{"id":1281,"date":"2020-12-23T04:05:30","date_gmt":"2020-12-23T04:05:30","guid":{"rendered":"\/cybersecurity-blog\/?p=1281"},"modified":"2022-12-21T06:51:51","modified_gmt":"2022-12-21T06:51:51","slug":"annual-report-2020","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/","title":{"rendered":"Annual Report 2020"},"content":{"rendered":"\n<p>2020 is finally coming to the end. This year was full of unexpected events and there is no doubt, they have an incredible impact on cybersecurity. Rise of phishing due to the COVID-19 outbreak, large data breaches, ransomware attacks, etc.&nbsp;<\/p>\n\n\n\n<p>To give you a better view of the year, we\u2019ve collected significant statistics from our service in the ANY.RUN\u2019s annual report for 2020.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/pXEivYAj1v0pb--cFJtDP-wP2tGsT5R5ITT3vUc8YiiO2dcILZ1HypSQZwpVopFdURCuIG5OV_KgQtxrF3TYavye8EwZOMCDhoiJ6zYsIP9leyfpLIseG-vjcba9MIKE9q4_vIjs\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>Team behind the service&nbsp;<\/strong><\/p>\n\n\n\n<p>This year our small team has <strong>doubled<\/strong>! And now we have even more people who are encouraged to do their job perfectly. Software engineers, malware analysts, designers, marketers \u2013 all of them work hard to create a service for your successful malware hunting. And of course, along with you, we have learned how to work remotely in 2020.&nbsp;&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Interactive analysis is all over the world!&nbsp;<\/strong><\/p>\n\n\n\n<p>All <strong>195<\/strong> official countries have chosen our service. It\u2019s quite overwhelming, that our community is so diverse and huge! Let\u2019s have a look at some notable results: the United States heads the list with 570,165 visits on our service. Next is India with 204,768 visits, followed by the United Kingdom &#8211; 126,299 users, 100,892 from Brazil, and 99,693 from Germany.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Amazing ANY.RUN squad&nbsp;<\/strong><\/p>\n\n\n\n<p>The attendance of our service has doubled since last year \u2013&nbsp; <strong>4.6<\/strong> million users in 2020! <strong>101,057 <\/strong>new members of the ANY.RUN community have discovered the service and its features. Moreover, the number of our clients has<strong> tripled<\/strong>. We appreciate your support, and we are excited to see new researchers joining the service.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Can never have too many samples&nbsp;&nbsp;<\/strong><\/p>\n\n\n\n<p>This year <strong>1,636,074 <\/strong>tasks have been run. We believe that this is the best indicator among similar services. Every day ANY.RUN processes about 8,000 tasks. Thanks to them, the database has been updated with 244 million IOCs over the year. And a major part of them is available for your investigation in <a href=\"https:\/\/app.any.run\/submissions\">public submissions<\/a>.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>The most active malware in 2020<\/strong><\/p>\n\n\n\n<p>This year <strong>460,925<\/strong> malicious samples were detected. In the figure below you can see the statistics of top threats by uploads for 2020:&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh3.googleusercontent.com\/_1Lci8kLRPcMukFnk-kBmo3PJs0xXoQotsAGxjaGiP2_iIghDTEQIDYVv2xL1resia99q2dnBvKo-lMNAFXWT2WogRr0Cj7lF0PDH17rPawxDg3aLPfWqm42VtUbZxzT6MC27KES\" alt=\"\"\/><figcaption><br><\/figcaption><\/figure>\n\n\n\n<p>1. <a href=\"https:\/\/any.run\/malware-trends\/emotet\">Emotet<\/a> \u2013 the absolute king in the chart. It has 33,604 uploads in ANY.RUN. This year we have also analyzed 15 Emotet\u2019s updates including its new versions, maldoc templates, and spam campaigns.<\/p>\n\n\n\n<p>2. <a href=\"https:\/\/any.run\/malware-trends\/agenttesla\">Agent Tesla<\/a> \u2013 spyware remains in second place with 8,856 samples over the year.&nbsp;&nbsp;<\/p>\n\n\n\n<p>3. <a href=\"https:\/\/any.run\/malware-trends\/njrat\">njRAT<\/a> \u2013 it ranks third, 6,064 submissions prove it to be the most accessible RAT in the wild.&nbsp;<\/p>\n\n\n\n<p>4. <a href=\"https:\/\/any.run\/malware-trends\/lokibot\">Lokibot<\/a> \u2013 5,108 attempts to install extra malware to the system, good to know that it was just a virtual machine. <\/p>\n\n\n\n<p>5. <a href=\"https:\/\/any.run\/malware-trends\/nanocore\">Nanocore<\/a> \u2013 the RAT wraps up our top 5 with 4,900 results.&nbsp;<\/p>\n\n\n\n<p>We also have results of <strong>the most popular malware types<\/strong> uploaded in ANY.RUN. Have a look at the graph below.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/J6ksSD34Ym9bMqTi8a3PN046tt0n8JReAX7cxrWgjCLkJJvwRPrA6qrUV4qTj88XSXswz_ZVBt_C-xsDjxDwJDCJlD-1486m2Q0D_bBU1awljYYsze5FSCnUCWhsl2jL-2v3H_G-\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-large-font-size\"><strong>&nbsp;Service upgrades for productive work&nbsp; <\/strong>&nbsp;<\/p>\n\n\n\n<p>ANY.RUN has released several<strong> major updates<\/strong> on the service. We have increased the system\u2019s stability and the speed of our service. It was achieved by the distribution of requests between database instances. Moreover, we have added bot protection. Our service has become more user-friendly as we have redesigned almost all parts of the service. 90% of bugs has been reduced so you can use our platform to the fullest.&nbsp;<\/p>\n\n\n\n<p>We hope you can enjoy improvements and a new design, and yes, we have just started! Our team has been working hard to upgrade our platform, and you should get ready for new amazing changes in the upcoming year!&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Partners we are proud of&nbsp;<\/strong><\/p>\n\n\n\n<p>ANY.RUN has started the cooperation with the<strong> Zero2Automated <\/strong>malware reverse engineering course. It\u2019s a big step for our company to be a part of this high-quality course. Some training practices will be based on ANY.RUN platform. The most rewarding part for us is that students can gain knowledge and perform their analyses effectively with our contribution. That\u2019s why we\u2019ve started the integration in training courses and <strong>ANY.RUN is ready for new collaborations.&nbsp;<\/strong><\/p>\n\n\n\n<p>Our service has become a partner of the <strong>VB2020<\/strong><strong>localhost<\/strong>, the world-renowned Virus Bulletin international conference where you can get the latest and best research on malware, malicious actors, and threat intelligence. The event was an interesting experience for us.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>New integrations<\/strong><\/p>\n\n\n\n<p>This year we have integrated with such platforms as<strong> the Hive Project<\/strong>, an open-source and Security Incident Response Platform, and <strong>ThreatConnect<\/strong>, a decision and operational support platform. Now all their users who work via API have an opportunity to work with our service.&nbsp;<\/p>\n\n\n\n<p>It is possible to open a task on our platform by clicking the link at the <strong>bazaar.abuse.ch <\/strong>service. Now you can save your time and investigate the examples in ANY.RUN within 2 clicks. <\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>We want to be closer to you&nbsp;<\/strong><\/p>\n\n\n\n<p>ANY.RUN always tries to find ways to get connected with you. This year we have started the <strong>blog.<\/strong> There are 27 articles on various topics connected with cybersecurity. ANY.RUN hasn\u2019t forgotten about the <a href=\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\">Youtube channel<\/a>: 21 videos with tutorials, detection tips, and service guides. And the audience there keeps building up, that really makes us proud. <a href=\"https:\/\/any.run\/malware-trends\/\">Malware Trends Tracker<\/a> has also extended its collection with 10 more malware reviews where you can collect IOCs and fresh samples. Whenever you need extra help or advice \u2013 check this content, we are sure it can help you out.<\/p>\n\n\n\n<p>This year was extremely challenging. However, we are happy to see the ANY.RUN community grow and flourish. Cybersecurity specialists from all over the world find our service useful, and we do our best to meet your needs. We believe that the next year our cooperation will be successful, your analysis \u2013 easy and fast, our service \u2013 better!<\/p>\n\n\n\n<p>Thank you for your support and happy hunting with <a href=\"https:\/\/app.any.run\/\">ANY.RUN<\/a>!&nbsp;<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2020 is finally coming to the end. This year was full of unexpected events and there is no doubt, they have an incredible impact on cybersecurity. Rise of phishing due to the COVID-19 outbreak, large data breaches, ransomware attacks, etc.&nbsp; To give you a better view of the year, we\u2019ve collected significant statistics from our [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3207,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57],"class_list":["post-1281","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Annual Report 2020 \u2013 ANY.RUN Blog<\/title>\n<meta name=\"description\" content=\"The service&#039;s review of the year with up-to-date statistics. You will learn about the top malware by uploads and the platform&#039;s results.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Annual Report 2020\",\"datePublished\":\"2020-12-23T04:05:30+00:00\",\"dateModified\":\"2022-12-21T06:51:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/\"},\"wordCount\":949,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/\",\"name\":\"Annual Report 2020 \u2013 ANY.RUN Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2020-12-23T04:05:30+00:00\",\"dateModified\":\"2022-12-21T06:51:51+00:00\",\"description\":\"The service's review of the year with up-to-date statistics. You will learn about the top malware by uploads and the platform's results.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"teamwork\",\"item\":\"https:\/\/any.run\/tag\/teamwork\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Annual Report 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Annual Report 2020 \u2013 ANY.RUN Blog","description":"The service's review of the year with up-to-date statistics. You will learn about the top malware by uploads and the platform's results.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Annual Report 2020","datePublished":"2020-12-23T04:05:30+00:00","dateModified":"2022-12-21T06:51:51+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/"},"wordCount":949,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/","url":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/","name":"Annual Report 2020 \u2013 ANY.RUN Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2020-12-23T04:05:30+00:00","dateModified":"2022-12-21T06:51:51+00:00","description":"The service's review of the year with up-to-date statistics. You will learn about the top malware by uploads and the platform's results.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"teamwork","item":"https:\/\/any.run\/tag\/teamwork\/"},{"@type":"ListItem","position":3,"name":"Annual Report 2020"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1281"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1281"}],"version-history":[{"count":1,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1281\/revisions"}],"predecessor-version":[{"id":3789,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1281\/revisions\/3789"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/3207"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}