Threat Profile dashboard

Learn how to navigate Validin's Threat Profiles Dashboard, and search the platform for distinct threat actor activity.

Validin aggregates IOCs and intelligence from malware feeds, DNS telemetry, OSINT sources, and infrastructure scanning, and makes this information available in Threat Profiles.

📘

Data sources

Threat Profiles are built from multiple intelligence sources, including DNS telemetry, OSINT feeds, and threat research databases such as:

The Threat Profiles Dashboard is a landing page that displays known threat actors and malware families, including the infrastructure they operate.

Threat Profiles enable you to:

  • Identify active and emerging threat groups
  • Investigate infrastructure associated with a threat actor
  • Track newly added indicators and research reports
  • Pivot into detailed DNS and reputation data

Search and filter threat profiles

  1. Enter a keyword in the Search bar using the following categories:
    1. Threat actor or alias (e.g. lazarus)
    2. Target
    3. Country of origin
    4. Description
  2. Select one or more category filters:
    • Malicious
    • Malware
    • Suspicious
  3. Review the filtered list of threat profiles that match your criteria below

Sorting and navigation

Sort returned Threat Profiles using the drop down menu below the search box:

  • Most recently updated
  • Most references
  • Most infrastructure
  • Alphabetical

Use pagination controls to browse long result sets.

Navigating the dashboard

Returned Threat Profile data is displayed across three key areas:

  1. Threat Profile cards
  2. Recently Added Indicators
  3. Recent Open Source Reports

1. Threat Profile cards

Threat profile cards display:

  • Profile name and category: Threat group or malware family and its classification
  • Description: Summary of known behavior and capability
  • Attack vector: Operational context, including industries, platforms and Operating Systems targeted
  • Domains: Count of domains attributed to the threat
  • IPv4 addresses: Observed IP infrastructure
  • Strings: Identifiers and extracted signatures
  • Last updated: Timestamp of latest indicator addition
  • References: Count of supporting OSINT sources
📘

Note

Threat profiles without descriptions are sourced directly from OSINT providers, and have not yet been categorized or enriched by the Validin team.

Select any card to open a full profile, including DNS history, metadata, and reputation.

2. Recently Added Indicators

This panel lists newly discovered or newly attributed indicators.

ColumnDescription
KeyIndicator (domain or IP) recently linked to a threat
Date addedWhen Validin first recorded the association
Threat ActorProfile the indicator belongs to

Click an indicator to run a Core Search and gather additional intelligence.

Click a Threat Actor to open its corresponding Profile page.

3. Recent Open Source Reports

This section lists the latest OSINT intelligence integrated into threat profiles.

Each entry includes:

ItemDescription
ReferenceSource of the report or feed entry
Date addedWhen the report was processed
Threat actorProfile associated with new indicators

Use this to monitor active research coverage of threat groups.

Click a reference to open the threat report in a different browser tab.

Click a Threat Actor to open its corresponding Profile page.


What’s Next

Learn how to work with Threat Profiles....