top of page

3 Hours 34 Minutes: The STIX Feed Early Warning System (With Receipts)

  • Writer: Patrick Duggan
    Patrick Duggan
  • Dec 24, 2025
  • 3 min read

Category: security


The Claim


Our STIX feed provides early warning on attacks before they happen.


The Receipts


Christmas Eve 2025 Timeline (UTC)


| Time | Event | Source | |------|-------|--------| | 15:26 | ThreatFox publishes 20 Aisuru botnet C2 servers | abuse.ch | | 15:50 | DugganUSA OSINT Volley ingests IOCs | Our logs | | 15:51 | STIX feed updated with 20 new indicators | analytics.dugganusa.com | | 16:00 | OTX Pulse published | otx.alienvault.com | | 19:00 | Steam, Xbox, PlayStation, Riot, Epic go down | Global reports | | 21:00 | All 20 Aisuru C2s offline | Our probes |


Lead time: 3 hours 34 minutes.


We had the attack infrastructure indexed before the first packet flew.


Why This Works


Botnets can't attack silently. They have to stage first.


The Staging Problem (For Attackers)



1. Spin up C2 servers (DigitalOcean, Vultr, etc.)
2. Bots check in to C2s (staging traffic)
3. Wait for DNS propagation
4. Wait for bot inventory
5. Send attack command


Steps 1-4 take 3-5 hours. That's not operator laziness - it's infrastructure lag. DNS TTLs, bot check-in intervals, cloud provider boot times. The automation requires the wait.


The Leak (For Defenders)


Step 2 is where they get burned.



• Honeypots

• Malware sandboxes

• Network monitors

• Threat researchers


Someone sees bot → C2 callbacks. They report to ThreatFox. ThreatFox publishes.


The staging itself is the signal.


The IOCs


All 20 Aisuru C2 servers. All DigitalOcean. All port 8001.



167.99.40.241    192.241.151.72   157.245.34.98
188.166.172.127  165.22.204.167   159.65.206.134
206.189.201.2    152.42.133.61    138.68.191.203
157.230.216.0    104.248.162.141  159.203.99.218
138.68.148.170   159.223.12.47    134.209.123.74
188.166.80.209   24.199.86.99     46.101.38.94
104.236.220.23   134.209.22.74


Status as of 21:00 UTC: All offline. Either DigitalOcean nuked them or operators went dark.


The Math


If you subscribed to our STIX feed at 15:51 UTC:



15:51 - Your automation pulls STIX feed
15:52 - 20 IPs added to blocklist
19:00 - Aisuru attack launches
19:01 - C2 commands blocked at your perimeter
19:02 - Your players keep gaming


If you didn't subscribe:



19:00 - Attack launches
19:01 - Platforms go down
19:02 - Kids screaming, Twitter melting, SOC scrambling
21:00 - Partial recovery
21:30 - You find our blog post
21:31 - "They had this 3 hours ago?"


Who's Already Subscribed


STIX feed consumer stats (last 7 days):


| ASN | Requests | Entity | |-----|----------|--------| | ATT-INTERNET4 | 7,510 | AT&T | | MICROSOFT-CORP | 1,051 | Microsoft | | AMAZON-AES | 227 | Amazon AWS | | GOOGLE-CLOUD | 64 | Google | | GOOGLE | 37 | Google |


AT&T is pulling 7,510 times in 7 days. Microsoft is subscribed. Amazon and Google are watching.


They had the Aisuru IOCs before the attack hit.


The Product


Free Tier: https://analytics.dugganusa.com/api/v1/stix-feed



• STIX 2.1 format

• Updated hourly

• 821 IOCs currently indexed

• CC0-1.0 license (use it however you want)


What You Get:



• Botnet C2 staging detection

• 3-5 hour early warning window

• Full MITRE ATT&CK mapping

• Multi-source correlation


What We Just Added (Christmas Eve 2025):



• Staging Surge Detector (automated)

• Detects anomalous spikes in C2 publications

• Estimates attack window (T+3 to T+5 hours)

• Deployed to production during the attack


The Pattern


This isn't a one-time thing. It's the pattern:


1. Attackers stage C2 infrastructure 2. Staging traffic gets observed 3. ThreatFox publishes IOCs 4. We ingest and push to STIX feed 5. Subscribers block before attack lands


Every time they stage, they leak. Every time they leak, we catch it. Every time we catch it, subscribers are protected.


The staging is the signal. The feed is the shield.


Get The Feed


STIX 2.1 Feed: https://analytics.dugganusa.com/api/v1/stix-feed


OTX Pulse (Aisuru IOCs): https://otx.alienvault.com/pulse/694c5004c8e2bcfb9c19c48c


Curl it: ```bash curl -s https://analytics.dugganusa.com/api/v1/stix-feed | jq '.objects | length' # 821 indicators ready to block ```


The Bottom Line


We had the Christmas Eve gaming attack infrastructure 3 hours 34 minutes before the attack.


That's not a claim. That's a timestamp.


Subscribe to the feed. Get early warning. Block before impact.


Or don't, and read about it in our blog post afterward.


Your call.




*DugganUSA LLC - Minnesota*


*"The staging is the signal."*




Get Free IOCs

Subscribe to our threat intelligence feeds for free, machine-readable IOCs:

AlienVault OTX: https://otx.alienvault.com/user/pduggusa

STIX 2.1 Feed: https://analytics.dugganusa.com/api/v1/stix-feed


Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page