9 Steps to Get CTEM on Your 2025 Budgetary Radar

Budget season is upon us, and everyone in your organization is vying for their slice of the pie. Every year, every department has a pet project that they present as absolutely essential to profitability, business continuity, and quite possibly the future of humanity itself. And no doubt that some of these actually may be mission critical. But as cybersecurity professionals, we understand that

The Hacker News – ​Read More

Cyberattack Blamed for Statewide Washington Courts Outage

Unauthorized activity detected on the Washington courts network, which led to websites and other services becoming unavailable.

The post Cyberattack Blamed for Statewide Washington Courts Outage appeared first on SecurityWeek.

SecurityWeek – ​Read More

INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime

INTERPOL on Tuesday said it took down more than 22,000 malicious servers linked to various cyber threats as part of a global operation.
Dubbed Operation Synergia II, the coordinated effort ran from April 1 to August 31, 2024, targeting phishing, ransomware, and information stealer infrastructure.
“Of the approximately 30,000 suspicious IP addresses identified, 76 per cent were taken down and 59

The Hacker News – ​Read More

South Korea Fines Meta $15 Million for Illegally Collecting Information on Facebook Users

South Korea’s privacy watchdog has fined Meta 21.6 billion won ($15 million) for illegally collecting sensitive personal information from Facebook users.

The post South Korea Fines Meta $15 Million for Illegally Collecting Information on Facebook Users appeared first on SecurityWeek.

SecurityWeek – ​Read More

PLCHound Aims to Improve Detection of Internet-Exposed ICS

Georgia Tech researchers have developed PLCHound, an algorithm that uses AI to improve the identification of internet-exposed ICS.

The post PLCHound Aims to Improve Detection of Internet-Exposed ICS appeared first on SecurityWeek.

SecurityWeek – ​Read More

Release Notes: TI Lookup Notifications, Upgraded Linux Sandbox, STIX Reports, and More 

Welcome to ANY.RUN‘s monthly updates, where we share our latest achievements and improvements. 

October has been another productive month here at ANY.RUN, filled with new features to enhance your cybersecurity toolkit. We’ve introduced TI Lookup Notifications for real-time threat updates, rolled out a newly improved Linux sandbox for smoother malware analysis, and added the ability to export STIX reports for seamless data sharing. 

In addition, we’ve expanded our detection capabilities with a range of new signatures and YARA rules, empowering you with even stronger threat coverage. 

And that’s just the beginning!  

Let’s dive into all the exciting updates from ANY.RUN this month. 

Product Updates

Upgraded Linux Sandbox  

At ANY.RUN, we’re always working to improve our services, and this time, we’ve focused on making our Linux sandbox even better. This upgrade brings a seamless, stable experience on par with our Windows environment, making it easier than ever to analyze Linux malware in real time. 

Upgraded Linux sandbox

We’ve fine-tuned the Linux sandbox with new features and enhancements to boost both performance and usability. Here’s a quick overview of what’s new and how these updates benefit you: 

  • File events tracking: Monitor and log all file actions—whether malware is creating, modifying, or deleting files, you’ll see it all in the analysis report. 
  • Improved process tree: Navigating the process tree is now lag-free, letting you analyze malware behaviors more efficiently. 
  • Real-time file uploads: You can now upload files during an active session, adding flexibility to your investigation without needing to restart. 

See all updates in our blog post.

Try malware and phishing analysis
in ANY.RUN’s Linux sandbox for free 



Try it now


STIX Reports 

In October, we enhanced ANY.RUN’s capabilities by introducing the option to export threat analysis data in the Structured Threat Information eXpression (STIX) format. STIX is a standardized language that facilitates consistent and machine-readable sharing of cyber threat intelligence. 

Click Export → STIX to download threat data 

Key features of STIX reports: 

  • Comprehensive data inclusion: Each STIX report encompasses a wide range of information from your analysis, such as sandbox session links, file hashes, network traffic details, file system modifications, and Tactics, Techniques, and Procedures (TTPs). 
  • Seamless integration: These reports are compatible with Security Information and Event Management (SIEM) systems and other automated tools, promoting efficient threat detection and response. 
  • Enhanced collaboration: By utilizing STIX reports, analysts and incident response teams can effortlessly share threat data across various platforms, improving communication and coordination. 

Discover all types of reports available in the ANY.RUN sandbox.

TI Lookup Notifications 

We have enhanced Threat Intelligence Lookup with Notifications. The new functionality allows users to subscribe to real-time updates on new results related to their specific queries. This includes Indicators of Compromise (IOCs), Indicators of Attack (IOAs), and Indicators of Behavior (IOBs). 

Notifications in TI Lookup are easy to set up

After subscribing to specific queries, the new results will appear in the dashboard, highlighted in green. This will make it easier for you to notice the fresh updates. 

Why use Lookup Notifications? 

  • Automatically monitor and receive updates for your chosen queries, so you never miss critical threat information. 
  • Tap into threat data sourced from samples uploaded by over 500,000 security pros using ANY.RUN’s Interactive Sandbox, giving you a broad view of global cyber activity. 
  • Keep track of IOCs, IOAs, and IOBs relevant to your organization, helping you verify potential threats and proactively strengthen your defenses. 
  • Use real-time insights to refine detection rules, enrich your data, and stay prepared against emerging threats. 

See a guide on how to set up notifications in TI Lookup.

Enrich your threat investigations with data
from TI Lookup 



Request trial


Export Session Lists from Team History 

We’ve introduced a new feature that allows you to export analysis session lists from your team’s history in a specific JSON format. This export provides a structured list of all sandbox sessions completed by your team. 

This feature is designed to help with record-keeping and reporting, making it easier to manage and track your team’s activities over time. 

Custom Tags for Analysis Sessions via API 

We’ve added the ability to set custom tags for sandbox sessions via the API. Previously, you could assign personalized tags to sessions through the web interface, in addition to the system-generated tags. Now, you can do the same directly through the API, giving you more flexibility in organizing and categorizing your analyses. 

Redesigned Threat Intelligence Home Screen with MITRE ATT&CK Matrix 

We’ve redesigned our Threat Intelligence home screen to give you a clearer and more intuitive view of the threat landscape.

Redesigned Threat Intelligence home screen

The updated home screen now features a MITRE ATT&CK matrix with refined techniques and tactics, helping you better assess and understand threats. 

Threat Coverage Updates 

In October, we’ve significantly expanded our detection capabilities with new and updated signatures and YARA rules. 

New Signatures 

This month, we’ve added 90 new signatures to improve detection and monitoring across various malware types and tools, including:

VOBFUS

BASUN

SYSBOT

TIWI

NESHTA

KMS Tool

Blackshades

Modiloader

Shellrunner

Revenge

GoToHttp

AnyDesk

Emmenhtal

SkypeLogView

LockBit3

Ngrok

PSExec

COBINT

ProcDump 

PowerView

SecretsDump 

We added signatures for actions performed via PowerShell: 

  • Resets Windows Defender malware definitions to the base version  
  • Changes settings for sending potential threat samples to Microsoft servers  
  • Changes settings for reporting to Microsoft Active Protection Service (MAPS)  
  • Changes Controlled Folder Access settings  
  • Changes settings for real-time protection  
  • Changes settings for checking scripts for malicious actions  
  • Changes antivirus protection settings for downloading files from the Internet (IOAVProtection)  
  • Changes settings for protection against network attacks (IPS)  
  • Removes files via Powershell 
  • Renames file via Powershell 
  • Hides errors and continues executing the command without stopping  

We also implemented detection for Pafish, aka Paranoid Fish, execution with cohost.exe as a parent process, and encrypted JSE scripts.

YARA Rules 

This month, we’ve expanded our YARA rule set with several new and improved detections, enhancing the ability to identify and monitor specific threats.  

In total, we’ve added 9 new YARA rules, covering various malware families, programming language-based detections, and refinements for better accuracy.

Unknown Stealer (go)  

PureCrypter  

DarkGate  

HijackLoader   

Network Detection Update 

In October, we worked to enrich our database with phishing IOCs, leveraging advanced data analysis within TI Lookup. This effort led to the identification of nearly 6,000 domains, each generating a dedicated Suricata rule

 Most of the rules are now live, strengthening our phishing detection capabilities. 

We also expanded our catalog of detected phishing kits with the addition of Mamba2FA, enhancing our overall threat coverage.

Our external threat intelligence this month focused on proactively detecting phishing campaigns by groups like Storm, allowing us to better track and respond to their evolving tactics. 

Heuristic and Proactive Phishing Detection

This month, our phishing detection capabilities have been enhanced with advanced heuristics and proactive signatures. Here are some examples of recent detections: 

  • Heuristic signature detection: PHISHING [ANY.RUN] Domain chain identified as Phishing (challengepoint). View analysis session 
  • Statistical analysis detection: Using statistical processing of previously detected phishing patterns, we flagged PHISHING [ANY.RUN] Suspected Phishing domain by CrossDomain (logbook-annul-srt[.]click) as a high-risk domain. View analysis session 
  • External threat intelligence detection: Through threat intelligence from external sources, we identified PHISHING [ANY.RUN] Suspected AiTM Storm1575 Domain Phishing Infrastructure (eslebrrte[.]com, eslebrrte[.]de), linked to the Storm1575 phishing campaign. View analysis session 

About ANY.RUN  

ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, Yara Search and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.  

With ANY.RUN you can: 

  • Detect malware in seconds
  • Interact with samples in real time
  • Save time and money on sandbox setup and maintenance
  • Record and study all aspects of malware behavior
  • Collaborate with your team 
  • Scale as you need

Request free trial of ANY.RUN’s products →

The post Release Notes: TI Lookup Notifications, Upgraded Linux Sandbox, STIX Reports, <br>and More  appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

South Korea Fines Meta $15.67M for Illegally Sharing Sensitive User Data with Advertisers

Meta has been fined 21.62 billion won ($15.67 million) by South Korea’s data privacy watchdog for illegally collecting sensitive personal information from Facebook users, including data about their political views and sexual orientation, and sharing it with advertisers without their consent.
The country’s Personal Information Protection Commission (PIPC) said Meta gathered information such as

The Hacker News – ​Read More

Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users

Google’s cloud division has announced that it will enforce mandatory multi-factor authentication (MFA) for all users by the end of 2025 as part of its efforts to improve account security.
“We will be implementing mandatory MFA for Google Cloud in a phased approach that will roll out to all users worldwide during 2025,” Mayank Upadhyay, vice president of engineering and distinguished engineer at

The Hacker News – ​Read More

Attacker Hides Malicious Activity in Emulated Linux Environment

The CRON#TRAP campaign involves a novel technique for executing malicious commands on a compromised system.

darkreading – ​Read More

Interpol operation nets 41 arrests, takedown of 22,000 malicious IPs

The global operation was intended to root out malicious IP addresses used for phishing, ransomware and infostealer malware.

The Record from Recorded Future News – ​Read More