{"id":17413,"date":"2025-12-18T09:38:51","date_gmt":"2025-12-18T09:38:51","guid":{"rendered":"\/cybersecurity-blog\/?p=17413"},"modified":"2025-12-29T12:31:24","modified_gmt":"2025-12-29T12:31:24","slug":"annual-report-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/","title":{"rendered":"Year in Review by ANY.RUN: Key Threats, Solutions, and Breakthroughs of 2025\u00a0"},"content":{"rendered":"\n<p>It\u2019s&nbsp;December \u2014 that time of year when we take a&nbsp;pause&nbsp;and look back at how much&nbsp;we\u2019ve&nbsp;achieved.&nbsp;<\/p>\n\n\n\n<p>If&nbsp;you\u2019re&nbsp;reading this, chances are&nbsp;you\u2019ve&nbsp;shared these&nbsp;wins&nbsp;with us.&nbsp;Maybe you\u2019ve&nbsp;launched one analysis,&nbsp;maybe thousands.&nbsp;Maybe you\u2019ve&nbsp;browsed our&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2025&amp;utm_term=181225&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a>&nbsp;daily or just&nbsp;joined us. Anyhow, thanks for&nbsp;being here!&nbsp;<\/p>\n\n\n\n<p>2025 kept all of us busy&nbsp;for sure. But it also brought a ton of&nbsp;breakthrough studies, insights, and improvements.&nbsp;Let\u2019s&nbsp;glance back at the year and see what we&nbsp;accomplished&nbsp;together \u2014 through numbers, stories, and proud moments.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Milestones&nbsp;We&nbsp;Achieved&nbsp;Together in 2025&nbsp;&nbsp;<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"894\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/info-of-the-year-1024x894.png\" alt=\"\" class=\"wp-image-17426\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/info-of-the-year-1024x894.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/info-of-the-year-300x262.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/info-of-the-year-768x670.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/info-of-the-year-1536x1341.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/info-of-the-year-2048x1788.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/info-of-the-year-370x323.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/info-of-the-year-270x236.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/info-of-the-year-740x646.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Key results of 2025&nbsp;by ANY.RUN<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We bet&nbsp;it\u2019s&nbsp;safe to say that no analyst was idle this year, and the numbers support this statement:&nbsp;the total number of analyses launched in&nbsp;<a href=\"https:\/\/any.run\/features\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2025&amp;utm_term=181225&amp;utm_content=linksandboxlanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN\u2019s Interactive Sandbox<\/a>&nbsp;across 195(!)&nbsp;countries&nbsp;exceeded&nbsp;5.7&nbsp;millions, with&nbsp;1.1 million threats&nbsp;uncovered in the process.&nbsp;<\/p>\n\n\n\n<p>Our&nbsp;most active users&nbsp;this year&nbsp;were&nbsp;based in the&nbsp;US, Germany, UK, and India.&nbsp;Many of&nbsp;them&nbsp;represent big enterprises. In fact,&nbsp;74 of Fortune 100 companies&nbsp;used our sandbox this year.&nbsp;<\/p>\n\n\n\n<p>The community overall kept&nbsp;growing:&nbsp;out of&nbsp;500,000+&nbsp;users,&nbsp;81k&nbsp;joined&nbsp;us this year,&nbsp;bringing new insights with them.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Altogether,&nbsp;ANY.RUN\u2019s&nbsp;users have spent&nbsp;400,000+ hours&nbsp;in&nbsp;our sandbox&nbsp;\u2014&nbsp;that\u2019s&nbsp;more than&nbsp;45&nbsp;years&nbsp;of research!&nbsp;Just imagine how much longer it would take&nbsp;without&nbsp;a&nbsp;solution&nbsp;built&nbsp;for fast&nbsp;and efficient&nbsp;analysis. \ud83d\ude0e&nbsp;<\/p>\n\n\n\n<p>When it comes to what exactly&nbsp;our community&nbsp;analyzed most, there are no surprises:&nbsp;in 2025, phishing&nbsp;continued&nbsp;to reign over&nbsp;the&nbsp;threat&nbsp;landscape. In particular,&nbsp;the most active threat was&nbsp;<a href=\"https:\/\/any.run\/malware-trends\/tycoon\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Tycoon2FA<\/strong><\/a>.&nbsp;<\/p>\n\n\n\n<p>The top suspects&nbsp;among file types&nbsp;were:&nbsp;<strong>executables, ZIP archives, PDFs, and emails (EML and MSG)<\/strong>. A clear proof of how widespread both file- and email-based malware is.&nbsp;<\/p>\n\n\n\n<p>But no threat should scare an analyst equipped with strong security solutions. Here are some of the tangible results reported by ANY.RUN\u2019s users in 2025:&nbsp;<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-265\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"1\"\n           data-rows=\"4\"\n           data-wpID=\"265\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:100%;                    padding:10px;\n                    \"\n                    >\n                                        Measurable impact with ANY.RUN, 2025\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Average MTTD: 15 seconds\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        MTTR reduced\u00a0by:\u00a021\u00a0minutes\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Investigation speed improved: in\u00a095% of SOCs\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-265'>\ntable#wpdtSimpleTable-265{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-265 td, table.wpdtSimpleTable265 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p>This&nbsp;is&nbsp;a&nbsp;solid&nbsp;proof&nbsp;of&nbsp;the&nbsp;fact&nbsp;that&nbsp;our&nbsp;malware&nbsp;analysis&nbsp;and&nbsp;threat&nbsp;intelligence&nbsp;solutions&nbsp;change&nbsp;SOC&nbsp;workflows&nbsp;for&nbsp;the&nbsp;better.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Sandbox Updates:&nbsp;Driving Malware Analysis Forward<\/strong>&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>More Ways to Run Malware<\/strong>&nbsp;<\/h3>\n\n\n\n<p>This year we broadened the sandbox horizons by adding new operating&nbsp;systems to our VM&nbsp;for more&nbsp;flexible&nbsp;and realistic environments.&nbsp;<\/p>\n\n\n\n<p>For teams tackling mobile threats, we introduced<strong>&nbsp;<\/strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/android-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Android support<\/strong><\/a>.&nbsp;It gives you the opportunity to upload, interact, and analyze APK files in&nbsp;ANY.RUN\u2019s&nbsp;virtual machine&nbsp;closely&nbsp;replicating a&nbsp;real Android&nbsp;device.&nbsp;Great timing, since mobile threats&nbsp;have been&nbsp;pretty&nbsp;active&nbsp;this year!&nbsp;But&nbsp;more on that below.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"569\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image-4-2048x1137-1-1024x569.png\" alt=\"\" class=\"wp-image-17427\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image-4-2048x1137-1-1024x569.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image-4-2048x1137-1-300x167.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image-4-2048x1137-1-768x426.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image-4-2048x1137-1-1536x853.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image-4-2048x1137-1-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image-4-2048x1137-1-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image-4-2048x1137-1-740x411.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image-4-2048x1137-1.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em style=\"white-space: normal;\">Android-based&nbsp;mobile&nbsp;threat&nbsp;\u2014 a&nbsp;fake&nbsp;banking&nbsp;app&nbsp;\u2014&nbsp;analyzed&nbsp;inside&nbsp;ANY.RUN&nbsp;sandbox<\/em><span style=\"font-family: -webkit-standard; white-space: normal;\">&nbsp;<\/span><\/figcaption><\/figure><\/div>\n\n\n<p class=\"has-text-align-left\">We also&nbsp;added&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/arm-linux-malware-sandbox\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Linux Debian OS<\/strong><\/a>, helping&nbsp;you&nbsp;detonate ARM-based threats. Since 2025, you can do&nbsp;full-scale malware built for IoT devices and other ARM systems in ANY.RUN\u2019s Interactive Sandbox.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nDetect malware &#038; phishing\u00a0in  <span class=\"highlight\">under a minute<\/span> <\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=annual-report-2025&#038;utm_term=181225&#038;utm_content=linktoservice\" target=\"_blank\" rel=\"noopener\">\nTry today<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Thanks to&nbsp;these and other updates, our sandbox became even more universal&nbsp;and useful for&nbsp;faster, deeper, and more reliable&nbsp;analysis.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Deep&nbsp;Analysis Made Simple<\/strong>&nbsp;<\/h3>\n\n\n\n<p>When it comes to malware analysis,&nbsp;it\u2019s&nbsp;not always clear where to start, as&nbsp;threats get&nbsp;increasingly more complex&nbsp;and evasive. To simplify the process of uncovering them, we&nbsp;came up with&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/detonation-actions\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Detonation Actions<\/strong><\/a><strong>&nbsp;<\/strong>\u2014 hints that guide you through the analysis in our ANY.RUN Sandbox as&nbsp;you&nbsp;search for hidden threats.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"568\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/imagec-4-2048x1136-2-1024x568.png\" alt=\"\" class=\"wp-image-17429\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/imagec-4-2048x1136-2-1024x568.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/imagec-4-2048x1136-2-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/imagec-4-2048x1136-2-768x426.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/imagec-4-2048x1136-2-1536x852.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/imagec-4-2048x1136-2-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/imagec-4-2048x1136-2-270x150.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/imagec-4-2048x1136-2-740x410.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/imagec-4-2048x1136-2.png 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Detonation Actions displayed inside ANY.RUN sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Another feature we added&nbsp;solves&nbsp;one of the&nbsp;most time-consuming&nbsp;parts of detection:&nbsp;rule&nbsp;creation. Now our sandbox is equipped with&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/ai-sigma-rules\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>AI Sigma Rules<\/strong><\/a>&nbsp;that reveal the logic behind threat behavior&nbsp;while saving manual effort. Just copy them to your SIEM, SOAR, or EDR for&nbsp;smooth deployment.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Threat Intelligence Lookup: Data Solving&nbsp;Real-World&nbsp;Challenges<\/strong>&nbsp;<\/h2>\n\n\n\n<p>In 2025, our users made almost&nbsp;<strong>195k&nbsp;<\/strong>requests in Threat Intelligence Lookup in search of actionable insights and verified indicators.&nbsp;<strong>Tycoon&nbsp;<\/strong>topped the list as the most&nbsp;searched&nbsp;malware.&nbsp;<\/p>\n\n\n\n<p>Thanks to our&nbsp;global&nbsp;community, we have access to a rich collection of fresh, verified, ready- and safe-to-use data. It would be a shame not&nbsp;to&nbsp;share it with the world, right?&nbsp;<\/p>\n\n\n\n<p>So,&nbsp;an important step&nbsp;we took this year to make TI Lookup more accessible.&nbsp;Namely, we introduced the&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-lookup-new-plan\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Free plan<\/strong><\/a>, giving everyone the opportunity to enrich threat research with 100% verified context at no cost.&nbsp;It\u2019s&nbsp;a perfect way to tap into quality intel and see it bring tangible results.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nLower <span class=\"highlight\">business risks<\/span> with actionable threat intel<\/br>\nTry ANY.RUN\u2019s TI solutions in your SOC \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/plans-ti\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=annual-report-2025&#038;utm_term=181225&#038;utm_content=contactus\/#contact-sales\" target=\"_blank\" rel=\"noopener\">\nGet a trial<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>We also&nbsp;supported&nbsp;knowledge exchange&nbsp;by&nbsp;launching&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-reports\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>TI Reports,<\/strong><\/a>&nbsp;analyst-driven articles covering APTs, campaigns, and emerging threats. Each report comes with IOCs and queries for a deeper dive.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"611\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image6-3-1024x611.png\" alt=\"\" class=\"wp-image-17430\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image6-3-1024x611.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image6-3-300x179.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image6-3-768x458.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image6-3-1536x916.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image6-3-370x221.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image6-3-270x161.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image6-3-740x441.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image6-3.png 1804w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Industry &amp; geo threat&nbsp;landscape&nbsp;data for the Tycoon2FA&nbsp;phishkit<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Finally, in 2025 we boosted threat monitoring capabilities of our users with&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/industry-geo-threat-landscape\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Industry &amp;&nbsp;geo&nbsp;threat landscape<\/strong><\/a>. It shows&nbsp;exactly how a given threat or indicator relates to sectors and countries \u2014 a real live-saver for those drowning in alerts with no context.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Threat Intelligence Feeds: Always Fresh and&nbsp;Relevant<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Throughout 2025,&nbsp;<a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2025&amp;utm_term=181225&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Feeds<\/a>&nbsp;grew&nbsp;both in terms of data and interoperability.&nbsp;It was powered by&nbsp;constant&nbsp;data updates&nbsp;coming from&nbsp;over 15k SOC teams, which&nbsp;guarantee&nbsp;that TI Feeds always&nbsp;remain&nbsp;on point.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/2-2-1-1024x576.png\" alt=\"\" class=\"wp-image-17432\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/2-2-1-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/2-2-1-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/2-2-1-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/2-2-1-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/2-2-1-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/2-2-1-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/2-2-1-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/2-2-1.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Overview of TI Feeds by ANY.RUN<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/taxii-protocol-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>STIX\/TAXII integration<\/strong><\/a><strong>&nbsp;<\/strong>made the delivery of fresh, real-time data more&nbsp;efficient.&nbsp;And&nbsp;newly added&nbsp;integrations&nbsp;like<strong>&nbsp;<\/strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds-threatq-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ThreatQ&nbsp;+ TI Feeds<\/strong><\/a>&nbsp;connector&nbsp;brought&nbsp;live,&nbsp;behavior-based&nbsp;malware&nbsp;for better prioritization and&nbsp;contextualization&nbsp;of indicators.&nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\n <span class=\"highlight\">Maximize ROI<\/span>\n<\/br>by enriching your system with fresh IOCs\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=annual-report-2025&#038;utm_term=181225&#038;utm_content=feedscontactus\/#contact-sales\" target=\"_blank\" rel=\"noopener\">\nGet TI Feeds trial<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Expanding Our Reach with New Integrations &amp; Connectors<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Our&nbsp;goal is to make&nbsp;your workflow smoother and more efficient, simplifying daily tasks and automating&nbsp;what\u2019s&nbsp;possible.&nbsp;One of the steps we took in this direction is the&nbsp;launch of&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/sdk-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>SDK<\/strong><\/a>, which makes&nbsp;it&nbsp;easy to connect our solutions with&nbsp;tools you\u2019re&nbsp;already using.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"577\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/screenshotintegrations-1-1024x577.png\" alt=\"\" class=\"wp-image-17435\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/screenshotintegrations-1-1024x577.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/screenshotintegrations-1-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/screenshotintegrations-1-768x433.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/screenshotintegrations-1-1536x866.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/screenshotintegrations-1-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/screenshotintegrations-1-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/screenshotintegrations-1-740x417.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/screenshotintegrations-1.png 1646w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em style=\"white-space: normal;\">Integration options for TI solutions by ANY.RUN<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>We also&nbsp;released&nbsp;a lot of&nbsp;ready-to-use&nbsp;integrations,&nbsp;such as:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/palo-alto-networks-cortex-xsoar-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Palo Alto Networks<\/strong>&nbsp;<strong>Cortex XSOAR<\/strong><\/a>:&nbsp;Available&nbsp;for all three&nbsp;ANY.RUN\u2019s&nbsp;products, it&nbsp;helps automate investigation and response.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds-ms-sentinel-connector\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft Sentinel<\/strong><\/a><strong>&nbsp;&amp;&nbsp;<\/strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/ms-defender-connectors\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Microsoft&nbsp;Defender<\/strong>:<\/a>&nbsp;Integrate&nbsp;sandbox and TI Feeds with your Microsoft solutions&nbsp;for fast and confident decision-making.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/ibm-qradar-soar-anyrun-integration\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>IBM&nbsp;Security&nbsp;QRadar&nbsp;SOAR<\/strong>:<\/a>&nbsp;Turn alert noise into actionable conclusions&nbsp;without leaving your SOAR&nbsp;by integrating it with ANY.RUN sandbox and TI Lookup.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These and other integrations&nbsp;and connectors&nbsp;support your work&nbsp;without disrupting the&nbsp;way&nbsp;you already&nbsp;operate.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Catching What Others Miss<\/strong>&nbsp;<\/h2>\n\n\n\n<p>In 2025, ANY.RUN&nbsp;was the first to&nbsp;uncover&nbsp;multiple campaigns and malware&nbsp;families, giving a head start to the entire cybersecurity community.&nbsp;Let\u2019s&nbsp;recap the most notable cases:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Salty 2FA<\/h3>\n\n\n\n<p>A&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/salty2fa-technical-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">newly discovered<\/a>&nbsp;PhaaS&nbsp;framework&nbsp;that&nbsp;quickly raised to the level of major phishing kits in today\u2019s threat landscape.&nbsp;Its&nbsp;ability to distribute payloads at scale, intercept 2FA authentication methods, and complex communication models&nbsp;ensured&nbsp;that.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Android Threats<\/strong>&nbsp;<\/h3>\n\n\n\n<p>Some of the recently&nbsp;occurred&nbsp;threats&nbsp;were&nbsp;Android-based, and&nbsp;we were able to break them down in detail and analyze their behavior&nbsp;in our sandbox.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/salvador-stealer-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Salvador Stealer<\/strong>,<\/a>&nbsp;an&nbsp;Android banking malware revealed in April 2025. By disguising itself as a legitimate app, it phishes critical personal and financial data \u2014 a clear example of how mobile malware continues to evolve and blend into everyday user environments.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/pentagon-stealer-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Pentagon Stealer<\/strong><\/a>, a&nbsp;relatively simple&nbsp;threat&nbsp;that&nbsp;quickly grew into&nbsp;a persistent, versatile, and widespread data-stealing&nbsp;malware.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Tykit<\/h3>\n\n\n\n<p>In October we took a closer look at&nbsp;<strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/tykit-technical-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">Tykit<\/a><\/strong>,&nbsp;a credential-stealing&nbsp;malware.&nbsp;It might not&nbsp;reinvent&nbsp;phishing&nbsp;per&nbsp;se but&nbsp;clearly&nbsp;demonstrates&nbsp;how a tiny loophole in a defense system can lead to significant real-world impact.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Salty2FA &amp; Tycoon2FA: A Hybrid Threat<\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image16-1-1024x578.png\" alt=\"\" class=\"wp-image-17445\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image16-1-1024x578.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image16-1-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image16-1-768x433.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image16-1-1536x867.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image16-1-370x209.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image16-1-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image16-1-740x417.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/image16-1.png 1840w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN\u2019s Sandbox exposes Salty2FA &amp; Tycoon2FA phishing attempts&nbsp;<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>We ended the year with a&nbsp;detection&nbsp;of a hybrid cross-kit&nbsp;malware&nbsp;<strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/salty2fa-tycoon2fa-hybrid-phishing-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">Salty2FA &amp; Tycoon2FA<\/a><\/strong>. It&nbsp;combines&nbsp;two&nbsp;phishing frameworks,&nbsp;multiplying the&nbsp;dangers&nbsp;of both.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>ANY.RUN Recognized&nbsp;by&nbsp;Industry and Community<\/strong>&nbsp;<\/h2>\n\n\n\n<p>2025 brought us a handful of awards,&nbsp;indicating&nbsp;recognition and acclaim in&nbsp;the&nbsp;industry, for which&nbsp;we\u2019re&nbsp;super grateful.&nbsp;<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-266\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"2\"\n           data-rows=\"5\"\n           data-wpID=\"266\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        Award\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:50%;                    padding:10px;\n                    \"\n                    >\n                                        Title\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Top InfoSec Innovators Awards\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Winner at\u00a0Trailblazing Threat Intelligence\u00a0\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Globee\u00a0Awards\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Gold winner (TI Lookup)\u00a0Silver winner\u00a0(Sandbox)\u00a0\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Cybersecurity Excellence Awards\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Best TI Service\u00a0                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        CyberSecurity\u00a0Breakthrough Awards\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell \"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        Threat Intelligence Company of 2025\u00a0                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-266'>\ntable#wpdtSimpleTable-266{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-266 td, table.wpdtSimpleTable266 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p>What&nbsp;we&nbsp;appreciate&nbsp;more&nbsp;than&nbsp;anything,&nbsp;however,&nbsp;is&nbsp;our&nbsp;community.&nbsp;Every&nbsp;nomination,&nbsp;vote,&nbsp;and&nbsp;kind&nbsp;word&nbsp;reflect&nbsp;your&nbsp;trust&nbsp;\u2014 a&nbsp;big&nbsp;thank-you&nbsp;to&nbsp;everyone&nbsp;involved!&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Our Most Influential Reports<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Alongside&nbsp;TI Reports you can find in TI Lookup, we regularly share technical analyses on our blog.&nbsp;2025 was no exception.&nbsp;We&nbsp;published&nbsp;many&nbsp;nuanced&nbsp;studies of&nbsp;both&nbsp;newly discovered&nbsp;and&nbsp;evolved threats.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>April&nbsp;brought&nbsp;a&nbsp;surge&nbsp;inactivity&nbsp;around&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/pe32-ransomware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>PE32&nbsp;Ransomware<\/strong><\/a>, a&nbsp;Telegram-based&nbsp;encryptor.&nbsp;Our&nbsp;in-depth&nbsp;breakdown&nbsp;highlights&nbsp;how&nbsp;even&nbsp;unsophisticated&nbsp;ransomware&nbsp;can&nbsp;pose&nbsp;a&nbsp;very&nbsp;real&nbsp;danger.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>In&nbsp;July&nbsp;we&nbsp;covered&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/devman-ransomware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>DEVMAN<\/strong><\/a>, a&nbsp;malware&nbsp;sample&nbsp;tied&nbsp;to&nbsp;the&nbsp;DragonForce&nbsp;ransomware&nbsp;lineage&nbsp;but&nbsp;standing&nbsp;out&nbsp;with&nbsp;unique&nbsp;behaviors&nbsp;and&nbsp;identifiers.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Later the same month we analyzed<strong>&nbsp;<\/strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/ducex-packer-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Ducex&nbsp;packer<\/strong><\/a>, an advanced tool&nbsp;used to conceal&nbsp;Android malware payloads. An increase&nbsp;in its activity highlights the escalating arms race between threat actors and&nbsp;security teams.&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/lazarus_photos-1-2048x2048-large-1024x1024.jpeg\" alt=\"\" class=\"wp-image-17436\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/lazarus_photos-1-2048x2048-large-1024x1024.jpeg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/lazarus_photos-1-2048x2048-large-300x300.jpeg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/lazarus_photos-1-2048x2048-large-150x150.jpeg 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/lazarus_photos-1-2048x2048-large-768x768.jpeg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/lazarus_photos-1-2048x2048-large-70x70.jpeg 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/lazarus_photos-1-2048x2048-large-370x370.jpeg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/lazarus_photos-1-2048x2048-large-270x270.jpeg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/lazarus_photos-1-2048x2048-large-740x740.jpeg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/12\/lazarus_photos-1-2048x2048-large.jpeg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Photos&nbsp;of&nbsp;Lazarus&nbsp;IT&nbsp;workers&nbsp;caught&nbsp;during&nbsp;investigation<\/em><\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Finally, in December we took an&nbsp;<a href=\"https:\/\/any.run\/cybersecurity-blog\/lazarus-group-it-workers-investigation\/\" target=\"_blank\" rel=\"noreferrer noopener\">unprecedented look<\/a>&nbsp;inside&nbsp;<strong>Lazarus Group<\/strong>\u2019s&nbsp;North&nbsp;Korean IT&nbsp;workers&nbsp;infiltration scheme, capturing actors live inside controlled ANY.RUN environments and documenting their activities.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These&nbsp;and&nbsp;other&nbsp;reports&nbsp;by&nbsp;ANY.RUN&nbsp;are&nbsp;a&nbsp;testament&nbsp;to&nbsp;how&nbsp;interactive&nbsp;sandboxing&nbsp;and&nbsp;knowledge&nbsp;exchange&nbsp;makes&nbsp;analysis&nbsp;sharper&nbsp;and&nbsp;the&nbsp;entire&nbsp;community&nbsp;stronger.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Spoiler Alert: What to Look Forward&nbsp;to&nbsp;in&nbsp;2026<\/strong>&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve&nbsp;grown a lot this year and&nbsp;we&#8217;re&nbsp;not&nbsp;planning to stop.&nbsp;Here\u2019s&nbsp;a&nbsp;peek into&nbsp;what&nbsp;we\u2019re&nbsp;working on and what&nbsp;you can expect from ANY.RUN&nbsp;in the coming&nbsp;year:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enhanced<strong> teamwork mode<\/strong> for efficient collaboration inside SOCs to help teams work cases together faster and hand off tasks with less friction.<\/li>\n\n\n\n<li><strong>Refined reporting<\/strong> with new text formats, industry-focused scoring, security suggestions, better AI summaries, and auto-generated YARA rules to make findings easier to understand, share, and use in rule updates.<\/li>\n\n\n\n<li>Enrichment of <strong>sandbox detections <\/strong>with relevant threat intelligence data to give each alert more background, so analysts can decide what to do more confidently.<\/li>\n\n\n\n<li>Improved detection quality with <strong>SSL decryption without MITM<\/strong>, <strong>in-browser data inspection<\/strong>, and <strong>AI-powered analysis<\/strong> to help uncover more hidden network threats.<\/li>\n\n\n\n<li>Expanded analysis options for Enterprise users, including <strong>MacOS<\/strong> and <strong>Windows Server support<\/strong> in VMs to let teams analyze threats in environments similar to their real systems and avoid blind spots.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Everything\u2019s&nbsp;changing&nbsp;\u2014&nbsp;threats,&nbsp;TTPs,&nbsp;security&nbsp;measures&#8230;&nbsp;But&nbsp;our&nbsp;goal&nbsp;stays&nbsp;the&nbsp;same:&nbsp;to&nbsp;make&nbsp;malware&nbsp;analysis&nbsp;and&nbsp;threat&nbsp;investigations&nbsp;faster,&nbsp;easier,&nbsp;and&nbsp;smarter.&nbsp;<\/p>\n\n\n\n<p>We want to give a heartfelt thank-you to everyone who stood with us in 2025: our users, partners, researchers, and the wider cybersecurity community. We genuinely appreciate your trust, curiosity, and willingness to exchange knowledge.<\/p>\n\n\n\n<p>You didn\u2019t just use ANY.RUN \u2014 you became its essential part. Every contribution, insight, and bit of feedback helped bring us closer to a safer digital world. Thank you for analyzing, researching, experimenting, and growing alongside us. Your support and engagement mean so much. Together, we\u2019re building something great.<\/p>\n\n\n\n<p>Have&nbsp;alert-free&nbsp;holidays&nbsp;and&nbsp;stay&nbsp;safe&nbsp;in&nbsp;2026!&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2025&amp;utm_term=181225&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> supports over 500,000 cybersecurity professionals around the world. Its Interactive Sandbox makes malware analysis easier by enabling the investigation of threats targeting Windows, Android, and Linux systems. ANY.RUN\u2019s threat intelligence solutions\u2014<a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2025&amp;utm_term=181225&amp;utm_content=linktotilookuplanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> and <a href=\"https:\/\/any.run\/threat-intelligence-feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2025&amp;utm_term=181225&amp;utm_content=linktotifeedslanding\" target=\"_blank\" rel=\"noreferrer noopener\">TI Feeds<\/a>\u2014allow teams to quickly identify IOCs and analyze files, helping them better understand threats and respond to incidents more efficiently.<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=annual-report-2025&amp;utm_term=181225&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Start a 2-week trial of ANY.RUN\u2019s solutions \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s&nbsp;December \u2014 that time of year when we take a&nbsp;pause&nbsp;and look back at how much&nbsp;we\u2019ve&nbsp;achieved.&nbsp; If&nbsp;you\u2019re&nbsp;reading this, chances are&nbsp;you\u2019ve&nbsp;shared these&nbsp;wins&nbsp;with us.&nbsp;Maybe you\u2019ve&nbsp;launched one analysis,&nbsp;maybe thousands.&nbsp;Maybe you\u2019ve&nbsp;browsed our&nbsp;Threat Intelligence Lookup&nbsp;daily or just&nbsp;joined us. Anyhow, thanks for&nbsp;being here!&nbsp; 2025 kept all of us busy&nbsp;for sure. But it also brought a ton of&nbsp;breakthrough studies, insights, and improvements.&nbsp;Let\u2019s&nbsp;glance back [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":17418,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[57,10,34],"class_list":["post-17413","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ANY.RUN 2025 Highlights: Key Threats and Discoveries<\/title>\n<meta name=\"description\" content=\"Explore ANY.RUN\u2019s 2025 Year in Review: top malware discoveries, breakthrough analyses, and key product updates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Year in Review by ANY.RUN: Key Threats, Solutions, and Breakthroughs of 2025\u00a0\",\"datePublished\":\"2025-12-18T09:38:51+00:00\",\"dateModified\":\"2025-12-29T12:31:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/\"},\"wordCount\":2490,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/\",\"name\":\"ANY.RUN 2025 Highlights: Key Threats and Discoveries\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-12-18T09:38:51+00:00\",\"dateModified\":\"2025-12-29T12:31:24+00:00\",\"description\":\"Explore ANY.RUN\u2019s 2025 Year in Review: top malware discoveries, breakthrough analyses, and key product updates.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Year in Review by ANY.RUN: Key Threats, Solutions, and Breakthroughs of 2025\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ANY.RUN 2025 Highlights: Key Threats and Discoveries","description":"Explore ANY.RUN\u2019s 2025 Year in Review: top malware discoveries, breakthrough analyses, and key product updates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Year in Review by ANY.RUN: Key Threats, Solutions, and Breakthroughs of 2025\u00a0","datePublished":"2025-12-18T09:38:51+00:00","dateModified":"2025-12-29T12:31:24+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/"},"wordCount":2490,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/","name":"ANY.RUN 2025 Highlights: Key Threats and Discoveries","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-12-18T09:38:51+00:00","dateModified":"2025-12-29T12:31:24+00:00","description":"Explore ANY.RUN\u2019s 2025 Year in Review: top malware discoveries, breakthrough analyses, and key product updates.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/any.run\/cybersecurity-blog\/category\/news\/"},{"@type":"ListItem","position":3,"name":"Year in Review by ANY.RUN: Key Threats, Solutions, and Breakthroughs of 2025\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/17413"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=17413"}],"version-history":[{"count":29,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/17413\/revisions"}],"predecessor-version":[{"id":17564,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/17413\/revisions\/17564"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/17418"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=17413"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=17413"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=17413"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}