VoidAccess v1.3, what changed since launch
VoidAccess v1. 3 is an updated version of a threat intelligence tool that enhances capabilities such as certificate transparency subdomain enumeration, infrastructure cluster detection, sandbox analysis integration, false-positive suppression, and expanded data scraping from various sources. It introduces IOC freshness decay to reduce chasing outdated indicators. This update is informational about tool improvements rather than a direct security vulnerability or exploit. No known exploits or vulnerabilities are reported in this release.
AI Analysis
Technical Summary
VoidAccess v1.3 is a threat intelligence tool update that adds features including subdomain enumeration via crt.sh, detection of shared IPs and nameservers, integration with Hybrid Analysis sandbox for hash analysis, suppression of false-positive scanner IPs using GreyNoise data, scraping of paste sites, GitHub, GitLab, and multiple security RSS feeds. It also implements indicator of compromise (IOC) freshness decay policies to improve analyst efficiency by marking IPs and domains as stale after set periods. The update is a functional enhancement and does not represent a security threat or vulnerability itself.
Potential Impact
There is no direct security impact or vulnerability associated with this update. The tool is designed to assist analysts in threat intelligence gathering and does not introduce new attack vectors or exploits. No known exploits in the wild are reported related to this tool or its update.
Mitigation Recommendations
No mitigation is required as this is an informational update about a threat intelligence tool. Analysts and users should review the update to understand new features but no security remediation actions are necessary.
VoidAccess v1.3, what changed since launch
Description
VoidAccess v1. 3 is an updated version of a threat intelligence tool that enhances capabilities such as certificate transparency subdomain enumeration, infrastructure cluster detection, sandbox analysis integration, false-positive suppression, and expanded data scraping from various sources. It introduces IOC freshness decay to reduce chasing outdated indicators. This update is informational about tool improvements rather than a direct security vulnerability or exploit. No known exploits or vulnerabilities are reported in this release.
Reddit Discussion
shipped v1.0 a few weeks ago, significant update since then. biggest additions: certificate transparency subdomain enumeration via crt.sh, infrastructure cluster detection showing shared IPs and nameservers, Hybrid Analysis sandbox for hashes, GreyNoise suppression killing false-positive scanner IPs, paste site scraping, GitHub and GitLab scraping, 20 security RSS feeds. also added IOC freshness decay, IPs stale after 14 days, domains after 30, hashes never expire. analysts stop chasing old C2s.
Links cited in this discussion
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
VoidAccess v1.3 is a threat intelligence tool update that adds features including subdomain enumeration via crt.sh, detection of shared IPs and nameservers, integration with Hybrid Analysis sandbox for hash analysis, suppression of false-positive scanner IPs using GreyNoise data, scraping of paste sites, GitHub, GitLab, and multiple security RSS feeds. It also implements indicator of compromise (IOC) freshness decay policies to improve analyst efficiency by marking IPs and domains as stale after set periods. The update is a functional enhancement and does not represent a security threat or vulnerability itself.
Potential Impact
There is no direct security impact or vulnerability associated with this update. The tool is designed to assist analysts in threat intelligence gathering and does not introduce new attack vectors or exploits. No known exploits in the wild are reported related to this tool or its update.
Mitigation Recommendations
No mitigation is required as this is an informational update about a threat intelligence tool. Analysts and users should review the update to understand new features but no security remediation actions are necessary.
Technical Details
- Source Type
- Subreddit
- ThreatIntelligence+threatintel+websecurityresearch
- Reddit Score
- 0
- Discussion Level
- minimal
- Content Source
- reddit_link_post
- Post Type
- link
- Domain
- null
- Newsworthiness Assessment
- {"score":32,"reasons":["external_link","established_author"],"isNewsworthy":true,"foundNewsworthy":[],"foundNonNewsworthy":[]}
- Has External Source
- true
- Trusted Domain
- false
Threat ID: 6a13498fa5ae1af1aab694a0
Added to database: 5/24/2026, 6:55:11 PM
Last enriched: 5/24/2026, 6:56:21 PM
Last updated: 5/24/2026, 8:02:50 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.