Trends
Chokepoints stay stable. The techniques layered around them shift constantly. These analyses track what adversaries are actually doing: which payloads and cradle families dominate, which evasion techniques are rising or dying, and what infrastructure they keep coming back to. Data-driven signal for prioritizing detection work.
Analyses
10 months of MHaggis ClickGrab crawl data mapped through the Detection Chokepoint Framework. Tracks cradle family evolution (IWR→Curl pivot), evasion technique acceleration (Base64 18×), self-delete emergence, and CDN staging infrastructure across 20K+ malicious sites.
Defused Cyber honeypot telemetry across 25 edge device decoy types mapped through the Detection Chokepoint Framework. Tracks CitrixBleed 2 toolkit proliferation (54% of traffic), the CVE-2022-22536 SAP burst, CVE-2026-20127 (Cisco SD-WAN) full kill chain, and self-replicating worm campaigns.
==-----=++***+-=-**#%%%%%%%%%#*
=+****#--#**++=##*#%%%%%%%%%%%%%%%%%%+
=+*########+-*##--=#%%%%%%%%%%%%%%%%%%%%%%
=**############-=#*#%%%%%%%%%%%%%%%%%%%%%%%%%
=+*############%%%#*%%%%%%%@@%%%%%%%%%%%%%%%%#
+**###########%%%#+#%@@@%%%%%%@@@@@@@%%%%%%%%#
+**########%%%%##**%@%%%%%%%%##%%%%%%%%%%%%%%*
+***######%%%#%***%%%%##**++++++++***##%%%%%#
+**######%%%#%**#%##**+++=====--===++*#%++%#
+**######%%%%*##*+++++==---::::::-+++-=+#%*-
+***######%%#%%#*+===-------==::::*+=+++-=%*- -
+**######%%%%%#*+==----+*##*++::::::::::::%= -+*+*:
+*######%%#####*+===-+*=-------::::---::::*= ==*---:
**#####%%######+====------------::--=--:::* =-::+*=+++==+
**####%%######*+===------==+++=-:-=:-#--::- *:-----=+-=+=-
+*###%######%#+====-----=:...=+=-:++..:-:: .:------=+-
=*##%%######%#=====----=-:***.:=-=%@*..-::: .:-----=+=*
*#%##########======---=-+*@*::=-:**-::::::: -===-=+-++-::
*+++++++++###=====--:::----:::::------:::::: =+= ++:++
=++++++++++***===-----:::::::-=====----------- +- ++-+=:= :--
++++++++++=++=====---------:-=++====---------=- +- -==--==+====-
+==+++++++==========--------=++++++====------== -+++***++===:
=+==++++=++====++++==+++++===+++***++++-::--== -+=***++++++==-:
+===++++=+====++++++++#+++=========-::::---=- =++**++++++++++=-:
+====++++=+==++++==-=*@#+=-----------=----- +***+++++++++++===:
=+++++++++==++++=--==+@@@@@@@@@@@@@#-:--- ****++++++++++++===-
+==++++======+##%%%%%@%%#-:--- :=*#***+++++++++++++==
=+++++=======-=+++=---:-- +**+++**#****++++++++*--
=+++++===========---- +***+++*#**********=:--=
**#*++++++++=+== =**+++*###****+=+++=:
+****#######*+==- -==+*****+*+++ -=
====+********++=========---- -======+***+++
-=====++++++*****++++++================-= :------===++***+
----==+++++++***+*******+++++++++++===========-:::::----:---===
-======**********+*******+++++++++++++++++++=+--::::---------==
-=======******************++++++++++****+++++++=--------------
-======++******************++*+++*************++++======----:
-===++++++****###*********++*+*****###*********%+===++=====
-==++++++ **#************++++++++***####* =**+
-==+++++= -*******++++++++++++*****-
:===+++++ ******++++++++=++++++***#
*#=+++++**#= ******++++++=====+++++++*
+********###*+ ******+++++=========++++
+*##**#####* *****+++++==========++++
=#########* *****++++++==========+++
+**########*- +***++++++============+=
-+*******###*+- *****+++++==============
=++*********#*+ +****++++++===========-=
-****#*****#**+ +****+++++++=========++=
***************= *****+++++++====+=+++=+++
=*************+++ =++++++=======+==+=====+:+=
-*************+= +*###*******++++*#====-=+*=
=*********= =****###+*+*+++*#*======**#
=**%###%##+**+*##%=+====#**++++++++******+++
+***###*+=#+*+*###%*+++%################****+
-==++#%%%#-*%%%%%%%%%%%%###%##############******
+*+===++*#%%%%%%%%%%%%####%###%#%%##%#%%%####****
=*++==*#%%#%###############%%%%%%%%%%%%%#%####***
###%%#%##########*###%%#%%%%%%%%%%%######***+
*##%%##########***#%%%%%%%%%%%%%#%%%#####***+
===++- #%#%%######******#%#% #%%%######**+
+=++=*#*= #%#########***#** #%%######**#
+++++*******+- #%###########+*** *#%######*#+-
++++*******++*#%%* #%########****** *%%%###+======
=+=*****+*++*######*=%%########***** ****+**+++====
=+++*****#*+*+%######%%%#########****# *##******+*=*#+=**#-::----:
=+=******#****+%#######%%%*######****** +#*####*++++===++=+++++====-
+++*******#####*%%%%%###%%%######****** =****++++++++++++**+++++++-:
++++******+######*%%%%%%%%%%%%%####***** =#**+**********#####*+-----::
+++**+++##*##%%***###%%%%%%%%%%%####***+ **+=-------=====++++==+*#
+++#*++***%%%%* ##%%%%%%%####** =**++====**********++
*+##**++****+ +#%##### +*+++++++
*+##******#*
+*###***##
++*+*Have data worth analyzing? Trends analyses are sourced from crawled infrastructure, public incident reports, and open datasets. If you have a dataset that maps well to detection chokepoints, see CONTRIBUTING.md or open an issue to discuss.