{"id":6598,"date":"2024-01-04T09:08:09","date_gmt":"2024-01-04T09:08:09","guid":{"rendered":"\/cybersecurity-blog\/?p=6598"},"modified":"2024-01-09T07:25:01","modified_gmt":"2024-01-09T07:25:01","slug":"annual-report-2023","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/","title":{"rendered":"Looking back at 2023 with ANY.RUN"},"content":{"rendered":"\n<p>As 2023 draws to a close, it&#8217;s time to look back on a remarkable year. It&#8217;s been quite a journey.&nbsp;<\/p>\n\n\n\n<p>Our team has been hard at work this year, and we\u2019re happy and excited to look back and see how far our interactive sandbox has come in just 12 short months.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We\u2019ve begun <strong>automating real-time malware <\/strong>interactions with the help of Machine Learning&nbsp;<\/li>\n\n\n\n<li>Released <strong>Threat intelligence feeds<\/strong>. They pull data from ANY.RUN&#8217;s repository of almost 50 Million unique quarterly IOCs, helping you expand threat coverage of SIEM systems.&nbsp;<\/li>\n\n\n\n<li>Added a <strong>Script tracer <\/strong>to analyze script execution step-by-step script&nbsp;&nbsp;<\/li>\n\n\n\n<li>And so much more&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>With that said, let&#8217;s go over every major update to ANY.RUN in 2023.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN: our biggest updates in 2023&nbsp;<\/h2>\n\n\n\n<p>Let\u2019s cover the major improvements that took place in the <a href=\"https:\/\/any.run\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=2023_recap&amp;utm_content=linktolanding&amp;utm_term=291223\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> sandbox this year:<\/p>\n\n\n\n<figure class=\"wp-block-video\"><video controls src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/automated-interactivity-captcha-mitm-new-1-1-2.mp4\"><\/video><\/figure>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/automated-interactivity\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Automated interactivity (ML)<\/strong><\/a><strong>. <\/strong>ANY.RUN can now intelligently detect and prioritize interactive elements. It can click on links, buttons, complete CAPTCHAs and perform other actions to detonate malware, capturing the resulting system behavior. This is especially useful for those who utilize our sandbox via API, since it dramatically increases detection rate of complex malware attacks.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/residential-proxy-for-your-traffic\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Residential proxy<\/strong><\/a><strong>: <\/strong>You can now switch from a datacenter IP to a residential IP. Use Residential proxy to hide sandbox activity and mimic local traffic. This sidesteps malware&#8217;s anti-sandbox tricks, gets around geo-blocks, and helps you analyze C2 communication.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-powered-analysis-method\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ChatGPT reports<\/strong><\/a><strong>. <\/strong>Get detailed and logical AI-generated summaries for process trees, command line data, Suricata rule triggers, HTTP connections, registry changes, and mutex patterns for links and files you submit.<strong> <\/strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/chatgpt-powered-analysis-method\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a>.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/static-discovery-update\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Modular Static Discovering<\/strong><\/a><strong>.<\/strong> Modules broaden the file types you can analyze in Static Discovering. The sandbox now auto-selects the best method for data extraction, even from complex nested structures. Current modules already cover MSG\/Email, Office, OneNote, PDF, LNK, and ZIP.&nbsp;<\/li>\n<\/ol>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nTry all features of <span class=\"highlight\">ANY.RUN<\/span> for free with a 14-day trial&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/any.run\/demo\/\" rel=\"noopener\" target=\"_blank\">\nRequest trial\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-feeds\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Threat Intelligence Feeds<\/strong><\/a><strong>. <\/strong>ANY.RUN&#8217;s new service is our first step to better utilize our database of latest threats for Intelligence. It streams IOCs in STIX format, ready for modern SIEM systems. A wide range of threat data like malicious IPs, URLs, and domains is available. Plus, you can pull contextual metadata for IOCs to speed up incident investigations.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\">\n<li><strong>&nbsp;<\/strong><a href=\"https:\/\/any.run\/cybersecurity-blog\/qr-extractor\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>QR code detector and extractor<\/strong><\/a><strong>. <\/strong>Attackers began delivering malicious links in QR codes. We responded swiftly, adding a QR code module to Static Discovering. It auto-detects and extracts links from QR codes \u2014 even when they\u2019re nested in other files \u2014&nbsp; so you can rapidly submit QRs for further analysis in the system.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\">\n<li><strong>Uploading addition files to active tasks<\/strong><strong>. <\/strong>You can now bring your own set of tools to ANY.RUN, or augment tasks with files that the malware depends on to execute. All users can upload files to an active virtual session, up to 500 MB in total. Hunter and Enterprise subscribers also get Tool collections \u2014 a separate tab for quick access to favorites.&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"8\">\n<li><a href=\"https:\/\/any.run\/cybersecurity-blog\/script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Script tracer<\/strong><\/a><strong>. <\/strong>Script-based malware has been on the rise in 2023<strong>. <\/strong>That&#8217;s why we added a tool that helps you trace and deobfuscate the execution flow of scripting programs. It works with JScript, VB Script, VBA and Macro 4.0 and is supported on all OS versions available in ANY.RUN, from Windows 7 to Windows 11.&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"9\">\n<li><strong>Expanded Suricata rules<\/strong>. ANY.RUN now shows more information about triggered Suricata rules. You\u2019ll be able to see which specific rule was triggered, identify the traffic segment affected, the relevant fields, and often, even see the rule itself.&nbsp;<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Even more exciting updates:<\/strong>&nbsp;<\/h3>\n\n\n\n<p>For our Enterprise-plan subscribers, Single Sign-On (SSO) authentication now offers seamless platform access. For in-depth malware analysis, security analysts can download and examine memory dumps of various processes.&nbsp;<\/p>\n\n\n\n<p>Additionally, the platform has enhanced file authentication through digital signatures, allowing users to verify file authenticity and trustworthiness.&nbsp;<\/p>\n\n\n\n<p>Simplifying data retrieval, users can export all sandbox analysis data in a single ZIP file. The service has improved its detection logic for IPs, URLs, and domains, ensuring better identification of malicious activities like phishing and QR code scams.&nbsp;<\/p>\n\n\n\n<p>Finally, API request quotas have been restructured for team-wide sharing, allowing all team members to collectively use the total API requests available.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Linux is Coming to ANY.RUN&nbsp;<\/h2>\n\n\n\n<p>We\u2019ve teased that starting 2024 ANY.RUN will support Ubuntu. You\u2019ll be able to analyze samples, collect IOCs and streamline research of Linux malware with all of the advantages ANY.RUN brings, like interactivity and real-time results. Ubuntu 22.04.2 will be available at launch with more options to follow.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"817\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-9-1024x817.png\" alt=\"\" class=\"wp-image-6600\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-9-1024x817.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-9-300x239.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-9-768x613.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-9-370x295.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-9-270x215.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-9-740x590.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/1-9.png 1334w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN\u2019s community now has an official home<\/h2>\n\n\n\n<p>Another highlight of 2023 was the launch of our Discord server. We thought it&#8217;d be great to have a dedicated space where all ANY.RUN malware hunters can gather, share news and tips about malware analysis, and directly interact with our team.&nbsp;<\/p>\n\n\n\n<p>We&#8217;re thrilled to announce that our ANY.RUN Discord community now boasts over 3,000 members and is expanding daily. If you haven&#8217;t joined us yet, we&#8217;d be delighted to welcome you aboard!<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nBecome part of <span class=\"highlight\">ANY.RUN&#8217;s<\/span> growing community&nbsp;\n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/discord.com\/invite\/anyrun\/\" rel=\"noopener\" target=\"_blank\">\nJoin our Discord\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">ANY.RUN Top Awards in 2023&nbsp;<\/h2>\n\n\n\n<p>This year, our service collected many prestigious cybersecurity awards. We&#8217;re incredibly proud and humbled by this recognition. It&#8217;s a journey we couldn&#8217;t have made without you, our users. Here&#8217;s what you&#8217;ve helped us achieve:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ANY.RUN won the <a href=\"https:\/\/www.bintelligence.com\/posts\/105-people-companies-and-products-named-in-2023-fortress-cyber-security-awards\" target=\"_blank\" rel=\"noreferrer noopener\">Fortress Cyber Security Award<\/a> in the Threat Detection category.&nbsp;<\/li>\n\n\n\n<li>Our sandbox was awarded the <a href=\"https:\/\/www.innovationinbusiness.com\/winners\/anyrun-fzco\/\" target=\"_blank\" rel=\"noreferrer noopener\">Malware Monitoring &amp; Analysis Innovator of the Year 2023<\/a> by Innovation in Business.&nbsp;<\/li>\n\n\n\n<li>ANY.RUN was named the <a href=\"https:\/\/cyberdefenseawards.com\/top-infosec-innovators-for-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">Most Innovative in Malware Analysis by The Cyber Defense Awards<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>ANY.RUN was also a finalist at Innovation in <a href=\"https:\/\/thenationalcyberawards.org\/2023-winners\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber 2023<\/a> by The National Cyber Awards and for the <a href=\"https:\/\/event.computing.co.uk\/cloudexcellenceawards2023\/en\/page\/2023-finalists\" target=\"_blank\" rel=\"noreferrer noopener\">Most Innovative Cloud Product or Service<\/a> by the Cloud Excellence Awards.&nbsp;<\/p>\n\n\n\n<p>And, last but not least, on G2, ANY.RUN was recognized in 3 categories:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-9-1024x576.png\" alt=\"\" class=\"wp-image-6602\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-9-1024x576.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-9-300x169.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-9-768x432.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-9-1536x864.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-9-370x208.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-9-270x152.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-9-740x416.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/2-9.png 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Most popular malware of 2023: ANY.RUN\u2019s top five by uploads&nbsp;<\/h2>\n\n\n\n<p>Of course, since ANY.RUN is a tool designed for malware hunters, it&#8217;s only natural that we take a closer look at the top 5 most popular malware types and families in 2023. This is just a sneak peek \u2014 our more extensive yearly report will be released soon.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"962\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-6-962x1024.png\" alt=\"\" class=\"wp-image-6603\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-6-962x1024.png 962w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-6-282x300.png 282w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-6-768x818.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-6-1442x1536.png 1442w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-6-370x394.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-6-270x288.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-6-740x788.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2023\/12\/3-6.png 1800w\" sizes=\"(max-width: 962px) 100vw, 962px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Top 5 most popular malware: categories<\/strong>&nbsp;<\/h3>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>Loader<\/strong> with 24,136 detections&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Stealer <\/strong>with 18,290 detections&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>Remote Access Trojan (RAT) <\/strong>with 17,431 detections&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li><strong>Trojan <\/strong>with 15,630 detections&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li><strong>Ransomware <\/strong>with 12,820 detections&nbsp;<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Top 5 most popular malware: families<\/strong>&nbsp;<\/h3>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li><strong>Redline<\/strong> <strong><\/strong>with 9205 detections&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li><strong>Remcos <\/strong>with 4407 detections&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>Agent <\/strong>Tesla with 4215 detections&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li><strong>njRAT<\/strong> with 3939 detections&nbsp;&nbsp;<\/li>\n<\/ol>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li><strong>AsyncRAT <\/strong>with 2733 detections&nbsp;<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Wrapping up&nbsp;<\/h2>\n\n\n\n<p>2023 has been a remarkable year for us at ANY.RUN, filled with both achievements and challenges. The cybersecurity landscape faced tough times, with global unrest unfortunately opening doors for increased cyber threats. The ease of creating and using malware has reached a point where practically anyone could be a potential threat.&nbsp;<\/p>\n\n\n\n<p>Our goal is to combat these challenges by enhancing our sandbox&#8217;s capabilities and providing robust support to you, our dedicated community, in your malware research efforts. Together, we&#8217;re committed to making the online world a safer place, one step at a time.&nbsp;<\/p>\n\n\n\n<p>We wish everyone a Happy New Year! Let it be the year of progress, security and thriving.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>A few words about ANY.RUN&nbsp;&nbsp;<\/strong>&nbsp;<\/h3>\n\n\n\n<p>ANY.RUN is a cloud malware sandbox that handles the heavy lifting of malware analysis for SOC and DFIR teams. Every day, 300,000 professionals use our platform to investigate incidents and streamline threat analysis.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Request a demo today and enjoy 14 days of free access to our Enterprise plan.<\/p>\n\n\n\n<p><a href=\"http:\/\/any.run\/demo\/?utm_source=blog&amp;utm_medium=article&amp;utm_campaign=2023_recap&amp;utm_content=linktodemo&amp;utm_term=291223\" target=\"_blank\" rel=\"noreferrer noopener\">Request demo \u2192<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As 2023 draws to a close, it&#8217;s time to look back on a remarkable year. It&#8217;s been quite a journey.&nbsp; Our team has been hard at work this year, and we\u2019re happy and excited to look back and see how far our interactive sandbox has come in just 12 short months.&nbsp; With that said, let&#8217;s [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":6606,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[57,10,34,56],"class_list":["post-6598","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-service-updates","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-update"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Looking back at 2023 with ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog<\/title>\n<meta name=\"description\" content=\"Let&#039;s look back and see how far the ANY.RUN interactive sandbox has come in just 12 short months. Discover all of our 2023 releases.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vlad Ananin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/\"},\"author\":{\"name\":\"Vlad Ananin\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Looking back at 2023 with ANY.RUN\",\"datePublished\":\"2024-01-04T09:08:09+00:00\",\"dateModified\":\"2024-01-09T07:25:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/\"},\"wordCount\":1324,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"update\"],\"articleSection\":[\"Service Updates\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/\",\"name\":\"Looking back at 2023 with ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2024-01-04T09:08:09+00:00\",\"dateModified\":\"2024-01-09T07:25:01+00:00\",\"description\":\"Let's look back and see how far the ANY.RUN interactive sandbox has come in just 12 short months. Discover all of our 2023 releases.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service Updates\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Looking back at 2023 with ANY.RUN\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"Vlad Ananin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g\",\"caption\":\"Vlad Ananin\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/vlad-ananin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Looking back at 2023 with ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog","description":"Let's look back and see how far the ANY.RUN interactive sandbox has come in just 12 short months. Discover all of our 2023 releases.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/","twitter_misc":{"Written by":"Vlad Ananin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/"},"author":{"name":"Vlad Ananin","@id":"https:\/\/any.run\/"},"headline":"Looking back at 2023 with ANY.RUN","datePublished":"2024-01-04T09:08:09+00:00","dateModified":"2024-01-09T07:25:01+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/"},"wordCount":1324,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","update"],"articleSection":["Service Updates"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/","url":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/","name":"Looking back at 2023 with ANY.RUN - ANY.RUN&#039;s Cybersecurity Blog","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2024-01-04T09:08:09+00:00","dateModified":"2024-01-09T07:25:01+00:00","description":"Let's look back and see how far the ANY.RUN interactive sandbox has come in just 12 short months. Discover all of our 2023 releases.\u00a0","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/annual-report-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Service Updates","item":"https:\/\/any.run\/cybersecurity-blog\/category\/service-updates\/"},{"@type":"ListItem","position":3,"name":"Looking back at 2023 with ANY.RUN"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"Vlad Ananin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/564ed55b05884a34062108096c0ed973?s=96&d=mm&r=g","caption":"Vlad Ananin"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/vlad-ananin\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6598"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=6598"}],"version-history":[{"count":5,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6598\/revisions"}],"predecessor-version":[{"id":6629,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/6598\/revisions\/6629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/6606"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=6598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=6598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=6598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}