Trends

Chokepoints stay stable — but the techniques layered around them shift constantly. These analyses track what adversaries are actually doing: which payloads and cradle families dominate, which evasion techniques are rising or dying, and what infrastructure they keep coming back to. Data-driven signal for prioritizing detection work.

Payload Prevalence
Which command lines, scripts, and file types are most common vs. rare across real-world campaigns
Technique Shifts
When adversaries pivot — new evasion methods emerging, old ones dying as defenders catch up
Malicious Infrastructure
Staging domains, CDN abuse, C2 hosting patterns, and reused infrastructure clusters
Time-Series Intel
Monthly aggregations showing acceleration, plateau, or decline — not just point-in-time snapshots

Analyses

In Development

Infostealer Payload Prevalence
Coming Soon

Command-line argument frequency, string patterns, and target file paths across RedLine, LummaC2, Vidar, and StealC — ranked by prevalence to prioritize detection coverage.

RMM Tool Infrastructure Tracking
Coming Soon

ASN distribution, certificate reuse, and domain registration patterns across AnyDesk, ScreenConnect, RustDesk, and MeshCentral deployments observed in incident response data.

LOLBin Usage Frequency
Coming Soon

Which living-off-the-land binaries appear most in real campaigns vs. red team exercises — certutil, mshta, regsvr32, wscript, cscript, rundll32 tracked across public incident data.

Have data worth analyzing? Trends analyses are sourced from crawled infrastructure, public incident reports, and open datasets. If you have a dataset that maps well to detection chokepoints, see CONTRIBUTING.md or open an issue to discuss.