Threat Flash:

32K MALICIOUS IPs CONFIRMED

IN FEBRUARY

Threat Research Team

In February, Augur independently identified 32,361 malicious IP addresses that were later validated by third-party intelligence providers, reinforcing its ability to surface emerging threat infrastructure well before conventional feeds catch up.

Where some preemptive security vendors concentrate on low-level risks such as domain lookalikes and basic spoofing activity, Augur focuses on the operational backbone of serious cyber campaigns. It uncovers the command-and-control servers, exfiltration staging nodes, and delivery systems that sophisticated threat actors rely on. This includes infrastructure established by nation-state groups, ransomware operators, and advanced criminal networks, often long before their operations escalate into public-facing incidents.

Seen in February

The following examples highlight the kinds of malicious operations Augur uncovers and disrupts.

Name Type IP Lead Time
Mikey Trojan Horse 95[.]85[.]239[.]100 150 days
Medusa Ransomware 80[.]65[.]222[.]11 95 days
Empire_downloader C2 framework 188[.]137[.]228[.]57 120 days
Brambul Worm 92[.]174[.]231[.]127 365 days

Kryptik

Backdoor

15[.]204[.]2[.]168 180 days

If you aren’t already blocking these IP addresses, we highly recommend that you do so.

Augur Highlights

Over the past few months, Augur has uncovered IPs and domains that were later leveraged in high-profile attacks, including the recent Salesforce/Salesloft breach, the SharePoint exploitation campaign, and the attack targeting Taiwanese Semiconductor.

Attack Threat Group Lead Time Research
Salesforce/Salesloft UNC6040
UNC6395
212 days Click Here
SharePoint Exploit Storm‑2603
Violet Typhoon (AKA APT31)
Linen Typhoon (AKA APT27)
360+ days Click Here
Taiwan Semiconductor Sector UNK_FistBump UNK_DropPitch 360+ days Click Here

Not every IP we uncover ends up in the headlines, but the overwhelming majority of the IPs and domains we identify are ultimately weaponized by threat actors to launch real-world attacks.

How Does Augur Work?

Augur uses ML-powered behavioral modeling to detect the buildup of cybercriminal infrastructure online before attacks. We identify thousands of malicious IPs, IP ranges, and domains every month. Augur identifies threats on average 60 days before they’re first reported by traditional sources. Our predictions are highly accurate, with a near-zero false-positive rate (0.01%), providing organizations using Augur with preemptive protection against cyberattacks, zero-days, and novel threats.

The Augur Difference. Let Us Prove It To You.

Experience firsthand the benefits of preemptive cyber defense with a quick proof of value (POV). We can have you up and running in less than a day, and after 30 days, get an Augur report detailing:

  • Threats Augur identified
  • Advance warning timelines
  • Data-driven insight on alert reduction and improved SOC efficiency

Click here to talk to an Augur specialist now.