top of page

Threat Brief: Active C2 Infrastructure - February 14, 2026

  • Writer: Patrick Duggan
    Patrick Duggan
  • Feb 13
  • 3 min read

Updated: 4 days ago

# Threat Brief: Active C2 Infrastructure - February 14, 2026


**Classification:** TLP:WHITE

**Published:** February 13, 2026

**Valid Through:** February 17, 2026 (Weekend Coverage)




Executive Summary



16 confirmed command-and-control servers identified via ThreatFox certificate anomaly detection heading into the Valentine's Day weekend. Notable findings include a **Kimsuky (DPRK)** server with 180+ exploitable CVEs, and **four C2 servers hosted on Microsoft Azure and AWS** infrastructure.


All 16 IPs recommend immediate block action.




Critical Priority



139.99.86.89 - Kimsuky APT (North Korea)



| Attribute | Value |

|-----------|-------|

| **Threat Actor** | Kimsuky (APT43) |

| **Location** | Singapore (OVH) |

| **VT Detections** | 11/93 |

| **Certificate** | Self-signed, expired, CN=localhost |

| **Ports** | 80, 443 |

| **CVEs Exposed** | 180+ (Apache 2.4.25, OpenSSL 1.0.2j, PHP 5.6.30) |


This server exhibits textbook DPRK operational security failures: ancient software stack, self-signed certificates, and DGA-style issuer patterns. The exposed CVE surface suggests either a compromised host or intentionally vulnerable honeypot-style infrastructure.


**MITRE ATT&CK:** T1071.001 (Web Protocols), T1573.002 (Asymmetric Cryptography)




Cloud Provider C2s - Abuse Reports Recommended



Four C2 servers are actively hosted on major cloud providers. These represent abuse of legitimate infrastructure and should be reported:


| IP | Provider | Malware | Region |

|----|----------|---------|--------|

| 52.151.31.52 | **Microsoft Azure** | Cobalt Strike | US |

| 4.154.22.123 | **Microsoft Azure** | Meterpreter | US |

| 52.90.129.186 | **Amazon AWS** | Havoc | US-East |

| 13.43.94.7 | **Amazon AWS** | Havoc | UK (London) |


**Abuse Contacts:**

- Microsoft: `[email protected]`

- Amazon: `[email protected]`




Sliver C2 Surge



Open-source Sliver C2 framework continues to replace Cobalt Strike as the tool of choice for red teams and threat actors alike. Four servers identified this sweep:


| IP | Location | ISP | VT Score |

|----|----------|-----|----------|

| 217.217.254.115 | Singapore | Contabo | 10/93 |

| 185.239.239.35 | Germany | ZAP-Hosting | 10/93 |

| 212.86.116.106 | Ukraine | Virtual Systems | 6/93 |

| 51.44.178.101 | France | OVH | - |


All exhibit self-signed certificates with IP addresses as Common Names - a reliable detection signal.




Infostealer Infrastructure



Vidar Stealer Cluster



Three Vidar C2 servers identified, all using self-signed certs with IP-as-CN pattern:


| IP | Location | ISP |

|----|----------|-----|

| 46.224.11.92 | Germany | Hetzner |

| 151.247.22.188 | Canada | 12651980 Canada Inc |

| 151.247.22.211 | Canada | 12651980 Canada Inc |

| 46.225.137.109 | Germany | Hetzner |


The Canadian IPs share the same shell company ISP - likely a single actor's infrastructure.


Fickle Stealer



| IP | Location | ISP |

|----|----------|-----|

| 185.100.233.121 | Netherlands | WorldStream |


Relatively new stealer variant. Self-signed cert. Low VT detection (3/93) suggests fresh infrastructure.


Microsoft pulls this feed daily. AT&T pulls this feed daily. Starlink pulls this feed daily. Get the DugganUSA STIX feed — $9/mo →




Additional C2s



| IP | Malware | Location | ISP | VT |

|----|---------|----------|-----|-----|

| 78.192.214.83 | Cobalt Strike | France | Free SAS | 8/93 |

| 103.69.194.63 | Cobalt Strike | Vietnam | Soha Co | 7/93 |

| 206.189.213.116 | Havoc | US | DigitalOcean | 3/93 |

| 195.184.233.126 | Remcos | Netherlands | B2 Net | 1/93 |

| 45.155.69.147 | AdaptixC2 | Netherlands | RapidSeedbox | 9/93 |

| 104.156.155.94 | Unknown | US | Vultr | - |




Detection Signatures



Certificate Anomalies (All 16 IPs)


- `SELF_SIGNED` - No CA chain

- `IP_AS_CN` - IP address used as Common Name

- `EXPIRED_CERT` - Certificate validity expired

- `CERT_MISMATCH` - CN doesn't match hostname

- `DGA_ISSUER` - Randomized issuer string


Snort/Suricata Rule (Generic Self-Signed C2)







IOC Export



Firewall Block List (Copy/Paste Ready)





STIX 2.1 Bundle


Available via API: `https://analytics.dugganusa.com/api/v1/stix-feed?days=1`




Methodology



IOCs sourced from ThreatFox certificate anomaly feed, enriched via DugganUSA threat intelligence API combining:

- AbuseIPDB reputation

- VirusTotal detections

- Shodan port/CVE exposure

- OTX pulse correlation

- GreyNoise classification


All 16 IPs verified as malicious with high-confidence block recommendations.




About This Brief



Published by DugganUSA Threat Intelligence. Free STIX 2.1 feed available at `analytics.dugganusa.com`.


For questions: [email protected]




*This threat brief is provided as-is for defensive purposes. Block at your own risk assessment.*





*Her name was Renee Nicole Good.*


*His name was Alex Jeffery Pretti.*


The cheapest, fastest, most accurate threat feed on the internet.

275+ enterprises pulling daily. 1M+ IOCs. 17.4M indexed documents. We beat Zscaler by 43 days on NrodeCodeRAT. Starter tier $9/mo — less than any competitor’s sales demo.

 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page