
        {
          "id": "T1568",
          "name": "Dynamic Resolution",
          "display_name": "T1568 - Dynamic Resolution"
        },
        {
          "id": "T1059.001",
          "name": "PowerShell",
          "display_name": "T1059.001 - PowerShell"
        },
        {
          "id": "T1102.002",
          "name": "Bidirectional Communication",
          "display_name": "T1102.002 - Bidirectional Communication"
        },
        {
          "id": "T1071.001",
          "name": "Web Protocols",
          "display_name": "T1071.001 - Web Protocols"
        },
        {
          "id": "T1056.004",
          "name": "Credential API Hooking",
          "display_name": "T1056.004 - Credential API Hooking"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 50,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "api",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "AlienVault",
        "id": "2",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_2/resized/80/avatar_dacfad0ca8.png",
        "is_subscribed": true,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 29,
        "FileHash-MD5": 1,
        "hostname": 2
      },
      "indicator_count": 32,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 376757,
      "modified_text": "481 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "67c0cdc35112c5919563a334",
      "name": "Intel is bad awy",
      "description": "",
      "modified": "2025-03-29T20:01:20.482000",
      "created": "2025-02-27T20:40:35.539000",
      "tags": [
        "sign",
        "github",
        "find",
        "view",
        "search",
        "strong",
        "code issues",
        "pull",
        "breadcrumbs",
        "damn",
        "star",
        "footer",
        "sha1",
        "helldown linux",
        "iocs helldown",
        "windows payload",
        "icon",
        "darkrace",
        "donex",
        "ransom",
        "defanged file",
        "hashes",
        "ipv4",
        "sha256",
        "c2 ip",
        "address",
        "plugin",
        "brazanbamboo c2",
        "panel",
        "archive file",
        "bha006",
        "telegram bot",
        "token",
        "chat id",
        "sha256 hashes",
        "iocs",
        "intermediary",
        "landing",
        "aitm server",
        "compromise note",
        "hashes payload",
        "loader",
        "dropper",
        "ips https",
        "urls https",
        "duoyi",
        "ioc url",
        "ipv4 address",
        "c2 server",
        "sample sha256",
        "remcos",
        "decrypted",
        "urls http",
        "payload",
        "amos stealer",
        "stealc c2",
        "rhadamanthys c2",
        "phishing urls",
        "google meet",
        "amos steaker",
        "html payload",
        "stealc payload",
        "md5 hashes",
        "sha1 hashes",
        "iocs zip",
        "lnk file",
        "msi file",
        "payload url",
        "eldorado",
        "linux",
        "service dll",
        "cheat engine",
        "c2 domain",
        "compromise",
        "urls",
        "iocs files",
        "network ip",
        "domain",
        "malware hash",
        "noopldr type1",
        "noopldr type2",
        "download url",
        "email addresses",
        "block",
        "ioc http",
        "iocs hash",
        "url https",
        "ghostgambit",
        "hidden rootkit",
        "gh0strat",
        "mekotio banking",
        "financial",
        "latin america",
        "detected",
        "zipmsi",
        "downloader",
        "ip address",
        "cobalt strike",
        "first seen",
        "seen",
        "pantegana",
        "tls certificate",
        "fingerprint",
        "samples",
        "trojanspy",
        "msi",
        "subdomains",
        "reddit",
        "wetransfer",
        "ioc hash",
        "file hashes",
        "ip addresses",
        "fake captcha",
        "html",
        "hta script",
        "lumma payload",
        "filehashsha256",
        "indicator type",
        "sha256 lnk",
        "ports",
        "first stage",
        "md5 file",
        "domains",
        "reddelta c2",
        "servers",
        "octoberdecember",
        "shortcut",
        "files",
        "solo airfield",
        "quoc",
        "bctt",
        "kongtuke",
        "mintsloader c2",
        "js download",
        "c2 http",
        "boinc c2",
        "c2 address",
        "analyzed",
        "file name",
        "na stark",
        "na majestic",
        "description",
        "trojanized",
        "beavertail",
        "anydesk module",
        "domain hosting",
        "first",
        "details",
        "monitor",
        "sites",
        "fake chrome",
        "payload host",
        "c2 https",
        "examples",
        "atomic stealer",
        "c2 servers",
        "cthulhu stealer",
        "server http",
        "l files",
        "original",
        "iocs malicious",
        "mirrowsimps",
        "defanged",
        "strike loaders",
        "plugx",
        "plugx c2",
        "sspiuacbypass",
        "malware",
        "malware c2",
        "filehashmd5",
        "site",
        "orgvgodpayment",
        "quite solsjoas",
        "ioc sha256",
        "similar sha256",
        "http",
        "url hundreds",
        "url samples",
        "filehash",
        "guidloader",
        "finaldraft elf",
        "type name",
        "reference",
        "finaldraft",
        "sha256 pfman",
        "pathloader",
        "atomic https",
        "systembc",
        "ghostsocks",
        "invisibleferret",
        "vant",
        "rspackcore",
        "monero",
        "sha256 hash",
        "code snippets",
        "psexec",
        "ituneshelper",
        "pscp",
        "sftp",
        "googleupdate",
        "meshagent",
        "ultravnc",
        "file",
        "bootkitty iocs",
        "phpsert",
        "phpsert variant",
        "createdump tool",
        "visual studio",
        "code",
        "server",
        "sql injection",
        "studio code",
        "ssh access",
        "hta file",
        "vbshower c2",
        "powershower c2",
        "cloud",
        "hta md5",
        "domain name",
        "links",
        "c http",
        "horns",
        "version",
        "version b",
        "version c",
        "version d",
        "version e",
        "burnsrat c",
        "a http",
        "github users",
        "shell commands",
        "vssadmin delete",
        "userprofile",
        "public",
        "registry keys",
        "phobos",
        "lettointago",
        "carljohnson1948",
        "samuelwhite1821",
        "file hash",
        "lockbit",
        "indicatortype",
        "data",
        "mlpea",
        "w32neshtad",
        "gmer",
        "neshta",
        "opswat oesis",
        "v4 removal"
      ],
      "references": [
        "Bootkitty",
        "Glove-Stealer",
        "Fake Discount Sites Exploit Black Friday",
        "Helldown Ransomware",
        "HawkEye Malware",
        "PXA Stealer",
        "Iranian Hackers Use GitHub and Phishing to Evade Detection in SnailResin Attack",
        "BrazenBamboo",
        "SpyGlace",
        "RustyStealer and New Ymir Ransomware",
        "PyPI-AIOCPA",
        "Python NodeStealer",
        "romcom-exploits-firefox-and-windows",
        "Rockstar-Phishing",
        "Silent Skimmer Gets Loud (Again)",
        "SteelFox Trojan",
        "WezRat Malware",
        "Avast-Anti-Root-KIt",
        "Winos4.0 RAT",
        "APT36",
        "WolfsBane Backdoor",
        "APT-K-47",
        "Remcos RAT",
        "babbleloader",
        "Bitter APT",
        "UAC-0194\u2019s Exploitation of CVE-2024-43451 in Ukraine for Phishing",
        "CloudScout_ Evasive Panda scouting cloud services",
        "clickfix-tactic",
        "Akira Ransomware",
        "Bumblebee Malware",
        "ELDORADO RANSOMWARE",
        "Evasive Panda Uses MACMA and MgBot Malware to Target US and Taiwan",
        "Demodex rootkit",
        "BugSleep Malware",
        "HotPage.exe (malware)",
        "Qilin Ransomware",
        "NOOPDOOR Malware",
        "Shadowroot Ransomware",
        "play ransomware",
        "MALLOX RANSOMWARE",
        "New Malware Campaign Abusing RDPWrapper and Tailscale to Target Cryptocurrency Users",
        "ACR Stealer",
        "Suspicious Domains Exploiting the Recent CrowdStrike Outage!",
        "Gh0stGambit",
        "MEKOTIO BANKING TROJAN",
        "TAG-100",
        "Fake game sites lead to information stealers",
        "Chrome Extensions Hijacked, 2.6 Million Users Impacted",
        "macOS Users Targeted by the New Variant of Banshee Infostealer",
        "Hundreds of fake Reddit sites push Lumma Stealer malware",
        "GamaCopy APT Group Mimicking GamaRedon",
        "InvisibleFerret Malware Leveraging Python for Targeted Attacks",
        "Fake CAPTCHA Campaign That Spreads LUMMA Info Stealer",
        "REF5961 Group Deploys EAGERBEE Backdoor Against Critical Sectors",
        "Phishing Campaigns Fuel Compiled AutoIt Malware Distribution",
        "The great Google Ads heist_ criminals ransack advertiser accounts via fake Google ads",
        "New Star Blizzard spear-phishing campaign targets WhatsApp accounts",
        "RansomHub Affiliate leverages Python-based backdoor",
        "Sliver Implant Targets German Entities with DLL Sideloading and Proxying Techniques",
        "Advanced Evasion Techniques Used by NonEuclid RAT",
        "The Return of PlugX Malware with Fresh Tricks",
        "The Growing Risk of Sneaky 2FA for Microsoft and Gmail Accounts",
        "Weaponized Software Targeting Chinese Organizations",
        "Threat Surge as Lumma Stealer Expands Its Reach",
        "Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain",
        "MintsLoader_Stealc",
        "North Korean APT43 Uses PowerShell and Dropbox in Targeted South Korea Cyberattacks",
        "North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware",
        "Rat Race_ ValleyRAT Malware Targets Organizations with New Delivery Techniques",
        "Salt Typhoon  Target U.S. Telecom Networks",
        "SecTopRAT",
        "Stealers on the Rise",
        "Snake Keylogger",
        "AsyncRAT Reloaded",
        "The BadPilot campaign_ Seashell Blizzard subgroup conducts multiyear global access operation",
        "FatalRAT",
        "SystemBC RAT Poses New Risks to Linux System",
        "Unveiling Silent Lynx APT Targeting Entities Across Kyrgyzstan & Neighbouring Nations",
        "FERRET Malware Targets macOS in Sophisticated North Korean Attacks",
        "Espionage Campaign Targeting South Asian Entities",
        "Astral Stealer Strikes Again Stealing More Than Just Your Cookies",
        "The New Ransomware Menace Vgod Gains Momentum",
        "Microsoft Advertisers Phished via Malicious Google Ads",
        "LegionLoader Malware Expands Global Reach",
        "NEW.txt",
        "From Stealers to Ransomware PureCrypter Delivers It All",
        "New Phishing Campaign Abuses Webflow, SEO, and Fake CAPTCHAs",
        "FINALDRAFT Malware Exploits Microsoft Graph API for Espionage on Windows and Linux",
        "LockBit Ransomware Attack Leveraging Cobalt Strike",
        "Rspack_Compromised_Packages",
        "SmokeLoader",
        "Sock5Systemz-PROXY-AM",
        "solana-backdoor",
        "U.S. Organization in China Targeted by Attackers",
        "UAC-0185 attacks warned by CERT-UA",
        "BellaCpp",
        "bootkitty(logofail)",
        "Visual Studio Code Remote tunnels",
        "Cloud Atlas seen using a new tool in its attacks",
        "Christmas-Themed LNK Files Used for Malware Delivery",
        "DarkGate",
        "MirrorFace Campain",
        "horns-hooves",
        "Developers Targeted by New \u2018OtterCookie\u2019 Malware with Fake Job Offers",
        "NetSupport RAT and BurnsRAT",
        "Cybercriminals Leverage Fake CAPTCHAs for Malware Delivery",
        "MUT-1244-GitHub",
        "Phobos ransomware",
        "Python Malware in Zebo-0.1.0 and Cometlogger-0.1 Found Stealing User Data",
        "PUMAKIT",
        "OtterCookie used by Contagious Interview",
        "Ransomware-Lockbit3-IOCs.csv"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Mekotio Banking",
          "display_name": "Mekotio Banking",
          "target": null
        },
        {
          "id": "TrojanSpy",
          "display_name": "TrojanSpy",
          "target": null
        },
        {
          "id": "MSI",
          "display_name": "MSI",
          "target": null
        },
        {
          "id": "InvisibleFerret",
          "display_name": "InvisibleFerret",
          "target": null
        },
        {
          "id": "Vant",
          "display_name": "Vant",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1140",
          "name": "Deobfuscate/Decode Files or Information",
          "display_name": "T1140 - Deobfuscate/Decode Files or Information"
        },
        {
          "id": "T1176",
          "name": "Browser Extensions",
          "display_name": "T1176 - Browser Extensions"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 84,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "Badderawy",
        "id": "310597",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "FileHash-MD5": 950,
        "FileHash-SHA1": 847,
        "FileHash-SHA256": 1060,
        "hostname": 1158,
        "domain": 867,
        "URL": 813,
        "email": 77,
        "CIDR": 2,
        "CVE": 9
      },
      "indicator_count": 5783,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 27,
      "modified_text": "381 days ago ",
      "is_modified": true,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "67605e1014eb611bf6c3ea80",
      "name": "\u201cDeceptionAds\u201d \u2014 Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising",
      "description": "Guardio Labs reported on a large-scale fake captcha campaign distributing Lumma Stealer that circumvents general security measures like Safe Browsing. The campaign relies entirely on a single ad network for propagation (malvertising), Monetag, a subsidiary of ProepllerAds previously tracked by Infoblox under the name \u201cVane Viper.\u201d These ads, leveraging BeMob for tracking, receive over 1 million daily \u201cimpressions,\u201d potentially causing thousands of daily infections of Lumma Stealer\u00a0through a network of\u00a03,000+\u00a0sites using Monetag scripts. The research dissects this campaign and provides insights into the malvertising industry\u2019s infrastructure, tactics, and key players.",
      "modified": "2024-12-16T17:06:24.698000",
      "created": "2024-12-16T17:06:24.698000",
      "tags": [
        "Malvertising",
        "Lumma Stealer",
        "BeMob Ad Tracking"
      ],
      "references": [
        "https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Lumma Stealer",
          "display_name": "Lumma Stealer",
          "target": null
        }
      ],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 8,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "eric.ford",
        "id": "42510",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_42510/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 92,
        "URL": 94,
        "FileHash-MD5": 1,
        "hostname": 4
      },
      "indicator_count": 191,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 128,
      "modified_text": "484 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "676049d097dee16008d10a76",
      "name": "\u201cDeceptionAds\u201d \u2014 Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising",
      "description": "Research by Guardio Labs sheds light on the dark side of the internet advertising industry, revealing how malvertising on steroids is thriving and how web users are vulnerable to the threat of cyber-thieves.",
      "modified": "2024-12-16T15:40:00.031000",
      "created": "2024-12-16T15:40:00.031000",
      "tags": [
        "monetag",
        "bemob",
        "infoblox",
        "facebook",
        "guardio labs",
        "powershell",
        "system",
        "javascript",
        "js snippet",
        "service",
        "download",
        "example",
        "rest",
        "captcha lumma",
        "monetag tds"
      ],
      "references": [
        "https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6"
      ],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [
        {
          "id": "Captcha Lumma",
          "display_name": "Captcha Lumma",
          "target": null
        },
        {
          "id": "Monetag TDS",
          "display_name": "Monetag TDS",
          "target": null
        }
      ],
      "attack_ids": [
        {
          "id": "T1189",
          "name": "Drive-by Compromise",
          "display_name": "T1189 - Drive-by Compromise"
        },
        {
          "id": "T1036",
          "name": "Masquerading",
          "display_name": "T1036 - Masquerading"
        },
        {
          "id": "T1055",
          "name": "Process Injection",
          "display_name": "T1055 - Process Injection"
        },
        {
          "id": "T1566",
          "name": "Phishing",
          "display_name": "T1566 - Phishing"
        }
      ],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 5,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "CyberHunter_NL",
        "id": "171283",
        "avatar_url": "/otxapi/users/avatar_image/media/avatars/user_171283/resized/80/avatar_3b9c358f36.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 92,
        "URL": 94,
        "FileHash-MD5": 1,
        "hostname": 4
      },
      "indicator_count": 191,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 843,
      "modified_text": "484 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": true,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    },
    {
      "id": "6747ae5423483853dd03a506",
      "name": "ClickFix Baddys via RussianPanda's Workflow",
      "description": "https://malasada.tech/clickfix-baddys-via-russianpandas-workflow/",
      "modified": "2024-11-27T23:42:12.555000",
      "created": "2024-11-27T23:42:12.555000",
      "tags": [
        "ClickFix"
      ],
      "references": [],
      "public": 1,
      "adversary": "",
      "targeted_countries": [],
      "malware_families": [],
      "attack_ids": [],
      "industries": [],
      "TLP": "white",
      "cloned_from": null,
      "export_count": 0,
      "upvotes_count": 0,
      "downvotes_count": 0,
      "votes_count": 0,
      "locked": false,
      "pulse_source": "web",
      "validator_count": 0,
      "comment_count": 0,
      "follower_count": 0,
      "vote": 0,
      "author": {
        "username": "malasada.tech",
        "id": "277538",
        "avatar_url": "https://otx.alienvault.com/assets/images/default-avatar.png",
        "is_subscribed": false,
        "is_following": false
      },
      "indicator_type_counts": {
        "domain": 147,
        "hostname": 8
      },
      "indicator_count": 155,
      "is_author": false,
      "is_subscribing": null,
      "subscriber_count": 28,
      "modified_text": "503 days ago ",
      "is_modified": false,
      "groups": [],
      "in_group": false,
      "threat_hunter_scannable": false,
      "threat_hunter_has_agents": 1,
      "related_indicator_type": "domain",
      "related_indicator_is_active": 1
    }
  ],
  "error": null,
  "vt": {
    "error": "VirusTotal rate limit reached. Try again shortly.",
    "indicator": "taketheright.com",
    "type": "Domain"
  },
  "abuseipdb": null,
  "urlhaus": {
    "indicator": "taketheright.com",
    "found": false,
    "verdict": "clean",
    "urls": [],
    "error": null
  },
  "from_cache": true,
  "_cached_at": 1776245337.8452837
}