Every day researchers upload about 8k submissions to ANY.RUN sandbox. And many of them have a malicious verdict. Cyberthreats are a global danger, and being up-to-date is a must for any specialists. A powerful solution for your threat intelligence can help improve security. Today we will discuss Malware Trends Tracker.
What is Malware Trends Tracker?
ANY.RUN is committed to improving cybersecurity awareness and threat intelligence. That is why we created Malware Trends Tracker (MTT). Here you can find:
- Dynamic tracker of malware activity
- Counter of uploads
- Malware trends that fluctuate in real-time
- Fresh IPs, hashes, domains
- Articles about different malicious programs
MTT’s results are based on data gathered from ANY.RUN’s public submissions with tagged malware. And the database consists of nearly 5 million uploads that are updated in real-time. Malware Trends Tracker provides statistics of the cyberthreat landscape across the world over a certain period.
MTT shows an easy-to-understand score to monitor malware trends and levels of cyberthreats. It helps to provide further analytics and insights.
How to monitor malware trends?
View information about trending malware activities using threat trackers. Widgets of each malware provide the number of tasks overall that users run in the sandbox. The graph on the widget shows the dynamics of a malicious object. Sometimes you can see the pattern of actions, notice what period is the most and least active for campaigns, etc. Malware is changing in real-time, so it doesn’t let you miss a new trend.
For example, here is the infamous Emotet. The number of uploads rocketed and then plummeted just within a year – threat actors were arrested, and all actions stopped. But now there is a tiny change at the end of the graph. As we know maybe, Emotet is coming back. And the dynamics in this widget will give the complete history of this malware.
We like to use this as an identifier for what the hot malware is at the time and what most people are encountering in the field. It can be offset by automation or old samples but in general, most people are not automating or have access to your API so we see it as a good organic measurement. In particular, when Emotet spikes up we see that as a good indicator of infections going up.@Cryptolaemus1, a team of cybersecurity analysts, learn more on their blog
Each malware name goes with green or red symbols. These are the signs of active and non-active malware that are there in the wild.
If you want to see the number of uploads, you can choose an indication over a specific period: all time, a year, month, two weeks, or a week. The arrow presents the rise or decline of malware within a particular time.
Hashes, IPs, and domains of a particular malware program are at the bottom of the widget, so you can plan how many of them you can investigate.
Top 10 threats
The latest data on malware
When you encounter malware of any type for the first time, you rather know everything about it. And here you are. All detailed information about the object of your analysis is here, in MTT. The articles contain new information that is provided by the latest submissions and reports.
Choose malware and click on its cell. Here you can find the following details:
- malware description
- malware history
- recent samples
- malware distribution method
- malware execution video
- detection process
- global, week, and month ranks
- IOCs – last 20 IP addresses
- domain names
For example, you can find the following data on Redline:
Why do you need malware statistics and trends?
Malware statistics and trends are an effective source for security specialists. Recent threat dynamics can help predict predictions of future trends of malware and possible attacks, enhance defense strategy, and understand the behavior of existing malicious objects. Trends tracker gives that visual connection that transforms information into intelligence.
It’s great to see those ever-shifting trends. I use it to help customers to protect themself better by focusing their efforts at the right place. I take the TOP actors and try to understand their TTPs, get those aligned to the MITRE ATT&CK map, and then make a move to protect the customer by working myself from left to right through the kill chain.@tagnullde, cybersecurity analyst, learn more on their blog
Moreover, junior malware specialists may find MTT helpful, so they widen their knowledge. Owing to the tracker, understanding what malware is active on the net is easy. The tracker is a powerful tool for everyday malware monitoring that any cybersecurity specialist can use. You can also subscribe to our social media, as we post malware statistics every week.
However, it would be best not to rely your whole threat intelligence efforts on the tracker. Instead, use it as an addition to other sources.