{"id":1910,"date":"2023-12-19T07:34:51","date_gmt":"2023-12-19T07:34:51","guid":{"rendered":"\/cybersecurity-blog\/?p=1910"},"modified":"2023-12-19T08:07:01","modified_gmt":"2023-12-19T08:07:01","slug":"malware-statistics-and-trends","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/","title":{"rendered":"Keep Tabs on Emerging Threats in ANY.RUN Malware Trends Tracker"},"content":{"rendered":"\n<p><strong>Editor\u2019s note:<\/strong><em><strong>\u00a0<\/strong><\/em>The current article was originally published on December 16, 2021, and updated on December 19, 2023.<\/p>\n\n\n\n<p>Every day researchers upload about 8,000 submissions to <a href=\"https:\/\/any.run\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=tracker_updated&amp;utm_content=linktolanding&amp;utm_term=191223\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> sandbox, many of them with malicious verdicts. Cyberthreats are a global danger, and being up to date is a must for any specialist. That\u2019s why we created Malware Trends Tracker.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"545\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-5-1024x545.png\" alt=\"\" class=\"wp-image-6510\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-5-1024x545.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-5-300x160.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-5-768x409.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-5-1536x818.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-5-370x197.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-5-270x144.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-5-740x394.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-5.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">What is Malware Trends Tracker?<\/h2>\n\n\n\n<p>ANY.RUN is committed to improving cybersecurity awareness and threat intelligence. That is why we created <a aria-label=\" (opens in a new tab)\" href=\"https:\/\/any.run\/malware-trends\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=in-house&amp;utm_content=malware_iocs\" target=\"_blank\" rel=\"noreferrer noopener\">Malware Trends Tracker<\/a> (MTT). Here you can find:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dynamically updated statistics of malware activity&nbsp;<\/li>\n\n\n\n<li>Real-time breakdown of the most popular threats&nbsp;<\/li>\n\n\n\n<li>Latest IPs, hashes, domains and URLs of each malware&nbsp;<\/li>\n\n\n\n<li>Descriptions and execution flow summaries for different malicious programs&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The results are based on data gathered from ANY.RUN&#8217;s <a href=\"https:\/\/app.any.run\/submissions?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=tracker_updated&amp;utm_content=linktolanding&amp;utm_term=191223\" target=\"_blank\" rel=\"noreferrer noopener\">public submissions<\/a>. Our database consists of nearly 5 million uploads and is constantly growing \u2014 that\u2019s how we\u2019re able to provide reliable statistics, which are searchable by GEO and time period.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"663\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-4-1024x663.png\" alt=\"\" class=\"wp-image-6511\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-4-1024x663.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-4-300x194.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-4-768x498.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-4-1536x995.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-4-370x240.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-4-270x175.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-4-740x479.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-4.png 1948w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">How to monitor malware trends?&nbsp;<\/h2>\n\n\n\n<p>Widgets of each malware show the overall number of sandbox tasks where that family has been seen. Using the popularity graph, look out for patterns of peak and off-peak activity. This usually indicates if an active campaign is running.&nbsp;<\/p>\n\n\n\n<p>For example, taking this <a href=\"https:\/\/any.run\/cybersecurity-blog\/rise-and-fall-of-emotet\/\" target=\"_blank\" rel=\"noreferrer noopener\">Emotet<\/a> widget as a case study it&#8217;s obvious that the number of uploads rocketed and then plummeted within a year. The dip is when threat actors were arrested, stopping all activity.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"754\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-2-1024x754.png\" alt=\"\" class=\"wp-image-6512\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-2-1024x754.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-2-300x221.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-2-768x566.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-2-370x272.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-2-270x199.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-2-740x545.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-2-80x60.png 80w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-2.png 1108w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><strong><em>We like to use this as an identifier for what the hot malware is at the time and what most people are encountering in the field. It can be offset by automation or old samples but in general, most people are not automating or have access to your API so we see it as a good organic measurement. In particular, when Emotet spikes up we see that as a good indicator of infections going up.<\/em><\/strong><\/p>\n<cite><a href=\"https:\/\/twitter.com\/Cryptolaemus1\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">@Cryptolaemus1<\/a>, a team of cybersecurity analysts, learn more on their <a href=\"https:\/\/paste.cryptolaemus.com\/about\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">blog<\/a><br><\/cite><\/blockquote>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nBest SOC teams analyze malware with <span class=\"highlight\">ANY.RUN<\/span>&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/app.any.run\/#register\/\" rel=\"noopener\" target=\"_blank\">\nJoin their ranks\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>Each malware name goes with green or red symbols. These are the signs of active and non-active malware that are there in the wild.&nbsp;&nbsp;<\/p>\n\n\n\n<p>If you want to see the number of uploads, you can choose an indication over a specific period: all time, a year, month, two weeks, or a week. The arrow presents the rise or decline of malware within a particular time.&nbsp;<\/p>\n\n\n\n<p>Hashes, IPs, and domains of a particular malware program are at the bottom of the widget, so you can plan how many of them you can investigate.&nbsp;<\/p>\n\n\n\n<p>And if you want a view that shows a bigger picture, choose the list view option, which fits more malware families on the screen. Useful if you want to compare popularity trends across a wider selection range.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00a0<\/strong><\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"567\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/4-2-1024x567.png\" alt=\"\" class=\"wp-image-6513\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/4-2-1024x567.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/4-2-300x166.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/4-2-768x425.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/4-2-1536x850.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/4-2-2048x1133.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/4-2-370x205.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/4-2-270x149.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/4-2-740x410.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Use Filters to look for specific threats&nbsp;<\/h2>\n\n\n\n<p>Imagine you need to track the popularity of RATs in the US over the past month. This is where filters come into play. They&#8217;re designed to simplify your search. You&#8217;ll find the filter icon located in the navigation panel. Click on it to start tailoring your results.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"194\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-1-1024x194.png\" alt=\"\" class=\"wp-image-6514\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-1-1024x194.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-1-300x57.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-1-768x145.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-1-1536x291.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-1-370x70.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-1-270x51.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-1-740x140.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/5-1.png 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Once you click on the filter icon, a sliding menu will appear on the left side of your screen. This feature allows you to refine your search based on several criteria:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The country where the sample was uploaded&nbsp;<\/li>\n\n\n\n<li>The type of malware&nbsp;<\/li>\n\n\n\n<li>The malware family (particularly useful if you&#8217;re tracking a specific strain)&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>To apply a filter, simply type to search or scroll until you find the desired filter option. Then, just mark the appropriate checkbox to narrow down your results.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"584\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/6-1-1024x584.png\" alt=\"\" class=\"wp-image-6515\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/6-1-1024x584.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/6-1-300x171.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/6-1-768x438.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/6-1-1536x876.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/6-1-2048x1168.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/6-1-370x211.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/6-1-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/6-1-740x422.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>As you can see, Stealer usage has decreased slightly over the last 30 days in the US, as of the time of writing.&nbsp;&nbsp;<\/p>\n\n\n\n<p>This kind of targeted search can help you anticipate potential threats your organization might face in the future. With this information in hand, you can proactively adjust your security strategy as required, ensuring your defenses are always one step ahead.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The latest data on malware&nbsp;<\/h2>\n\n\n\n<p>When you encounter malware of any type for the first time, you would rather know everything about it. And here you are. All detailed information about the object of your analysis is here, in MTT. The articles contain new information that is provided by the latest submissions and <a href=\"https:\/\/any.run\/cybersecurity-blog\/free-malware-samples-reports\/\" target=\"_blank\" rel=\"noreferrer noopener\">reports<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"853\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/7-1-1024x853.png\" alt=\"\" class=\"wp-image-6516\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/7-1-1024x853.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/7-1-300x250.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/7-1-768x640.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/7-1-1536x1280.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/7-1-370x308.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/7-1-270x225.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/7-1-740x617.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/7-1.png 1908w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Choose a malware you want to know about and click on its widget. You can also hover over the malware in list view to bring up additional information:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"482\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/8-1-1024x482.png\" alt=\"\" class=\"wp-image-6517\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/8-1-1024x482.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/8-1-300x141.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/8-1-768x362.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/8-1-1536x723.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/8-1-2048x965.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/8-1-370x174.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/8-1-270x127.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/8-1-740x349.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>On the malware page, you can find the following details:\u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>malware description&nbsp;<\/li>\n\n\n\n<li>malware history&nbsp;<\/li>\n\n\n\n<li>recent samples&nbsp;<\/li>\n\n\n\n<li>malware distribution method&nbsp;<\/li>\n\n\n\n<li>malware execution video&nbsp;&nbsp;<\/li>\n\n\n\n<li>detection process&nbsp;<\/li>\n\n\n\n<li>global, week, and month ranks&nbsp;<\/li>\n\n\n\n<li>IOCs \u2013 latest IP addresses&nbsp;&nbsp;<\/li>\n\n\n\n<li>Hashes&nbsp;<\/li>\n\n\n\n<li>domain names&nbsp;<\/li>\n\n\n\n<li>URLs\u00a0<\/li>\n<\/ul>\n\n\n\n<p>For example, here&#8217;s a slice of IOC data about Redline, taken at the time of writing:\u00a0<\/p>\n\n\n\n<div class=\"wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper\n\"\n    >\n        <table id=\"wpdtSimpleTable-48\"\n           style=\"border-collapse:collapse;\n                   border-spacing:0px;\"\n           class=\"wpdtSimpleTable wpDataTable\"\n           data-column=\"4\"\n           data-rows=\"6\"\n           data-wpID=\"48\"\n           data-responsive=\"0\"\n           data-has-header=\"1\">\n\n                    <thead>        <tr class=\"wpdt-cell-row \" >\n                                <th class=\"wpdt-cell wpdt-bold wpdt-align-center\"\n                                            data-cell-id=\"A1\"\n                    data-col-index=\"0\"\n                    data-row-index=\"0\"\n                    style=\" width:25%;                    padding:10px;\n                    \"\n                    >\n                                        IPs\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold wpdt-align-center\"\n                                            data-cell-id=\"B1\"\n                    data-col-index=\"1\"\n                    data-row-index=\"0\"\n                    style=\" width:25%;                    padding:10px;\n                    \"\n                    >\n                                        Hashes\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold wpdt-align-center\"\n                                            data-cell-id=\"C1\"\n                    data-col-index=\"2\"\n                    data-row-index=\"0\"\n                    style=\" width:25%;                    padding:10px;\n                    \"\n                    >\n                                        Domains\u00a0                    <\/th>\n                                                <th class=\"wpdt-cell wpdt-bold wpdt-align-center\"\n                                            data-cell-id=\"D1\"\n                    data-col-index=\"3\"\n                    data-row-index=\"0\"\n                    style=\" width:25%;                    padding:10px;\n                    \"\n                    >\n                                        URLs\u00a0                    <\/th>\n                                        <\/tr>\n                    <tbody>        <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"A2\"\n                    data-col-index=\"0\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        176.123.7.190\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"B2\"\n                    data-col-index=\"1\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        56A2CE8E0E57DAC8472377F2F3C4286A72FFE1326EE568B9632CE7D25961BBE0\u00a0\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"C2\"\n                    data-col-index=\"2\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        5.tcp.eu.ngrok.io\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"D2\"\n                    data-col-index=\"3\"\n                    data-row-index=\"1\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a href=\"http:\/\/178.33.57.150:1334\/\u00a0\" target=\"_blank\">http:\/\/178.33.57.150:1334\/\u00a0<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"A3\"\n                    data-col-index=\"0\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        45.15.156.187\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"B3\"\n                    data-col-index=\"1\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        853986BC5BC9F1D19EC219552551D167C37A73FFDF4BF705DAE751A9BC980AEA\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"C3\"\n                    data-col-index=\"2\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        6.tcp.eu.ngrok.io\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"D3\"\n                    data-col-index=\"3\"\n                    data-row-index=\"2\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a href=\"http:\/\/185.222.58.99:55615\/\u00a0\" target=\"_blank\">http:\/\/185.222.58.99:55615\/\u00a0<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"A4\"\n                    data-col-index=\"0\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        194.33.191.102\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"B4\"\n                    data-col-index=\"1\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0ACD3472F850EF8D3E5867417F1551C1B061AD503F1C6ACCC9FFC87320386D05\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"C4\"\n                    data-col-index=\"2\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        2.tcp.eu.ngrok.io\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"D4\"\n                    data-col-index=\"3\"\n                    data-row-index=\"3\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a href=\"http:\/\/91.92.243.247:1334\/\u00a0\" target=\"_blank\">http:\/\/91.92.243.247:1334\/\u00a0<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"A5\"\n                    data-col-index=\"0\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        38.47.221.193\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"B5\"\n                    data-col-index=\"1\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        E658A5B736828E06A859FE0CD526310E7B89A2EDE6F81929249D91521343505F\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"C5\"\n                    data-col-index=\"2\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        ezeeshopper.com\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"D5\"\n                    data-col-index=\"3\"\n                    data-row-index=\"4\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a href=\"http:\/\/103.173.227.25:12664\/\u00a0\" target=\"_blank\">http:\/\/103.173.227.25:12664\/\u00a0<\/a>                    <\/td>\n                                        <\/tr>\n                            <tr class=\"wpdt-cell-row \" >\n                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"A6\"\n                    data-col-index=\"0\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        206.123.140.95\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"B6\"\n                    data-col-index=\"1\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        F9670A844453E56898ED4C23AFE57DFA2CD20F28AE8E97DF4C7304371E1B179B\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"C6\"\n                    data-col-index=\"2\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        0.tcp.eu.ngrok.io\u00a0                    <\/td>\n                                                <td class=\"wpdt-cell wpdt-align-center\"\n                                            data-cell-id=\"D6\"\n                    data-col-index=\"3\"\n                    data-row-index=\"5\"\n                    style=\"                    padding:10px;\n                    \"\n                    >\n                                        <a href=\"http:\/\/185.222.58.246:55615\/\u00a0\" target=\"_blank\">http:\/\/185.222.58.246:55615\/\u00a0<\/a>                    <\/td>\n                                        <\/tr>\n                    <\/table>\n<\/div><style id='wpdt-custom-style-48'>\ntable#wpdtSimpleTable-48{ table-layout: fixed !important; }\ntable#wpdtSimpleTable-48 td, table.wpdtSimpleTable48 th { white-space: normal !important; }\n<\/style>\n\n\n\n\n<p>You\u2019ll also see a list of the latest tasks where Redline was identified. These are clickable, allowing you to easily see that particular submission. This is useful if you need to collect more data or re-run the task in a different VM configuration.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"2032\" height=\"890\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/9-1024x449.png\" alt=\"\" class=\"wp-image-6518\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/9-1024x449.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/9-300x131.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/9-768x336.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/9-1536x673.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/9-370x162.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/9-270x118.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/9-740x324.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/9.png 2032w\" sizes=\"(max-width: 2032px) 100vw, 2032px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Read about malware types&nbsp;<\/h2>\n\n\n\n<p>In Trends tracker, you can also find information about different types of malware, (stealers, ransomware, trojans and so on).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"582\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/10-1024x582.png\" alt=\"\" class=\"wp-image-6519\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/10-1024x582.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/10-300x170.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/10-768x436.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/10-1536x873.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/10-2048x1163.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/10-370x210.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/10-270x153.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/10-740x420.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>Click on the malware type within the malware page to access the most recent information on this specific malware category. This includes the latest IOCs and a detailed description of characteristics typical for this type, which is useful when you want to brush up on fundamentals.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"584\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/11-1024x584.png\" alt=\"\" class=\"wp-image-6520\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/11-1024x584.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/11-300x171.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/11-768x438.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/11-1536x876.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/11-2048x1168.png 2048w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/11-370x211.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/11-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/11-740x422.png 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Why do you need malware statistics and trends?\u00a0<\/h2>\n\n\n\n<p>Malware statistics and trends are an effective source for security specialists. Recent threat dynamics can help predict future trends of malware and possible attacks, enhance defense strategy, and understand the behavior of existing malicious objects.&nbsp;<\/p>\n\n\n\n<p>Trends tracker gives that visual connection that transforms information into intelligence.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>About ANY.RUN<\/strong>&nbsp;<\/h3>\n\n\n\n<p>ANY.RUN is an interactive sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams. Every day, 300,000 professionals use our platform to investigate incidents and research threats. Request a demo to test our sandbox for free in the next 14 days.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=tracker_updated&amp;utm_content=linktodemo&amp;utm_term=191223\" target=\"_blank\" rel=\"noreferrer noopener\">Request demo \u2192<\/a>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Editor\u2019s note:\u00a0The current article was originally published on December 16, 2021, and updated on December 19, 2023. Every day researchers upload about 8,000 submissions to ANY.RUN sandbox, many of them with malicious verdicts. Cyberthreats are a global danger, and being up to date is a must for any specialist. That\u2019s why we created Malware Trends [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6525,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[40],"class_list":["post-1910","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-lifehacks","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Keep Tabs on Emerging Threats in ANY.RUN Malware Trends Tracker - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Malware trends tracker shows a score to monitor malware trends and levels of cyberthreats. It helps to provide further analytics and insights.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Keep Tabs on Emerging Threats in ANY.RUN Malware Trends Tracker\",\"datePublished\":\"2023-12-19T07:34:51+00:00\",\"dateModified\":\"2023-12-19T08:07:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/\"},\"wordCount\":1066,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"malware behavior\"],\"articleSection\":[\"Cybersecurity Lifehacks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/\",\"name\":\"Keep Tabs on Emerging Threats in ANY.RUN Malware Trends Tracker - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2023-12-19T07:34:51+00:00\",\"dateModified\":\"2023-12-19T08:07:01+00:00\",\"description\":\"Malware trends tracker shows a score to monitor malware trends and levels of cyberthreats. It helps to provide further analytics and insights.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Lifehacks\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Keep Tabs on Emerging Threats in ANY.RUN Malware Trends Tracker\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keep Tabs on Emerging Threats in ANY.RUN Malware Trends Tracker - ANY.RUN&#039;s Cybersecurity Blog","description":"Malware trends tracker shows a score to monitor malware trends and levels of cyberthreats. It helps to provide further analytics and insights.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Keep Tabs on Emerging Threats in ANY.RUN Malware Trends Tracker","datePublished":"2023-12-19T07:34:51+00:00","dateModified":"2023-12-19T08:07:01+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/"},"wordCount":1066,"commentCount":1,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["malware behavior"],"articleSection":["Cybersecurity Lifehacks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/","url":"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/","name":"Keep Tabs on Emerging Threats in ANY.RUN Malware Trends Tracker - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2023-12-19T07:34:51+00:00","dateModified":"2023-12-19T08:07:01+00:00","description":"Malware trends tracker shows a score to monitor malware trends and levels of cyberthreats. It helps to provide further analytics and insights.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/malware-statistics-and-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Lifehacks","item":"https:\/\/any.run\/cybersecurity-blog\/category\/lifehacks\/"},{"@type":"ListItem","position":3,"name":"Keep Tabs on Emerging Threats in ANY.RUN Malware Trends Tracker"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1910"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=1910"}],"version-history":[{"count":3,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1910\/revisions"}],"predecessor-version":[{"id":6523,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/1910\/revisions\/6523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/6525"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=1910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=1910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=1910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}