INTELLIGENT THREAT DATA

Cryptomining | Malware | Phish | Ransomware

Threat Data Experts

Based in the USA and Brazil, Malware Patrol’s origins date back to 2005 when our founder began to share malicious URLs by email with fellow security enthusiasts. Eventually, he developed a platform and infrastructure to offer a blocklist to the community.

After more than 15 years of collecting, analyzing, and sharing data, we have an extensive network of proprietary sensors, sharing agreements, and community contributors. The result is our vast database of unique and historically rich – “intelligent” – threat data.

The indicators of compromise (IoCs) collected by Malware Patrol are now used by thousands to protect networks and assets in more than 175 countries.

Enterprise Threat Intelligence

What kind of threat data user are you?

Enterprise

You use IoCs in your SIEM, TIP or other platform, integrate data into your security products, or need custom data for research purposes. A mature cybersecurity program.

SMB Security Team

Small-to-medium business security team or service provider, you use threat data to provide network security management services to your customers or internal networks.

DNS Provider

You provide or manage DNS services for your internal or external customers using BIND9. You need DNS-level data to prevent users from accessing malicious sites.

Registry

For ICANN compliance purposes you need to track and be able to act on malicious activity hosted at or perpetrated by your TLDs.

Data Services

To reduce the noise and false positive overload faced by information security teams and their tools, our automated systems verify each IoC every day to ensure that our feeds contain only active threats.

For simplicity’s sake, all feeds include an unlimited commercial license for the use of the data, regardless of the number of  customers or end users.

Enterprise Data Feeds

We offer a wide range of IoC feeds for security teams, incident responders, enterprises and researchers available for individual purchase: malware URLs and samples, malicious IPs, C2s, DGAs, cryptomining sites, newly registered domains and more. For those with specific data or ingestion requirements, we can fully customize feed contents and formats at no additional cost. Request a FREE evaluation or download the product sheet. 

DNS Firewall

Our DNS RPZ firewall offers flexible, up-to-the-minute protection. With five separate zone files updated every five minutes, users are protected against C2s, DGAs (used by over 40 malware and ransomware families), malware, cryptominers, and phishing sites. A DNS Firewall subscription also includes the Business Protect package. 

Phishing Threat Intelligence

Our phishing URLs come from a variety of sources – crawlers, emails, spam traps and more – to ensure coverage of the most current campaigns. A combination of human and machine analysis allows us to catch even those hard-to-detect phish. We also capture the raw HTML as well as JPEG images of the phishing websites from the sites in our feed. From the images, we generate perceptual hashes. These data sets can be added on to a phishing feed subscription for machine learning and educational uses. 

Registry Compliance Data

This service helps registries track malicious activities related to their TLDs, an ICANN compliance requirement. An easy-to-use report, based only on the registry’s TLDs, is offered with IoCs related to the following threat types:

  • Anti-Mining
  • Command & Control Servers (C2s)
  • DGAs
  • Malware & Ransomware
  • Phishing

Small Business Protection

A package of malware URLs feeds in a variety of useful formats. This service was designed with the needs of small to medium-sized businesses in mind. The data offered protects against the latest malware and ransomware campaigns. We offer a 7-day full access trial.

How big are your threat data gaps?

See for yourself.

Why choose Malware Patrol?

Dedicated & Accessible Support

There’s no calling 800 numbers to reach the next available agent. Commercial customers have an assigned team familiar with their specific needs and technological environments to ensure efficient and accurate implementations and support.

Focused, Real-Time Protection

Our feeds are updated EVERY HOUR and customers have unlimited data downloads. Because our feeds only contain actionable threats, our customers save time and resources by avoiding the ingestion and prioritization of “possible threats.”

Z

Easy to Ingest

The contents or format of Enterprise Data Feeds can be customized to make the ingestion process as easy and reliable as possible. For our other services, we offer feeds and lists formatted for compatibility with the most common security platforms and software.

T

Maximum Threat Visibility

Malware Patrol’s customers are protected from the latest malicious campaigns thanks to the large number and variety of ingestion points. Geographically diverse honeypots, spam pots, and network sensors, along with collaboration agreements and continuous threat research maximize our data’s coverage.

InfoSec Articles (08/30/21 – 09/13/21)

In the first 2 weeks of September, we saw the LockFile is a new ransomware family that emerged in July 2021 following the discovery in April 2021 of the ProxyShell...

InfoSec Articles (08/16/21 – 08/30/21)

In the last 2 weeks of August, we saw campaigns use a multitude of infection components to deliver two widely popular commodity malware and remote access trojans (RATs):...

Protect Against Ransomware Using Best Practices

Everyone wants to know how to protect against ransomware - 2021 is the year of ransomware! The Colonial Pipeline attack shutdown a major oil distribution line and held it...

InfoSec Articles (08/02/21 – 08/16/21)

In this first half of August, we saw that during Cyble’s routine Open-Source Intelligence (OSINT) research, we came across a malware posted by a researcher on Twitter. Also,...

InfoSec Articles (07/19/21 – 08/02/21)

Over the past two weeks, we saw that the Government sanctioned cyber-surveillance is back in the news, following an exposé that reveals how commercial malware is being used...

Malware Patrol data offered through Bandura Cyber Threat Intelligence Marketplace

      Press Release   St. Petersburg, FL, July 28, 2021 -- Malware Patrol, the veteran threat intelligence company, announced today that they now offer data...

InfoSec Articles (07/05/21 – 07/19/21)

Over the past 2 weeks, we saw Threat actors behind the infamous TrickBot malware have been linked to a new ransomware strain named “Diavol,”. Also, a new malware that...

InfoSec Articles (06/21/21 – 07/05/21)

Malware patrol selected some relevant news over the past 2 weeks. Microsoft has confirmed signing a malicious driver being distributed within gaming environments....

InfoSec Articles (06/07/21 – 06/21/21)

In the last two weeks of June, we saw the Japanese multinational conglomerate Fujifilm said it has refused to pay a ransom demand to the cyber gang that attacked its network...

Three Types of Cyber Threat Intelligence

Cyber threat intelligence (CTI) is one of the main pillars of cybersecurity strategies. Although it is not the answer to all cybersecurity problems, it is a very important...

InfoSec Articles (05/24/21 – 06/07/21)

At the end of March and beginning of June, we saw the Evolution of the JSWorm ransomware, the ransomware threat landscape has been gradually changing. We have been witness...

InfoSec Articles (05/10/21 – 05/24/21)

In the past two weeks of May, we noticed that the whole world is susceptible to cyber-attacks and even banks. Bizarro is another family of banking Trojans originating in...

InfoSec Articles (04/26/21 – 05/10/21)

At the end of April and the first week of March, we realized that cyberattacks do not rest, recently the Cybereason Nocturnus team responded to several incident response...

InfoSec Articles (04/12/21 – 04/26/21)

In the second half of April, we noticed a growing wave of cyber attacks Microsoft threat analysts have been tracking activity where contact forms published on websites are...

InfoSec Articles (03/29/21 – 04/12/21)

In this first half of April, we noticed that cyber threats are spreading all over the world and involve major investigations. This new threat, which we’ve named Janeleiro,...

Stay Connected

Sign up for our newsletter to receive occasional updates and cybersecurity news.
Newsletter - Sidebar