You may finally be able to fix your embarrassing Gmail address – here’s how

Official documents indicate a long-awaited change might be coming.

Latest news – ​Read More

Release Notes: AI Sigma Rules, Live Threat Landscape & 1,700+ New Detections

ANY.RUN is wrapping up 2025 with updates that take pressure off your SOC and help your team work faster. You can now get AI‑generated Sigma rules, track threats by industry and region, and detect new campaigns with better speed and accuracy.  

Let’s see what these improvements bring to your security stack. 

Product Updates 

Industry & Geo Threat Landscape in TI Lookup 

Industry & geo threat landscape data for the Tycoon2FA phishkit

TI Lookup now gives every indicator extra context showing which industries and countries are linked to the threat of your industry and where similar activity is trending. It’s an easy way to see whether a threat actually affects your business or if it’s just background noise.

Built on live data from more than 15,000 organizations, this update helps your team tighten detection focus and reduce blind spots: 

  • See what matters first: Identify threats targeting your market or region so you can prioritize high‑risk activity. 
  • Triage faster: Skip irrelevant alerts and go straight to the ones that match your exposure. 
  • Work with better insight: Use targeted intelligence to guide hunts, automate enrichment, and improve MTTD. 

With TI Lookup, you spot threats earlier, respond faster, and keep your attention where it counts. 

The threat landscape changes fast
Now your SOC can move with it



Try TI Lookup


AI Sigma Rules in ANY.RUN Sandbox 

AI Sigma Rules displayed inside ANY.RUN sandbox

The new AI Sigma Rules feature in the Interactive Sandbox turns your confirmed detections into ready‑to‑use Sigma rules automatically. Instead of spending hours writing them by hand, you can now take the rule straight from the sandbox and add it to your SIEM or SOAR in seconds. 

The rules are created from the same processes, files, and network events you see in the sandbox, so they stay closely tied to real attacker behavior. That means better accuracy and quicker response without extra effort. 

Here’s what you gain: 

  • Less manual work: Every confirmed threat instantly becomes a reusable detection rule. 
  • Better coverage: Each investigation now improves how your SOC spots similar attacks later. 
  • Faster action: Analysts spend less time writing rules and more time acting on real signals. 

Cut MTTR by 21 min and reduce MTTD to 15 sec
Request trial of ANY.RUN’s Enterprise plan



Contact us


Threat Coverage Updates 

In December, our detection team rolled out another wave of coverage improvements with: 

  • 86 new behavior signatures 
  • 13 new YARA rules 
  • 1,686 new Suricata rules 

These updates enhance phishing detection, expand coverage of stealers, loaders, and RATs, and clean up false positives across multi‑stage attacks. 

New Behavior Signatures 

SHINYSPIDER malware detonated inside ANY.RUN’s Interactive Sandbox 

Fresh signatures add visibility into persistence, lateral movement, and abuse of system tools seen across mixed environments. 

Highlighted families include: 

These detections help analysts catch miner and loader activity earlier and recognize evasion tricks like rundll32 abuse or PowerShell obfuscation.

New YARA Rules 

OCTORAT process identified by ANY.RUN’s Interactive Sandbox 

We added 13 YARA rules to improve detection across new malware strains and living‑off‑the‑land tools. 

Highlighted families are STEAL1, SANTASTEALER, UNIXSTEALER, OCTORAT, DonutLoader.

These cover credential theft, modular loaders, and dual‑use administrative tools to ensure better coverage for both Windows and Linux‑based systems. 

New Suricata Rules 

We’ve added 1,686 Suricata rules targeting phishing, botnet activity, and evasive network behaviors often missed by standard IDS. 

Together, these bring better coverage of C2 traffic, phishing domains, and low‑signal campaign infrastructure. 

Businesses that are constantly being bombarded by hundreds of hacker attacks daily can upgrade their proactive defense with ANY.RUN’s Threat Intelligence Feeds

Expand threat coverage and cut MTTR with ANY.RUN’s TI Feeds 

Powered by sandbox analyses of the latest malware & phishing samples across 15K SOCs, they deliver fresh, real-time malicious network IOCs to numerous companies around the globe. Enriched with detailed sandbox reports, TI Feeds not only help you catch emerging threats early but also provide your analysts with actionable intelligence for fast remediation, boosting your detection rate and driving down the MTTR. 

Keep your defense up-to-date with TI Feeds
Get 99% unique IOCs from live attacks on 15K SOCs



Try TI Feeds


Threat Intelligence Reports 

In December we published new TI Reports summarizing late‑year activity: 

Each brief distills TTPs, campaigns, and IOCs from live submissions to help SOC teams anticipate what’s next. 

About ANY.RUN 

ANY.RUN powers SOCs at more than 15,000 organizations, giving them faster visibility into live threats through interactive sandboxing and cloud‑based intelligence. 

Our Interactive Sandbox lets you analyze Windows, Linux, and Android samples in real time, watch the execution flow second‑by‑second, and pull IOCs instantly, no installs, no waiting. Combined with Threat Intelligence Lookup and Threat Intelligence Feeds, you get a single workflow built to speed up investigation, cut MTTD and MTTR, and keep your SOC focused on the right threats. 

Start 2026 with faster detection, better threat intel, and less noise.  

Request trial of ANY.RUN’s products for your SOC. 

The post Release Notes: AI Sigma Rules, Live Threat Landscape & 1,700+ New Detections appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

Infostealer Malware Delivered in EmEditor Supply Chain Attack

The ‘download’ button on the official EmEditor website served a malicious installer.

The post Infostealer Malware Delivered in EmEditor Supply Chain Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

22 Million Affected by Aflac Data Breach

Hackers stole names, addresses, Social Security numbers, ID numbers, and medical and health insurance information from Aflac’s systems.

The post 22 Million Affected by Aflac Data Breach appeared first on SecurityWeek.

SecurityWeek – ​Read More

The Worst Hacks of 2025

From university breaches to cyberattacks that shut down whole supply chains, these were the worst cybersecurity incidents of the year.

Security Latest – ​Read More

The Most Dangerous People on the Internet in 2025

From Donald Trump to DOGE to Chinese hackers, this year the internet’s chaos caused outsized real-world harm.

Security Latest – ​Read More

The New Surveillance State Is You

Privacy may be dead, but civilians are turning conventional wisdom on its head by surveilling the cops as much as the cops surveil them.

Security Latest – ​Read More

Fresh MongoDB Vulnerability Exploited in Attacks

Dubbed MongoBleed, the high-severity flaw allows unauthenticated, remote attackers to leak sensitive information from MongoDB servers.

The post Fresh MongoDB Vulnerability Exploited in Attacks appeared first on SecurityWeek.

SecurityWeek – ​Read More

You’ve been targeted by government spyware. Now what?

Tech companies are increasingly warning their customers that they have been targeted by governments with advanced government spyware, such as NSO’s Pegasus or Paragon’s Graphite. What happens after receiving a threat notification?

Security News | TechCrunch – ​Read More

Malware Trends Q4 2025: Inside ANY.RUN’s Latest Threat Landscape Report 

We’re glad to present our regular quarterly report highlighting the most prominent malicious trends of the last three months of 2025, as observed by ANY.RUN’s community. 

Following the release of our annual report on key threats and milestones, this report offers a closer look at the threat landscape of the final chapter of 2025. 

The Malware Trends report Q4 features top malware types, families, phishing kits, TTPs, APTs, and other notable insights. 

You can turn to the previous Q3 report for reference. 

Key Takeaways 

  • Threat activity remained steady, with sandbox usage up 6% quarter over quarter and over 1 billion IOCs collected, reflecting sustained investigative demand rather than volume spikes. 
  • Stealers still dominate, even after a 16% decline, confirming credential theft as a primary attacker objective. 
  • RATs and backdoors gained momentum, with RATs up 28% and backdoors up 68%, signaling a shift toward persistent access and modular malware. 
  • XWorm and open-source RATs surged, with XWorm up 174%, showing attackers favor adaptable, widely shared toolsets over saturated stealer families. 
  • Phishing continued to evolve, led by Tycoon and EvilProxy, underscoring the growing sophistication of PhaaS and 2FA bypass campaigns. 

Summary 

Sandbox activity summary
  • Total sandbox sessions: 2,015,181  
  • Malicious: 389,636  
  • Suspicious: 75,113  
  • IOCs: 1,015,431,934  

During the last quarter of 2025, overall threat investigation activity remained stable — no drastic growth in volume. The total number of sandbox analyses conducted in ANY.RUN’s Interactive Sandboxincreased slightly by 6%, surpassing 2 million since Q3. 

Over one billion indicators were gathered by our community during analysis sessions. A total of 389,636 samples were labeled as malicious, and 75,113 as suspicious. 

Top Malware Types: Highlights 

Top malware types Q4 2025
  1. Stealer: 36,685  
  1. RAT: 23,788 
  1. Loader: 19,070  
  1. Backdoor: 10,560  
  1. Ransomware: 7,317  
  1. Adware: 5,854  
  1. Botnet: 5,149 
  1. Trojan: 2,813  
  1. Miner: 2,668  
  1. Keylogger: 2,598 

Although the list of top malware types looks similar to Q3 at first glance, several notable changes in activity levels should be pointed out: 

  • Stealer dominance persists despite a 16% drop. This signals that credential theft remains a priority for attackers targeting financial sectors. 

Widespread families: Lumma,  StealcBlank Grabber 

  • RAT surged (+28%), overtaking Loaders’ second place. A clear indication of remote access tools gaining traction for persistent post-exploitation in enterprise environments. 

Widespread families: XWormQuasar RATAsyncRAT 

  • Loader threats moved one place down despite a slight decrease in detections. 

Widespread families: Smoke LoaderPureCrypterHijackLoader 

Backdoor‘s 68% activity growth reflects modular malware kits proliferating, enabling easier customization and evasion of traditional defenses. 

Adware moved up two places with a 31% rise in activity, while ransomware detections decreased by the same percentage. 

At the lower end of the list there are Botnet with 5K detections, Trojan with 2.8K, Miner with 2.6K, and Keylogger with 2.5K. 

Detect evasive threats with ANY.RUN’s Interactive Sandbox   

Multi-stage attack detonated inside ANY.RUN sandbox 

ANY.RUN’s Interactive Sandbox enables businesses and SOC teams to proactively identify cyber threats by analyzing files and URLs inside interactive Windows, Linux, Android VMs.  

  • Stronger Protection for Businesses: Early detection and shorter MTTD minimize risks, safeguarding infrastructure and reputation. 
  • Higher Efficiency & ROI: Faster investigations cut costs, reduce analyst load, and power quicker incident resolution. 
  • Smarter Decision-Making: Flexible, enterprise-grade solution enhances visibility into threats, allowing for insight-driven action. 

Achieve tangible results
with interactive analysis by ANY.RUN



Start trial


Top Malware Families 

Top malware families Q4 2025
  1. XWorm: 13,945  
  1. AsyncRAT: 5,056  
  1. Quasar: 4,711  
  1. Vidar: 4,498  
  1. Stealc: 4,432 
  1. Remcos: 3,598  
  1. Lumma: 3,399  
  1. Blackmoon: 3,208 
  1. AgentTesla: 3,136  
  1. Mirai: 3,067 

This section indicates a number of drastic changes in intensity and volume of certain threats. Key observations include: 

XWorm, driven by its adaptability across industries like manufacturing and healthcare, showed a +174% surge. 

XWorm IOCs from Threat Intelligence Lookup 

  • centre-instruction[.]gl[.]at[.]ply[.]gg 
  • uk-compete[.]gl[.]at[.]ply[.]gg 
  • 176[.]113[.]73[.]167 

Find more IOCs in TI Lookup with this query: 

threatName:”xworm” AND domainName:”” 

  • AsyncRAT and Quasar grew by 46% and 27%, showing open-source RATs outpacing commercial stealers, fueled by underground sharing and rapid evolution. 

AsyncRAT IOCs from Threat Intelligence Lookup  

  • xoilac[.]livecdnem[.]com 
  • asj299[.]com 
  • 94[.]154[.]35[.]160 

Find more IOCs in TI Lookup with this query: 

threatName:”asyncrat” AND domainName:”” 

Lumma’s fall from first to eighth place with a -65% plunge highlights attacker shifts to newer, less-detected families, reducing reliance on saturated stealer platforms. 

Lumma IOCs from Threat Intelligence Lookup  

  • handpaw[.]click 
  • mattykp[.]click  
  • 159[.]198[.]70[.]75 

Find more IOCs in TI Lookup with this query: 

threatName:”lumma” AND domainName:”” 

Vidar and Stealc with 4K+ detections each re-emerged in Q4, indicating a sudden end-of-year growth. 

Another addition to the chart is Blackmoon with 3,208 detections. At the same time, AgentTesla and Remcos threats saw a reduction in detections and went from second and fourth places to tenth andseventh respectively. 

Ensure early threat detection via Threat Intelligence Feeds 

TI Feeds provides fresh data from 15k organizations 

Gain a live view of the threat landscape with fresh, actionable IOCs delivered to you from investigations done across 15,000 companies. 

  • Refine detection and response: Rich threat context and integration opportunities power your SOC for proactive defense. 
  • Mitigate risks of breaches: Expanded threat coverage and visibility into threats help stay ahead of attackers without wasting time on false alarms. 
  • Improve performance rates: Unique, noise-free indicators beat alert fatigue and promote early detection even for hidden and evasive threats. 

99% unique threat intel for your SOC



Integrate TI Feeds


Top TTPs 

Top MITRE ATT&CK TTPs Q4 2025

The top 10 most detected techniques, tactics, and procedures (TTPs) show significant shifts from quarter to quarter — a reminder that threat actors never stop refining and changing their methods. 

The number of detections for TTPs mostly grew: the first place is taken up by Subvert Trust Controls: Install Root Certificate, T1553.004 with 227,451 detections. In Q3, the first place was taken by a TTP with activity rate twice as small. 

Second place was still occupied by Masquerading: Rename Legitimate Utilities, T1036.003 with 105,539 detections (+9%). 

A new addition to the list, Command and Scripting Interpreter: Windows Command Shell , T1059.003, came third with 71,608 detections. 

1. Subvert Trust Controls: Install Root Certificate, T1553.004: 227,451 

2. Masquerading: Rename Legitimate Utilities, T1036.003: 105,539 

3. Command and Scripting Interpreter: Windows Command Shell, T1059.003: 71,608 

4. Command and Scripting Interpreter: PowerShell, T1059.001: 64,684 

5. Virtualization/Sandbox Evasion: Time Based Checks, T1497.003: 51,910 

6. Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, T1547.001: 46,007 

7. System Services: Service Execution, T1569.002: 38,515 

8. Masquerading: Match Legitimate Resource Name or Location, T1036.005: 35,278 

9. Scheduled Task/Job: Scheduled Task, T1053.005: 21,460 

10. Signed Binary Proxy Execution: Rundll32, T1218.011: 19,236 

Collect Fresh Threat Intelligence with Threat Intelligence Lookup 

TI Lookup sharing info on threats submitted in Germany and relevant for finance companies  

TI Lookup offers a searchable database of fresh Indicators 
of Compromise (IOCs), Attack (IOAs), and Behavior (IOBs) belonging to the latest cyber attacks on 15,000 companies. 

  • Build proactive defense: Actionable threat intelligence drives targeted and insightful research for staying ahead. 
  • Ensure rapid triage and response: Instant enrichment of indicators with behavioral context makes for fast and smart decisions. 
  • Optimize workload: Rich threat data empowers Tier 1 analysts to work sustainably, reducing escalations to Tier 2. 

Instant access to fresh threat data
Streamline threat hunting with TI Lookup



Get started


Phishing Activity in Q4 2025 

Phishing activity Q4 2025

Overall phishing activity by uploads159,592 

Activity by phishing kits  

Phishkits: 

  1. Tycoon41,046  
  1. EvilProxy14,258  
  1. Sneaky2FA7,272 
  1. Mamba2FA3,904  
  1. Salty2FA350  

Q4’s results align with our annual report’s conclusions: phishing is a prevalent type of cyber threat and Tycoon dominates in this category: 

  • It remained at the top of the list with double the intensity of detections. Same with EvilProxy: it stayed second with 51% increase in volume. This underscores PhaaS maturation, with kits now bundling advanced 2FA bypass for high-value targets. 
  • Sneaky2FA moved from fourth to third place with a whopping +138% rise in activity. 
  • Salty2FA moved two places down, pointing to 2FA fatigue exploitation accelerating in enterprise phishing campaigns. 
  • Mamba2FA, absent from the list in the previous quarter, took fourth place with 3.9K detections. 

Activity by cyber criminal groups 

  1. Storm1747: 37,274  
  1. TA569: 4,054 
  1. TA558: 231 
  1. Storm1575: 21 
  1. APT36: 18 

Key observations regarding APT activity in Q4 2025: 

  • Storm1747’s dominance continued with a 51% rise in activity, likely tied to phishing infrastructure evolution targeting finance across EU/NA regions. 
  • TA558‘s jumped into top ranks with +83% detections, suggesting expanded operations, possibly leveraging modular loaders for broader campaign reach. 
  • At the lower part of the list, we can see APTs’ displaying sharp 70-97% declines, likely due to the detection improvements or operational pauses. The focus shifted to more opportunistic actors. 

Top Protectors and Packers 

Top protectors and packers Q4 2025
  1. UPX: 12,576  
  1. NetReactor: 4,300  
  1. Themida: 3,244  
  1. ASPack: 1,263  
  1. Confuser: 2,204  

Top 5 most detected protectors and packers correspond with those of Q3. However, there are differences in terms of their intensity: 

  • UPX remains dominant despite an 11% drop, remaining attackers’ go-to for simple, fast obfuscation across commodity malware. 
  • NetReactor and Themida’s sharp declines (-49% and -37% respectively) signal detection improvements and attacker shift to newer .NET-focused protectors.  
  • Confuser kept its fifth place with a 48% growth that reflects .NET malware boom. Attackers favor it for evading static analysis in enterprise-targeted payloads. 

Conclusion 

Q4 2025 shows a stable but evolving threat landscape. Key trends include persistent stealer activity, rising RATs and backdoors, and a dynamic phishing landscape. These insights underscore the importance of continuous monitoring and proactive threat analysis to stay ahead of emerging risks. 

About ANY.RUN 

ANY.RUN develops solutions for malware analysis and threat hunting. Its interactive malware analysis sandbox is used by over 500,000 cybersecurity professionals worldwide. It enables detailed investigation of threats targeting Windows, Android, and Linux systems with hands-on analysis and instant visualization of malware behavior. 

ANY.RUN’s threat intelligence solutions, including Threat Intelligence Lookup and Threat Intelligence Feeds, allow teams to quickly identify indicators of compromise, enrich alerts, and investigate incidents early on. As a result, analysts gain actionable insights, uncover hidden threats, and improve overall cybersecurity posture. 

Start a 2-week ANY.RUN trial → 

The post Malware Trends Q4 2025: Inside ANY.RUN’s Latest Threat Landscape Report  appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More