It is with great pleasure and gratitude that we announce our victory at the Cybersecurity Excellence Awards 2025, an annual competition for individuals and companies that stand out in the field of information security held by a major online community Cybersecurity Insiders.
TI Lookup is a contextual search service available online and through API. Its database contains all information on cyberthreats acquired by ANY.RUN. Users can browse it, analyze millions of public interactive analysis sessions, and gain insight on how to ensure a better security strategy for their company.
Homepage of ANY.RUN Threat Intelligence Lookup
Equip your team with the malware analysis tool they need to keep your business secure
Our achievement was made possible thanks to TI Lookup’s unique features. This solution not only helps accelerate and simplify research, as well as gain access to up-to-date information on emerging threats, but also enhances the decision-making process and ensures the security of infrastructures in a resource-saving way.
In the words of organizers
Holger Schulze, founder of Cybersecurity Insiders and organizer of the Cybersecurity Excellence Awards, noted ANY.RUN’s efforts in inspiring the community and providing top-tier solutions:
“We congratulate ANY.RUN on this outstanding achievement in the ‘Threat Intelligence’ category of the 2025 Cybersecurity Excellence Awards. As we celebrate 10 years of recognizing excellence in cybersecurity, your innovation, commitment, and leadership set a powerful example for the entire industry.”
Our win is your win
We’re happy to share the news with our wonderful audience and thank you for your never-ending support! The victory wouldn’t be possible without our partners, users of ANY.RUN products, and the cybersecurity community in general.
We’ll continue to work towards our common goal of establishing a safe and efficient platform to benefit malware analysts from around the globe.
About ANY.RUN
ANY.RUN provides cutting-edge malware analysis services for security teams: ANY.RUN sandbox, TI Lookup and TI Feeds. They help speed up the workflow of SOC specialists, prevent financial and reputational damage of businesses, as well as allow analysts to act proactively in order to ensure the security of their networks.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-20 09:06:522025-03-20 09:06:52ANY.RUN Wins in the Best Threat Intelligence Service Category at Cybersecurity Excellence Awards 2025
Malware analysis is a promising yet competitive career path, where education must be taken seriously to stand up against ever-evolving threats. The demand for such professionals has never been higher, but the requirements and expectations are not low either.
A specific mindset and a number of well-developed soft skills are no less vital than a set of technical skills directly related to performing the job. Nurturing this mindset, as well as developing the skills, is a challenge not only for future professionals, but for educational institutions that offer cybersecurity programs.
1. Technical Skills
Here go hands-on abilities critical for understanding and countering malware, acquaintance with research methods and tools.
Static And Dynamic Malware Analysis.
Static analysis is examining malware without executing it—disassembling code, inspecting binaries, and identifying suspicious strings or functions. Dynamic analysis includes running malware in a controlled environment to observe its runtime behavior, such as network traffic or system changes.
Networking and Protocol Analysis.
Malware often communicates with C2 servers or propagates through networks. Recognizing abnormal network traffic is crucial.
Programming Proficiency.
Writing scripts or tools in languages like Python or C to automate analysis, unpack malware, or simulate its effects will be a part of work routine. This amplifies efficiency and enables custom solutions for unique threats. The skill is gained through coding practice, creating YARA rules, and engaging with cybersecurity coding projects.
One great source of technical skills are quality learning programs and courses from validated experts — like ANY.RUN’s Security Training Lab. Based on nine-year experience in threat hunting and analysis, the program contains 30 hours of academic content, educational videos, interactive tests and practical tasks. It is designed with both students and universities demands in mind.
Give students job-ready skills without designing a course. Learn more about Security Training Lab Get a quote for your university
These skills form a mental framework optimal for dealing with complex threats.
Pattern Recognition.
Identifying similarities between malware samples aids in detecting new variants and understanding campaigns. It is cultivated by reviewing diverse samples and indicators, studying threat intelligence reports, and building mental or written databases of common tactics.
Root Cause Analysis and Logical Deduction.
An analyst must be able to find the underlying issue behind an incident to prevent recurrence and refine defensive measures. For this, endpoint forensics, registry analysis, and analyzing system logs are of great help. Deduction is applied to infer malware functionality from incomplete or obscured data (e.g., encrypted payloads) and assume effective countermeasures.
Hypothesis Testing.
Formulating and testing assumptions helps understand malware behavior and intent. One can learn it by practicing in controlled environments, experimenting with malware configurations.
3. Communication and Reporting Skills
Analysis is useless if it can’t be shared effectively with teams and stakeholders.
Technical Writing.
Clear, concise reports (e.g., detailing a malware’s TTPs—tactics, techniques, procedures) and executive summaries bring actionable insights for security professionals or executives, are crucial for team coordination and legal use.
Collaboration and Information Sharing.
Participating in cybersecurity communities, contributing to threat intelligence platforms help enhance the collective understanding of threats and fuel professional growth of each member.
Verbal Explanation and visualization.
Very much in demand is the capability to translate complex findings into terms for non-experts, to bridge the gap between analysts and decision-makers. An expert should be ready to speak at professional events and be coherent at meetings of any audience and level. Non the less important is competence is fluency in visualizing information, creating diagrams, attack trees, or timelines of malware behavior.
It is important to make professional communication your joy and habit since your early days in the industry. ANY.RUN’s Security Training Lab, for instance, supports a private discord community for students with tips, lifehacks, and the latest news in cybersecurity, fostering collaboration and knowledge sharing.
Security Training Lab
Discover ANY.RUN’s educational program for universities:
30 Hours of Academic Content
Access to ANY.RUN Sandbox
Practical Learning
Contact us
4. Adaptability and Creativity
Malware is evolving, so analysts must too, often thinking outside conventional approaches.
Learning Agility.
Quickly grasping new tools, techniques, or malware trends keeps analysts relevant as threats shift and is vital for staying proactive. New career opportunities are always round the corner for those ready to take online courses, read research papers, attend webinars, explore industry news, and experiment with emerging tech.
Out-of-the-Box Thinking.
Crafting novel ways to unpack obfuscated code or bypass anti-analysis tricks allows to outsmart malware authors. Problem-solving is fostered by brainstorming alternative approaches, collaborating with peers, and studying unconventional attack methods.
Resilience and Flexibility.
Adaptability helps survive and progress when malware refuses to behave predictably, resists analysis, and high-end tools fail.
5. Experience
Practical exposure builds the intuition and context that technical skills alone can’t provide.
Familiarity with Malware Families.
Real-world experience with topical malware is key to identifying common traits and recognizing advanced techniques.
Incident Response and Threat Hunting.
Hands-on experience with real malware outbreaks sharpens decision-making under stress and reveals real-world impact. Experience in live environments develops a proactive approach to identifying and mitigating threats, bridges theory and practice.
Tool Mastery.
Proficiency with services and instruments is what delimits pro from a wannabe. The skill is built by consistent use in labs, following tutorials, and experimenting with new features or plugins.
Experience is gained through practice only, so practice must be an integral element of education. Our Security Training Lab program introduces students to a range of tools for malware, script, and document analysis, including full access to ANY.RUN’s Interactive Sandbox.
The Program’s structure and contents with one of the modules expanded
Why universities choose ANY.RUN’s Security Training Lab
The program provides educational institutions with the content, tools, and resources they need to train students on actual threats, ensuring they graduate with the skills and knowledge to be effective cybersecurity professionals. It is designed to:
Close the skills gap — equip students with hands-on experience that employers demand.
Expand curriculum — Add real-world malware investigations to theory-based lectures.
Ensure expert support — Customers get assistance from our malware analyst team.
Help with efficient course management — Monitor student progress and performance.
Conclusion
A good malware analyst blends these skills seamlessly. Technical prowess without analytical thinking is like having tools but no plan — ineffective against clever malware. Experience sharpens both, while adaptability keeps them current. Communication ties it all together, ensuring the analyst’s work drives real outcomes, not just personal insight. Each skill is achievable with deliberate effort, practice, and a mindset that thrives on challenge — qualities any aspiring analyst can cultivate over time.
Educational solutions like ANY.RUN’s Security Training Lab empower universities to deliver a modern curriculum that meets industry standards without recruiting specialized faculty, to make their cybersecurity program engaging and relevant, and to prepare students to handle actual threats.
ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search, and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-19 14:06:462025-03-19 14:06:46Decoding a Malware Analyst: Essential Skills and Expertise
At the end of 2024, our experts discovered a new stealer called Arcane, which collects a wide range of data from infected devices. Now cybercriminals have taken it a step further by releasing ArcanaLoader — a downloader that claims to install cheats, cracks, and other “useful” gaming tools, but which actually infects devices with the Arcane stealer. Despite their lack of creativity in naming the loader, their distribution scheme is actually quite original.
The malicious campaign distributing the Arcane stealer was active even before the malware itself appeared. In other words, cybercriminals were already spreading other malware, eventually replacing it with Arcane.
Here’s how it worked. First, links to password-protected archives containing malware were placed under YouTube videos advertising game cheats. These archives always included a seemingly harmless BATCH file named start.bat. This file’s purpose was to launch PowerShell to download another password-protected archive containing two executable files: a miner and the VGS stealer. The VGS stealer was later replaced with Arcane. At first, the new stealer was distributed in the same way: YouTube video, first malicious archive, then second one, and bingo: Trojan on the victim’s device.
A few months later, the criminals upgraded their approach. Under the YouTube video they started linking to ArcanaLoader — a downloader with a graphical interface, supposedly needed to install cheats, cracks, and similar software. In reality, ArcanaLoader infected devices with the Arcane stealer.
Inside the client — various cheat options for Minecraft
The operation didn’t end with ArcanaLoader. The attackers also set up a dedicated Discord server to embellish their scheme. Among other things, this server is used to recruit YouTubers willing to post links to ArcanaLoader in their video descriptions. The requirements for recruitment are minimal: at least 600 subscribers, over 1500 views, and at least two uploaded videos with links to the downloader. In exchange, participants are promised a new role on the server, the ability to post videos in the chat, instant addition of requested cheats to the downloader, and potential income for generating high traffic. Whether any of these unwitting malware distributors actually received payments is unknown.
The ArcanaLoader Discord server has over 3000 members
All communication on the ArcanaLoader Discord server is in Russian, and our telemetry shows the highest number of victims are in Russia, Belarus, and Kazakhstan. We can conclude from this that Arcane primarily targets Russian-speaking gamers.
How dangerous is the Arcane stealer?
A stealer is a type of malware that steals login credentials and other sensitive information, sending them to attackers. This information helps cybercriminals gain access to accounts in games, social networks, and more. Regarding Arcane, its capabilities are constantly evolving, with cybercriminals actively updating the stealer’s code. At the time of publication of this post, Arcane could steal the “golden classics”: usernames, passwords, and payment card details. The main sources of information for the stealer are browsers based on Chromium and Gecko engines, which is why we recommend against storing such confidential information in browsers. It’s better to use a trusted password manager.
The stealer has another method for extracting cookies from Chromium-based browsers, and stolen cookies can be used for various malicious purposes, including hijacking a YouTube channel. For how exactly this works, read the Securelist study.
In addition to browser data, Arcane steals configuration files, settings, and account information from the following applications:
An impressive list, right? Arcane also steals various system information. The stealer tells attackers what version of the OS is installed, when it was installed, the Windows activation key, details of the infected system’s hardware, screenshots, running processes, and saved Wi-Fi passwords.
How to protect yourself from Arcane
The attackers started by simply placing links to malicious archives under YouTube videos, and later set up their own Discord server and created a downloader with a graphical interface. Of course, all of this was done to give the scam false credibility, luring in potential victims. From this campaign, we can see that cybercriminal groups today are highly adaptable, quickly shifting their distribution strategies and methods.
Subscribe to our blog and follow our Kaspersky Telegram channel to stay informed on the latest cybersecurity threats. Also, be sure to share this post with anyone who frequently plays games but may not be aware of the dangers.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-19 11:06:422025-03-19 11:06:42New Arcane stealer spreads disguised as Minecraft cheats | Kaspersky official blog
It’s here! The news security teams have been waiting for: ANY.RUN now fully supports Android OS in its interactive sandbox!
Now, you can investigate Android malware in a real ARM-based sandbox, exactly as it would behave on an actual mobile device. No more blind spots or unreliable analysis.
With this release, ANY.RUN allows SOC teams, incident responders, and threat hunters to analyze Android threats faster, more efficiently, and with greater accuracy while reducing operational costs.
And the best part? Android OS support is available to everyone, including Free plan users!
Why Your Team Needs Mobile Threat Analysis Inside ANY.RUN’s Android Sandbox
Android malware is a direct risk to businesses, financial institutions, and enterprise security teams. Attackers are targeting mobile devices to steal credentials, infiltrate corporate networks, and compromise financial systems.
Without real-time mobile threat analysis, businesses face delayed detection, higher security costs, and increased exposure to cyber threats.
Now you can interact with APK files in a fully controlled environment, track malicious activity in real time, and generate in-depth reports: all in one convenient place.
Spot Android malware in seconds: Run suspicious APKs in a real Android environment and catch threats before they spread.
See exactly what malware is doing: Watch how it abuses permissions, steals data, or makes shady network connections, no more guesswork.
Make Android threat investigations easier: Quickly analyze mobile malware without slowing down your team or piling on extra work.
Take full control of your data: Analyze Android threats in a private, secure environment where only your team has access, no third parties involved.
Improve collaboration: Generate structured reports with detailed APK insights, making escalation and knowledge sharing between your team more effective.
How to Get Started with ANY.RUN’s Android Sandbox
Getting started is quick and easy.
Since ANY.RUN is fully cloud-based, there’s no need to download or install complicated software. Just sign up and follow these simple steps to start analyzing right away:
Select Android OS – Before launching an analysis, choose Android from the operating system menu.
Upload the APK file – Drag and drop the file into the sandbox.
Start the investigation – Run the file and observe its behavior in real time.
Give your security team the speed to analyze APK files and detect threats instantly with ANY.RUN Interactive Sandbox
See It in Action: Analyzing Mobile Malware Inside ANY.RUN’s Android Sandbox
Let’s look at real-world malware cases to see how ANY.RUN’s interactive sandbox makes Android threat analysis easier and more effective.
One notorious Android malware family is Coper, a banking trojan that targets financial apps, steals user credentials, and intercepts SMS messages. Attackers use it to bypass two-factor authentication (2FA) and take full control of compromised devices.
With ANY.RUN’s Android OS sandbox, we can break down exactly how this malware behaves in real time.
The first thing you’ll notice after running an analysis is that ANY.RUN immediately flags suspicious activity. In this case, we see a red alert in the top right corner, signaling that the APK file is performing dangerous actions.
Fast detection of malicious activities
Since the sandbox is fully interactive, we can engage with the app just like on a real Android device. This means:
Opening the malware-infected app and seeing how it behaves Granting or denying permissions to observe how it reacts Triggering functions like keylogging to uncover hidden actions
Digging into the Tree of Processes
To understand how Coper operates under the hood, we check the Process Tree section, which provides a structured breakdown of all executed processes.
Here, you can:
See which processes are spawned by the malware
Identify connections to suspicious services or commands
Detect any attempts to gain persistence or execute additional payloads
The Process Tree is located in the right part of the analysis screen, giving a clear and organized view of how the APK interacts with the system.
Instead of manually tracking logs, security teams get a clear breakdown of malicious actions in a simple, visual format.
Malicious process carried out by Coper inside ANY.RUN sandbox
Understanding the Attack Tactics with MITRE ATT&CK Mapping
Next, we head to the MITRE ATT&CK Matrix section, which helps map out exactly what techniques and tactics Coper is using.
Inside ANY.RUN, this can be found under the MITRE ATT&CK tab, where you get a structured breakdown of:
The specific attack techniques used (e.g., credential theft, keylogging, SMS interception)
The broader tactics the malware follows (e.g., persistence, privilege escalation)
Links to detailed explanations for deeper research
MITRE ATT&CK techniques and tactics used by Coper
By clicking on any technique, you get a detailed description of how the attack works, making it easier to correlate threats and improve security defenses.
Technique details inside Android sandbox
Collecting IOCs for Threat Intelligence
Once the analysis is complete, ANY.RUN generates structured, in-depth reports, allowing SOC teams to get:
Malicious URLs and IP addresses
Dropped or modified files
Registry changes and system modifications
These IOCs can be exported and shared for further action, helping organizations update security rules, improve detection, and prevent future infections.
In this analysis of GoldDigger malware, we can see a collection of useful IOCs by clicking the “IOC” button in the top right corner of the screen.
IOCs for further analysis collected inside ANY.RUN’s Android sandbox
Generating a Structured Report for Easy Sharing
Once the analysis is complete, it’s time to generate a detailed report. In ANY.RUN, this can be done in the Reports section, allowing SOC teams to:
Quickly escalate cases with clear, organized evidence. Share findings across teams for improved collaboration. Enhance future detection strategies using real-world behavioral data.
Report generated inside interactive sandbox
Having a clear, documented report helps SOC teams, threat hunters, and incident responders work more efficiently, ensuring that findings are communicated effectively across teams.
Sandbox for Businesses
Discover all features of the Enterprise plan designed for businesses and large security teams.
See details
Turn Your Team’s Hours of Android Malware Investigation into Minutes
ANY.RUN’s Android OS support is a whole new way to investigate mobile threats with speed and precision.
Whether your security team is tackling incident response, malware research, or threat hunting, this release helps businesses detect Android threats easier, cut investigation time, and strengthen security operations.
It’s fast – No waiting for static scans or manual reverse engineering. See how an APK behaves in seconds
It’s interactive – Click, explore, and engage with malware just like you would on a real Android device.
It’s detailed – Track every action with process trees, MITRE ATT&CK mapping, and real-time network insights.
It’s fully cloud-based – Run Android malware investigations anytime, anywhere, without worrying about infrastructure.
It’s built for teams – Generate structured reports, share findings, and collaborate on investigations seamlessly.
ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search, and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.
Attacks on open-source mostly start with publishing new malicious packages in repositories. But the attack that occurred on March 14 is in a different league — attackers compromised the popular GitHub Action tj-actions/changed-files, which is used in more than 23,000 repositories. The incident was assigned CVE-2025-30066. All repositories that used the infected changed-files Action are susceptible to this vulnerability. Although the GitHub administration blocked changed-files Action and then rolled it back to a safe version, everyone who used it should conduct an incident response, and the developer community should draw more general lessons from this incident.
What are GitHub Actions?
GitHub Actions are workflow patterns that simplify software development by automating common DevOps tasks. They can be triggered when certain events (such as commits) occur at GitHub. GitHub has a kind of app-store where developers can take a ready-made workflow process and apply it to their repository. To integrate such a ready-made GitHub process into your CI/CD development pipeline, you only need one line of code.
changed-files compromise incident
On March 14, the popular tj-actions/changed-files GitHub Action — used to get any changed files from a project — was infected with malicious code. The attackers modified the process code and updated the version tags to include a malicious commit in all versions of changed-files GitHub Action. This was done on behalf of the Renovate Bot user, but according to current information the bot itself wasn’t compromised; it was just a disguise for an anonymous commit.
The malicious code in changed-files is disguised as the updateFeatures function, which actually runs a malicious Python script and dumps the Runner Worker process memory, then searches it for data that looks like secrets (AWS, Azure and GCP keys, GitHub PAT and NPM tokens, DB accounts, RSA private keys). If something similar is found, it’s written to the repository logs. Both the malicious code and the stolen secrets are written with simple obfuscation — double base64 encoding. If the logs are publicly available, attackers (and not only the operators of the attack, but anyone!) can freely download and decrypt this data. On March 15, a day after the incident was discovered, GitHub deleted the changed-files process, and the CI/CD processes based on it may have not functioned. After another eight hours, the process repository was restored in a “clean version”, and now changed-files is working again without surprises.
Incident Response
Since logs in public repositories are accessible to outsiders, they’re the most likely to have been affected by the leak. However, in an enterprise environment, relying solely on the assumption that “all our repositories are private” is also not a good idea. Companies often have both public and private repositories, and if their CI/CD pipelines use overlapping secrets, attackers can still use this data to compromise container registries or other resources. Containers or packages built by popular open-source projects can also be compromised in this scenario.
The authors of the ill-fated changed-files recommend analyzing GitHub logs for March 14 and 15. If unusual data is found in the changed-files subsection, it should be decoded to understand what information may have been leaked. Additionally, it’s worth examining GitHub logs for this period for suspicious IP addresses. All changed-files users are advised to replace secrets that could have been used in the build and leaked during this period. First of all, you should pay attention to repositories with public CI logs, and secondly, to private repositories.
In addition to replacing potentially compromised secrets, it’s recommended to download the logs for subsequent analysis, and then clear their public versions.
Lessons from the incident
The complexity and variety of attacks on the supply chain in software development are growing: we’ve already become accustomed to attacks in the form of malicious repositories, infected packages and container images, and we’ve encountered malicious code in test cases — and now in CI/CD processes. Strict information-security hygiene requirements should extend to the entire life-cycle of an IT project.
In addition to the requirement to strictly select the source code base of your project (open source packages, container images, automation tools), a comprehensive container security solution and a secrets management system are necessary. Importantly, the requirements for special handling of secrets apply not only to the project’s source code, but also to the development processes. GitHub has a detailed guide on securely configuring GitHub Actions — the largest section of which is devoted specifically to handling secrets.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-18 10:06:472025-03-18 10:06:47Supply chain attack via GitHub Action | Kaspersky official blog
Since February, many users have been complaining about the Android System SafetyCore app suddenly appearing on their Android phones. It has neither UI nor settings, but Google Play says the developer is Google itself, the number of installations exceeds a billion, and the average rating is a dismal 2.4 stars. The purpose of the app is described vaguely: “It provides the underlying technology for features like the upcoming Sensitive Content Warnings feature in Google Messages”. It’s not hard to guess what “sensitive content” stands for, but how and why is Google going to be warning us about it? And how is it going to find out whether the content is indeed sensitive in nature?
First, some reassurance regarding privacy: neither Google nor independent experts have reported any privacy concerns. SafetyCore runs locally — without sending photos or associated information to external servers. When the user receives an image in Google Messages, a machine-learning model that runs locally on the phone analyzes it and blurs it if it detects anything saucy. To remove the blur, the user has to tap the image and confirm that they really want to view the content. A similar thing happens when sending: if the user tries to send an image with nudity, the phone double-checks if it really needs to be sent. Google stresses that it doesn’t send scan results anywhere.
The SafetyCore app handles the image analysis — but it’s not designed for standalone use. Other apps call on SafetyCore when receiving or sending pictures, but it’s up to them how to use the output. So far, AI analysis can only be used in Google Messages: images recognized as “sensitive” will be blurred. In the future, Google promises to make SafetyCore features available to other developers, enabling apps like WhatsApp and Telegram to detect nudes as well. Other apps could be configured to, for example, block adult content or immediately filter such images into spam.
Unlike previous attempts by Google and Apple to protect children from unwanted content, SafetyCore avoids external server analysis, which enhances privacy but strains hardware. Google anticipates that SafetyCore will eventually be installed on all sufficiently powerful (2GB RAM, Android 9+) phones. The feature will be disabled by default for adult users but enabled for minors. If you don’t need this kind of hand-holding, or don’t like having extra apps, you can simply remove SafetyCore from your phone. Unlike numerous other Google services, this app can easily be uninstalled through both Google Play and the “Apps” subsection of the phone settings. However, bear in mind that Google might reinstall the app with a future update.
SafetyCore is the most sophisticated, though not the only, on-device (meaning no cloud usage and no user-data sharing) AI-powered protection system that Google is developing. Alongside SafetyCore, in October 2024 Google announced language models designed to analyze messages from strangers in Google Messages and suggest ending the conversation if the message text resembles a typical scam scheme.
Besides SafetyCore, another app is spawning on devices with no warning — Android System Key Verifier. It also has no UI, can easily be uninstalled, and is designed for secure communication. However, it features no AI-driven analysis. This app enables two users to verify their keys during end-to-end encrypted messaging. WhatsApp and Signal have their own ways of doing this (users scan each other’s QR codes when meeting in person, or they compare long strings of numbers that show up on the screen). Google wants to make this easier for all messaging apps by putting a standard interface into Android.
Users’ main issue with Google, and the reason for the poor ratings, isn’t what the apps do, but how they’re installed: with no warnings, no explanations, and no user choice. A new app just appears on their phones. Many Google Play reviewers worry if it’s a virus, and some claim their phones or specific apps see reduced performance. There were no widespread issues connected to installing these Google apps, but if you’ve any doubts, you can manually delete the app and see if your phone indeed works better.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-17 11:06:492025-03-17 11:06:49Are the Android SafetyCore and Android System Key Verifier apps safe? | Kaspersky official blog
For Snort coverage that can detect the exploitation of these vulnerabilities, download the latest rule sets from Snort.org, and our latest Vulnerability Advisories are always posted on Talos Intelligence’s website.
Miniaudio out-of-bounds write vulnerability
Discovered by Emmanuel Tacheau of Cisco Talos.
TALOS-2024-2063 (CVE-2024-41147) is an out-of-bounds write vulnerability in Miniaudio, a lightweight, single-file audio playback and capture library written in C. A missing allocation size check can cause a buffer overflow, leading to this out-of-bounds write. This vulnerability can be triggered by a specially crafted FLAC file, resulting in a memory corruption when in playback mode. The application sends raw audio data to Miniaudio, which is then played back through the default playback device as defined by the operating system.
Adobe Acrobat out-of-bounds write vulnerability
Discovered by KPC of Cisco Talos.
TALOS-2025-2134 (CVE-2025-27163) and TALOS-2025-2136 (CVE-2025-27164) are out-of-bounds read vulnerabilities in the font functionality, which can lead to disclosure of sensitive information. TALOS-2025-2135 (CVE-2025-27158) is a memory corruption vulnerability, stemming from an uninitialized pointer in the font functionality of Adobe Acrobat, which can potentially lead to arbitrary code execution. A specially crafted font file embedded into a PDF can trigger these vulnerabilities. An attacker needs to trick the user into opening a malicious file.
Welcome to this week’s edition of the Threat Source newsletter.
Let’s pick up where we left off in my last newsletter. Please mark your calendars: The free support for Windows 10 will end on October 14, 2025.
When a software loses vendor support, it no longer receives patches or updates. As highlighted in my previous newsletter, the top method for initial access in the last quarter of 2024 was exploiting vulnerabilities in public-facing applications. While Windows 10 isn’t typically (or shouldn’t be) a public-facing application, unpatched client systems become prime targets for bad actors as they progress through the stages of an attack: Execution, Privilege Escalation, Defense Evasion, Credential Access, and Lateral Movement.
In last week’s newsletter, my colleague Martin asked, “Who is responsible, and does it matter?” As a thought exercise, let’s flip the script and ask, “Where is the victim, and does it matter?” I often field questions about threats specific to countries, regions, or continents, but the reality is that software is largely the same regardless of physical location. Yes, there are different language packs, and yes, spam and phishing campaigns may use local languages. However, when it comes to software, operating systems, libraries, and drivers, we share code globally.
Remember Log4j and NotPetya? These vulnerabilities caused chaos around the globe. Both have CVEs listed in the Known Exploited Vulnerabilities (KEV) catalog, which is maintained by the Cybersecurity and Infrastructure Security Agency (CISA).
While researching the KEVs added in 2024, I discovered CVEs dating back to 2012, 2013, and 2014. This underscores that regardless of location, old vulnerabilities can remain relevant and dangerous years after their discovery.
Fast forward to 2025: CVE-2025-22224 was published on Mar. 4, 2025 and added to CISA’s KEV Catalog less than two hours later. A week later, over 40,000 vulnerable instances were still detected globally, as shown on the Shadowserver dashboard:
Rather than solely focusing on geography, the global vulnerability landscape suggests we should ask ourselves:
· “Am I running this software?” · “Is my software up to date?” · “How quickly can I fix it?” · Or, for the brave, “Am I prepared to take the risk?”
While more attributes for CVEs may be beneficial, I personally believe the absence of a geographic attribute is a good thing. Patching and updating software should be prioritized regardless of nationality or geographic context. When it comes to maintaining robust cybersecurity, the only good vulnerability is no vulnerability.
Remember: In the digital world, we’re all neighbors. A vulnerability anywhere is a threat just around the corner.
The one big thing
Cisco Talos discovered malicious activities conducted by an unknown attacker as early as January 2025, predominantly targeting organizations in Japan. The attacker exploited a vulnerability, CVE-2024-4577, a remote code execution (RCE) flaw in the PHP-CGI implementation of PHP on Windows, to gain initial access to victim machines.
Why do I care?
We reported an increasing trend of threat actors exploiting vulnerable public facing applications for initial access in our quarterly Talos Incident Response report for Q4 2024, and this intrusion highlights this ongoing activity. In this case, the attacker establishes persistence by modifying registry keys, adding scheduled tasks, and creating malicious services using the plugins of the Cobalt Strike kit called “TaoWu.”
So now what?
This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see the National Vulnerability Database. Here are the Snort SIDs for this threat:
· The Bluetooth “backdoor” that wasn’t. The original title, “Undocumented backdoor found in Bluetooth chip used by a billion devices,” was updated to a more precise description: “Undocumented commands found in Bluetooth chip used by a billion devices.” (Bleepingcomputer) (Darkmentor)
· A ransomware gang leveraged a vulnerable IP camera in an attack, effectively circumventing Endpoint Detection and Response (EDR). The “Mr. Monk” in me wants to point out that while the article title says “webcam” — which, in my definition, is a camera connected internally or via USB to a PC — the article discusses Linux and SMB shares, which suggests it is an IP camera. (Bleepingcomputer)
· Massive alleged cyber attack against X (formerly Twitter). This past Monday, a series of outages left X unavailable for thousands of users for at least one hour. Not all details are currently known to the public. (Securityweek)
Cisco Talos discovered malicious activities conducted by an unknown attacker since as early as January 2025, predominantly targeting organizations in Japan. Read the full blog here: Unmasking the new persistent attacks on Japan
Upcoming events where you can find Talos
· DEVCORE (March 15, 2025) Taipei, Taiwan. Ashley Shen will give a talk on exploit hunting. · RSA (April 28-May 1, 2025) San Francisco, CA · PIVOTcon (May 7-May 9, 2025) Malaga, Spain. Ashley Shen and Vitor Ventura will present “Redefining IABs: Impacts of Compartmentalization on Threat Tracking & Modeling.” · CTA TIPS 2025 (May 14-15, 2025) Arlington, VA · Cisco Live U.S. (June 8 – 12, 2025) San Diego, CA
Most prevalent malware files from Talos telemetry over the past week
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 18:06:432025-03-13 18:06:43Patch it up: Old vulnerabilities are everyone’s problems
On March 4, Broadcom released emergency updates to address three vulnerabilities — CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226 — that affect several VMware products, including ESXi, Workstation, and Fusion. A note in the Broadcom advisory stated that at least one of these — CVE-2025-22224 — has been exploited in real-world attacks. The vulnerabilities allow for virtual machine escape — enabling attackers to execute code directly on the ESX hypervisor. Information available on VMware’s GitHub suggests that the Microsoft Threat Intelligence Center was the first to detect the exploit in the wild and notify Broadcom. Neither company has named the attacker or the victim.
Broadcom reports that the vulnerabilities affect VMware ESXi 7.0–8.0, Workstation 17.x, vSphere 6.5–8, Fusion 13.x, Cloud Foundation 4.5–5.x, Telco Cloud Platform 2.x–5.x, and Telco Cloud Infrastructure 2.x–3.x. However, some experts suggest that the range of impacted products is potentially wider. In particular, older versions of ESXi, such as 5.5, should be vulnerable as well, but these unsupported versions are not getting patched. According to some assessments, more than 41,000 ESXi servers had been affected across the globe (mainly in China, France, the U.S., Germany, Iran and Brazil) as at the end of last week.
What issues VMware has fixed
The most severe vulnerability in VMware ESXi and Workstation — CVE-2025-22224 — received a CVSS rating of 9.3. It’s related to a heap overflow in VMCI, and allows an attacker with local administrative privileges on the virtual machine to execute code as the VMX process on the host — the hypervisor.
The CVE-2025-22225 vulnerability in VMware ESXi (CVSS 8.2) allows an attacker to perform an arbitrary kernel write, which also implies sandbox escape. CVE-2025-22226 — an HGFS information disclosure vulnerability (CVSS 7.1) — permits an attacker with guest VM administrative access to extract the contents of the VMX process memory. VMware ESXi, Workstation, and Fusion are affected by this vulnerability.
Dangerous exploitation scenarios
The vulnerability descriptions indicate that exploitation requires an attacker to have already compromised the virtual machine and possess administrative privileges on it. This seems like a relatively high entry barrier, but in reality such a scenario can materialize quite easily. The primary danger of these vulnerabilities is that they drastically reduce the steps an attacker needs to take from compromising a single virtual machine to completely seizing control of the computing cluster. The trio of vulnerabilities allows the attacker to reach hypervisor level without conducting “noisy” network environment scans for servers, or having to circumvent network security measures. The following are typical enterprise scenarios where this could occur:
VMware-based VDI workstations. A single employee makes a mistake by launching a malicious attachment on their virtual workstation. Instead of just one workstation being compromised, this leads to a large-scale incident.
VMware-based hybrid and private clouds. A successful compromise of any server via a publicly accessible application vulnerability allows an attacker to rapidly propagate the attack across the entire network.
Leasing virtual servers and workstations (prebuilt VMs) from an MSP. A client’s error leading to infection on a rented host will result in compromise of all MSP clients sharing resources within the same cluster.
Some features of VMware clusters create further complexities in detecting and remediating such incidents. Once an attacker compromises the hypervisor level, they automatically gain access to all storage connected to the cluster. The attacker can then move freely throughout the VMware environment, and the configuration files available from the hypervisor permit their conducting extensive reconnaissance without raising security alerts.
The hypervisor lacks an EDR agent, and security tools have very limited visibility into what’s happening at the cluster level. Hackers can sneak in and grab important information, such as Active Directory databases, without security teams noticing. All of these factors make the three VMware vulnerabilities a veritable goldmine for malicious actors — particularly ransomware groups. They’ve repeatedly conducted attacks on ESXi environments in the past: RansomExx, ESXiargs, Clop, and so on.
Recommendations for organizational security
Luckily for businesses, proof-of-concept (PoC) code for exploiting these vulnerabilities has not yet been published, so widespread exploitation of the flaw has not begun. Nevertheless, such code could surface at any moment, so VMware products need to be updated quickly as a top priority. Since patching VMware environments can be complex, especially in high-availability infrastructures, organizations should leverage tools like vMotion to deploy patches without downtime.
Patching is the only mitigation for these vulnerabilities. However, Broadcom also recommends reviewing your settings according to the vSphere Security Configuration & Hardening guide. Among other things, you need to ensure that your VMware infrastructure is properly segmented to restrict access to the hypervisor management network.
Be sure to use cloud security tools, including having an EDR agent properly installed and running on your virtual machines. This will allow for the detection and prevention of the initial infection stage — blocking attackers from obtaining the administrative access required to exploit the vulnerabilities.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 15:06:392025-03-13 15:06:39Update your VMware ESXi products now | Kaspersky official blog
ANY.RUN sandbox just got even more powerful thanks to a new pre-installed development software set in its virtual machines (VMs).
Building on our existing pre-installed sets, we’re introducing this new option to give researchers even more flexibility and advanced tools for analyzing highly specific and complex malware inside the sandbox.
With this update, before launching an analysis session, users can select the “Development” software set to instantly load a specialized toolkit designed for deep malware investigation. This is especially useful for working with Python-based malware, Node.js-based threats and adding deeper debugging and inspection capabilities.
Let’s take a closer look at this latest addition and discover how you can use it!
Why This Update Matters: Key Benefits
This new software set significantly enhances malware research by providing tools that cater to specific types of malware. Here’s why we’ve added this soft set:
Analyze new types of malware (Python/Node.js-based threats): Many modern malware samples are written in Python or Node.js, and having the right tools pre-installed makes their analysis more efficient.
Improved debugging and reverse engineering: The presence of advanced debuggers and analysis tools helps senior analysts dive deeper into malware behavior, extract insights, and develop better detection techniques.
Faster and more efficient research sessions: No more manual installation, just launch the VM, and all necessary tools are available, saving time and improving workflow.
Expanding the database of ANY.RUN: By introducing new analysis scenarios, this update broadens the platform’s capabilities, making it more useful for a wide range of malware research and forensic investigations.
Sandbox for Businesses
Discover all features of the Enterprise plan designed for businesses and large security teams.
See details
What’s Included in the New Software Set?
The pre-installed software set includes essential tools that malware analysts, security researchers, and threat hunters frequently use for analyzing complex threats:
Pre-installed software set for deeper malware analysis
List of Pre-Installed Tools
Python (latest version) – Important for analyzing Python-based malware, executing scripts, and automating analysis.
Node.js (latest version) – Helps in investigating Node.js-based malware and executing malicious scripts in a controlled environment.
DebugView – Captures real-time debug output from Windows applications, useful for identifying malware behavior.
DIE (Detect It Easy) – A tool for identifying executable file packers, obfuscators, and compilers used by malware authors.
dnSpy – A powerful .NET debugger and decompiler, ideal for reverse-engineering malware written in C# or VB.NET.
HxD – A hex editor that allows analysts to inspect and modify binary files, memory, and disk structures.
Process Hacker – An advanced process monitoring tool for tracking system behavior and detecting malicious activity.
x64dbg – A dynamic debugger for analyzing malware at the assembly level, often used for unpacking and reverse engineering.
Wireshark PE – A network protocol analyzer for capturing and inspecting suspicious network traffic during malware execution.
How to Use the New Software Set in ANY.RUN
This pre-installed toolset is now available for ANY.RUN Enterprise users running malware analysis on Windows 10 (64-bit) virtual machine.
This is particularly useful for researchers who want to inspect the contents of an installer safely and identify any suspicious files or embedded scripts.
During this process, the Detect It Easy (DiE) tool is also used, helping analysts gather more details about the extracted binaries, such as file signatures, packers, and obfuscation methods.
DiE tool used for detailed analysis of malware
By combining these tools, users can uncover hidden threats inside MSI packages without the risks associated with running them.
Example 2: Debugging Malware with x64dbg
In this analysis session, x64dbg is used, a powerful debugger that allows users to step through malware execution, analyze code behavior, and identify hidden functionality.
This is particularly useful for unpacking malware, bypassing obfuscation techniques, and understanding how the sample interacts with the system.
Example 3: Searching Inside Unpacked Binaries with HxD
In this analysis session, HxD is used, a hex editor that allows users to search within all types of files for specific strings, patterns, or hidden data. This is useful when working with unpacked binaries, encrypted payloads, or malware that tries to conceal its real purpose within other formats.
HxD used for deeper analysis inside ANY.RUN sandbox
By using HxD inside ANY.RUN’s sandbox, analysts can quickly locate critical data inside malware samples without needing to transfer files externally, making the analysis process safer and more efficient.
In this case, the word “software” was searched with the help of HxD inside our secure environment to look for relevant information.
Conclusion
With the new pre-installed development software set, malware analysis in ANY.RUN just got a whole lot easier. Instead of jumping between different tools and setups, everything you need is already there inside the sandbox, ready to go.
For businesses, this means faster threat detection and a more seamless workflow, all in a secure, controlled environment.
Give it a try and see how much easier malware detection and analysis can be!
About ANY.RUN
ANY.RUN helps more than 500,000 cybersecurity professionals worldwide. Our interactive sandbox simplifies malware analysis of threats that target both Windows and Linux systems. Our threat intelligence products, TI Lookup, YARA Search, and Feeds, help you find IOCs or files to learn more about the threats and respond to incidents faster.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 11:06:382025-03-13 11:06:38New Pre-Installed Dev Tools for Deep Sandbox Malware Analysis