<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Wave-2 Pterodo beacon URL pattern (n=14 samples since 2026-02):]]></title><description><![CDATA[<p>Wave-2 Pterodo beacon URL pattern (n=14 samples since 2026-02):</p><p>  /(Svvr|SSsr|Akad|Akk|Gpps|Mouuds)(Htm|Ua|U)?-DD-MM → 212.193.20.110</p><p>5 of 6 verbs carry double-letter alliteration (vv/Ss/kk/pp/uu) — same operator habit as the 2022-23 `j-j-j` URL generator + the alliterative *orious.ru / *mucoris.ru apex naming Talos/Symantec documented years ago. Three years later, same fingerprint.</p><p>Bare-IP + plain HTTP + no TLS = SNI inspection won't catch it. Block 212.193.20.110 directly.</p><p>Suricata draft rules: github.com/palianytsia-200/U-OB-KY/blob/main/rules/pterodo-wave2-beacon.rules</p><p><a href="https://infosec.exchange/tags/Pterodo" rel="tag">#<span>Pterodo</span></a> <a href="https://infosec.exchange/tags/UAC0010" rel="tag">#<span>UAC0010</span></a> <a href="https://infosec.exchange/tags/Gamaredon" rel="tag">#<span>Gamaredon</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" rel="tag">#<span>ThreatIntel</span></a></p>]]></description><link>https://board.circlewithadot.net/topic/7727b7ee-2185-4f39-a214-7f73be8be2b4/wave-2-pterodo-beacon-url-pattern-n-14-samples-since-2026-02</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:44:18 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/7727b7ee-2185-4f39-a214-7f73be8be2b4.rss" rel="self" type="application/rss+xml"/><pubDate>Thu, 14 May 2026 13:00:00 GMT</pubDate><ttl>60</ttl></channel></rss>