Added

{ New } - Search by Term Endpoint

Docs: Search by Term Endpoint

  • Added a new endpoint: POST /search-by-term
  • Purpose: Provides comprehensive search capabilities through browser history data from compromised machines to identify specific search terms and queries.
  • Response includes:
    • search_query: The actual search term or query found in browser history.

    • search_engine: The search engine platform where the query was made (Google, Bing, etc.).

    • timestamp: When the search query was performed.

    • stealer: Associated stealer ID for correlation with other compromise data.

    • ip: IP address of the compromised machine.

    • computer_name: Name of the compromised computer.

      This new capability enhances threat hunting and behavioral analysis workflows by enabling security teams to identify suspicious search patterns, monitor for breach awareness, and correlate user intent with compromise timelines.

Example Request:

curl --request POST \
     --url https://api.hudsonrock.com/json/v3/search-by-term \
     --header 'accept: application/json' \
     --header 'api-key: <API_KEY>' \
     --header 'content-type: application/json' \
     --data '{
       "search_terms": ["how to hack", "malware removal", "vpn bypass"],
       "start_date": "2024-01-01T00:00:00Z",
       "sort_by": "date_compromised",
       "sort_direction": "desc"
     }'

Use Cases:

  • Threat Intelligence: Identify users searching for hacking techniques, malware, or security bypasses
  • Incident Response: Correlate search activity with compromise timelines to understand attack progression
  • Security Awareness: Detect employees searching for breach-related terms indicating compromise awareness
  • Behavioral Analysis: Monitor search patterns that may reveal insider threats or targeted attack indicators