Release Notes: SDK Integration, Notifications, 1000+ Detection Rules, and APT Reports 

April was another busy month for the ANY.RUN team! 
We continued improving our malware detection capabilities, expanded our behavior signatures, and sharpened threat intelligence, all to make your investigations faster, deeper, and even more precise. 

From adding fresh Suricata rules and YARA signatures to detecting new malware behaviors, here’s what’s new at ANY.RUN this month. 

Let’s dive in! 

Product Updates 

Integration of ANY.RUN Services with Your Security Systems via SDK 

In April, we’ve announced the release of the ANY.RUN SDK, making it easier than ever to integrate our products directly into your infrastructure. 

Security teams can now automate submissions, accelerate workflows, and tailor ANY.RUN’s solutions to fit their existing systems like SIEM, SOAR, or XDR. 
This gives them faster investigations, fewer manual tasks, and more resources freed up for critical analysis. 

By integrating ANY.RUN’s products into the security infrastructure via SDK, you can: 

  • Search IOCs, IOBs, and IOAs across our threat database via TI Lookup 
  • Receive and process network-based IOCs with TI Feeds 

The SDK is available for users with the Hunter and Enterprise plans. 

With the help of this simple integration, we want to make sure that organizations reduce incident response time, improve detection rates, and build a stronger, more resilient security posture. 

How to get started: The SDK is Python-based and includes documentation, libraries, and ready-to-use code samples. Find full instructions on GitHub and PyPI.  

Contributions and suggestions from other developers are also welcome! For more info on how to contribute, see our guide

Test ANY.RUN’s services with 14-day trial
to see how they can strengthen your company’s security 



Get 14-day trial


Stay Informed with the New Notifications Window 

New Notifications section displayed inside ANY.RUN 

ANY.RUN users will now have access to Notifications directly from the platform interface. 

This section is built to keep you informed about the most important updates without cluttering your workflow. 

With quick access to key information, your security team can easily stay on top of new capabilities, detection improvements, and emerging threats. 

Notifications are short, clear, and actionable, so you can stay focused on your investigations while staying in the loop. 

Inside the Notifications section, you’ll find: 

  • Key product updates and new feature announcements 
  • Alerts about critical service improvements 
  • Links to major research reports and threat analyses 
  • Important security advisories from our team 

Threat Coverage Updates 

In April, we expanded our detection coverage across Android, Windows, and Linux environments with updated rules, behavior signatures, and threat intelligence to support more precise, faster investigations. 

Here’s a quick look at what’s been updated: 

New Suricata Rules 

We added 902 new Suricata rules in April to improve visibility into network-based threats, including malicious domains, phishing infrastructure, and C2 traffic. 

These updates enhance detection coverage for various malware families, including miners, stealers, and ransomware. 

Behavior Signatures 

We introduced 91 new behavior-based signatures to improve detection for malware samples across platforms. These updates include: 

Android: 

  • CHAMELEON 
  • TGTOXIC 

Windows: 

  • SOSANO 
  • HELLOKITTY 

Linux: 

  • KAIJI 

Vulnerability Exploits Tracked: 

In April, we observed active exploitation attempts involving two newly disclosed vulnerabilities: 

These exploits were identified during real-world malware analysis sessions and are now reflected in our detection logic. ANY.RUN continues to monitor and analyze new CVEs to provide fast, actionable insights for defenders. 

New YARA Rule Updates 

We released 13 new and updated YARA rules to improve static detection and classification, covering both new malware strains and updates to existing detections. 

New or updated rules include: 

  • chstealer 
  • octalyn 
  • zerotrace 
  • prysmax 

Additionally, we added and updated detectors and extractors for: 

  • Grandoreiro banking malware 

New TI Reports Published 

TI Reports get you up to speed on the latest cyber threats targeting businesses 

In April, we added two new reports to our Threat Intelligence library, focused on advanced persistent threats (APTs) and coordinated cybercriminal activity. These reports provide fresh insights into recent campaigns, along with actionable tools to support threat hunting, attribution, and detection. 

Please note that the reports are available to TI Lookup’s paid users. Contact us to try TI Lookup for your SOC team.

Threat Actors Activity Overview 01 

This report analyzes campaigns linked to APT37, EncryptHub, and STORM-1865, combining info from public research and ANY.RUN’s own findings. It includes: 

  • IOC lists and observed TTPs 
  • Related malware samples 
  • TI Lookup queries and YARA rules 
  • Guidance for detecting similar threats in your environment 

This overview shows how threat actor activity is identified, analyzed, and traced using ANY.RUN’s tools. 


Enrich your threat knowledge with TI Lookup

Learn to Track Emerging Cyber Threats

Check out expert guide to collecting intelligence on emerging threats with TI Lookup



Threat Actors Activity Overview 02 

This report focuses on recent campaigns associated with PATCHWORK and APT29. It provides: 

  • YARA rules and TI Lookup queries to support detection 
  • IOC collections and sample analysis 
  • Adversary profiles and campaign behavior 
  • Technical breakdowns of malicious files 

The report is built to support threat hunters and analysts in tracking high-impact adversaries with greater precision. 

About ANY.RUN

ANY.RUN supports over 15,000 organizations across industries such as banking, manufacturing, telecommunications, healthcare, retail, and technology, helping them build stronger and more resilient cybersecurity operations.

With our cloud-based Interactive Sandbox, security teams can safely analyze and understand threats targeting Windows, Linux, and Android environments in less than 40 seconds and without the need for complex on-premise systems. Combined with TI LookupYARA Search, and Feeds, we equip businesses to speed up investigations, reduce security risks, and improve team’s efficiency.

The post Release Notes: SDK Integration, Notifications, 1000+ Detection Rules, and APT Reports  appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

RansomHub Went Dark April 1; Affiliates Fled to Qilin, DragonForce Claimed Control

Cybersecurity researchers have revealed that RansomHub’s online infrastructure has “inexplicably” gone offline as of April 1, 2025, prompting concerns among affiliates of the ransomware-as-a-service (RaaS) operation.
Singaporean cybersecurity company Group-IB said that this may have caused affiliates to migrate to Qilin, given that “disclosures on its DLS [data leak site] have doubled since

The Hacker News – ​Read More

Customer Account Takeovers: The Multi-Billion Dollar Problem You Don’t Know About

Everyone has cybersecurity stories involving family members. Here’s a relatively common one. The conversation usually goes something like this: 
“The strangest thing happened to my streaming account. I got locked out of my account, so I had to change my password. When I logged back in, all my shows were gone. Everything was in Spanish and there were all these Spanish shows I’ve never seen

The Hacker News – ​Read More

Meta Releases Llama AI Open Source Protection Tools

Meta has released new Llama protection tools to help the open source AI community build more secure applications.

The post Meta Releases Llama AI Open Source Protection Tools appeared first on SecurityWeek.

SecurityWeek – ​Read More

France Blames Russia for Cyberattacks on Dozen Entities

France says the Russian state-sponsored group APT28 is responsible for targeting or compromising a dozen French entities.

The post France Blames Russia for Cyberattacks on Dozen Entities appeared first on SecurityWeek.

SecurityWeek – ​Read More

AirPlay Vulnerabilities Expose Apple Devices to Zero-Click Takeover

Vulnerabilities in Apple’s AirPlay protocol could have allowed attackers to execute code remotely without user interaction.

The post AirPlay Vulnerabilities Expose Apple Devices to Zero-Click Takeover appeared first on SecurityWeek.

SecurityWeek – ​Read More

Link11 brings three brands together on one platform with new branding

Frankfurt am Main, Germany, 30th April 2025, CyberNewsWire

Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto – ​Read More

Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code

Meta on Tuesday announced LlamaFirewall, an open-source framework designed to secure artificial intelligence (AI) systems against emerging cyber risks such as prompt injection, jailbreaks, and insecure code, among others.
The framework, the company said, incorporates three guardrails, including PromptGuard 2, Agent Alignment Checks, and CodeShield.
PromptGuard 2 is designed to detect direct

The Hacker News – ​Read More

Chrome 136, Firefox 138 Patch High-Severity Vulnerabilities

Chrome 136 and Firefox 138 were released in the stable channel with patches for multiple high-severity vulnerabilities.

The post Chrome 136, Firefox 138 Patch High-Severity Vulnerabilities appeared first on SecurityWeek.

SecurityWeek – ​Read More

This month in security with Tony Anscombe – April 2025 edition

From the near-demise of MITRE’s CVE program to a report showing that AI outperforms elite red teamers in spearphishing, April 2025 was another whirlwind month in cybersecurity

WeLiveSecurity – ​Read More