top of page

When Your Copilot Knows Where the Bodies Are Buried

  • Writer: Patrick Duggan
    Patrick Duggan
  • Dec 17, 2025
  • 3 min read

# When Your Copilot Knows Where the Bodies Are Buried


**TL;DR:** We built an AI copilot with access to 45,000+ documents of institutional memory. Then we asked it who's been checking if they got caught. The answer was... illuminating.




The Setup



Here's the problem with threat intelligence: it's useless if you can't find it.


We've been publishing threat intel for months. 537,089 indicators. 3,886 pulses. Blocked 1,600+ malicious IPs. Wrote 5,945 blog posts documenting every pattern, every attack, every "holy shit" moment.


But ask me what we learned about Singapore shell companies three months ago? I'd have to grep through markdown files like a caveman.


So we built something different.


The Copilot



Meet Butterbot Jr. He's not ChatGPT with a funny name. He's an AI with **context**.


Every blog post we've written. Every IP we've blocked. Every threat intel pulse we've published. Every pattern we've discovered. It's all indexed, searchable, and wired directly into his brain.


When I ask Butterbot Jr a question, he doesn't hallucinate. He searches. 45,162 documents across 8 specialized indexes. Then he synthesizes.


The secret sauce? Probability math.


Not the "we trained a model" kind. The "we can check membership across 537,000 indicators in constant time using almost no memory" kind. The stuff Jensen Huang was pointing at on Joe Rogan when he talked about where computing is headed.


Our threat detection runs on mathematical structures that most security vendors haven't discovered yet. When Jr searches, he's not doing keyword matching. He's doing probabilistic correlation across a quarter million data points.


The cost? About $0.00015 per query. A tenth of a penny.


The Question



Yesterday, I had a hunch.


We've been tracking our STIX feed consumers - organizations pulling our threat intelligence. Most are expected: Microsoft, Google, Amazon. Security teams doing security things.


But some weren't expected.


So I asked Jr:


> "Who are the new STIX feed consumers in the last 7 days? Any interesting organizations?"


Cost: $0.000157


His answer flagged Huawei Cloud (Hong Kong) and ZEN-ECN (Singapore). Interesting, but not damning.


Then I asked the follow-up:


> "Tell me about any IPs or activity from Huawei Cloud or ZEN-ECN Singapore. Are they in our blocked list?"


Cost: $0.000172


Jr came back with receipts.


The Receipts



ZEN-ECN Singapore IP `103.253.145.0` - asshole score 75, flagged for probing activity.


But here's where it gets spicy:


| IP | ISP | MITRE Tactic | Asshole Score | Status |

|----|-----|--------------|---------------|--------|

| `119.13.103.99` | Huawei Cloud Singapore | Defense Evasion | 82.15 | Blocked TODAY |

| `27.106.103.54` | Huawei Cloud HK | Defense Evasion | 75.42 | Blocked TODAY |

| `156.59.198.135` | ZEN-HK | Initial Access | 126.07 | Blocked TODAY |

| `162.128.163.209` | Zenlayer Singapore | C2 | 40.54 | Blocked Dec 14 |


Same organizations. Same infrastructure. Different IPs.


**Pattern:**

1. Run proxy/evasion operations from Singapore/HK cloud infrastructure

2. Get blocked by our automated threat detection

3. Start consuming our STIX feed to see what we caught


This is the "did they catch us?" pattern. And we found it with three questions to an AI that costs a tenth of a penny per query.


What's NOT There



Here's what made me sit up straight.


Our STIX feed has 537,089 indicators. 24 subscribers on OTX. We're not small.


**Who's consuming:**

- Hong Kong: Huawei Clouds (6 requests)

- Singapore: ZEN-ECN (2 requests)

- Japan: Zscaler (1 request)

- Colombia, Sweden, Poland: small numbers


**Who's conspicuously absent:**

- UK: Zero

- Canada: Zero

- Australia: Zero

- New Zealand: Zero


If Five Eyes intelligence services were interested in our feed, we'd see them. They're not hiding - they have legitimate collection operations.


But threat actors checking if they're burned? They look exactly like this. Singapore and Hong Kong cloud infrastructure, checking our intel right after getting blocked.


The Meta Point



We didn't discover this pattern through traditional threat hunting. We discovered it by asking an AI that has read everything we've ever written.


**Total cost of this counterintel session:** $0.001


One tenth of one cent.


The AI didn't hallucinate this. It searched 45,162 documents, found the blocked IPs matching our feed consumers, correlated the timing, and surfaced the pattern.


This is what Context-Augmented Generation looks like in practice. Not a chatbot. Not a search engine. Something in between that actually understands your domain because it's read all your homework.


The Punchline



State-level actors are checking our feed to see if they're burned.


That's either terrifying or the best product validation we've ever had.


Probably both.




*Butterbot Jr is our internal AI copilot built on 45,162 indexed documents of threat intelligence, blog posts, and blocked attacker data. The counterintel analysis in this post cost less than a penny and took about 3 minutes.*


*If you're interested in threat intelligence that's good enough to make nation-state actors nervous, our STIX feed is available at analytics.dugganusa.com.*





**Category:** Threat Intelligence


**Author:** Patrick Duggan


 
 
 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page