INTELLIGENT THREAT DATA
Cryptomining | Malware | Phish | Ransomware
Threat Data Experts
Based in the USA and Brazil, Malware Patrol’s origins date back to 2005 when a group of security enthusiasts began to share malicious URLs via email. From this exchange, we developed a platform and infrastructure to verify and make this data available to the security community in the form of blocklists. This project grew into the collection of additional IoCs, and eventually commercial services.
The indicators of compromise (IoCs) collected by Malware Patrol are now used by thousands to protect networks and assets in more than 175 countries.
After more than 15 years of collecting, analyzing, and sharing data, we have an extensive network of proprietary sensors, sharing agreements, and community contributors. The result is our vast database of unique and historically rich – “intelligent” – threat data.
To reduce the noise and false positive overload faced by information security teams and their tools, our automated systems verify each IoC every day to ensure that our feeds contain only active threats.
For simplicity’s sake, all feeds include an unlimited commercial license for the use of the data, regardless of the number of customers or end users.
We offer a wide range of IoC feeds for security teams, incident responders, enterprises and researchers available for individual purchase: malware URLs and samples, malicious IPs, C2s, DGAs, cryptomining sites, newly registered domains and more. For those with specific data or ingestion requirements, we can fully customize feed contents and formats at no additional cost. Request a FREE evaluation or download the product sheet.
Our DNS RPZ firewall offers flexible, up-to-the-minute protection. With five separate zone files updated every five minutes, users are protected against C2s, DGAs (used by over 40 malware and ransomware families), malware, cryptominers, and phishing sites. A DNS Firewall subscription also includes the Business Protect package.
Our phishing URLs come from a variety of sources – crawlers, emails, spam traps and more – to ensure coverage of the most current campaigns. A combination of human and machine analysis allows us to catch even those hard-to-detect phish. We also capture the raw HTML as well as JPEG images of the phishing websites from the sites in our feed. From the images, we generate perceptual hashes. These data sets can be added on to a phishing feed subscription for machine learning and educational uses.
This service helps registries track malicious activities related to their TLDs, an ICANN compliance requirement. An easy-to-use report, based only on the registry’s TLDs, is offered with IoCs related to the following threat types:
- Command & Control Servers (C2s)
- Malware & Ransomware
A package of malware URLs feeds in a variety of useful formats. This service was designed with the needs of small to medium-sized businesses in mind. The data offered protects against the latest malware and ransomware campaigns. We offer a 7-day full access trial.
How big are your threat data gaps?
See for yourself.
Why choose Malware Patrol?
Dedicated & Accessible Support
There’s no calling 800 numbers to reach the next available agent. Commercial customers have an assigned team familiar with their specific needs and technological environments to ensure efficient and accurate implementations and support.
Focused, Real-Time Protection
Our feeds are updated EVERY HOUR and customers have unlimited data downloads. Because our feeds only contain actionable threats, our customers save time and resources by avoiding the ingestion and prioritization of “possible threats.”
Easy to Ingest
The contents or format of Enterprise Data Feeds can be customized to make the ingestion process as easy and reliable as possible. For our other services, we offer feeds and lists formatted for compatibility with the most common security platforms and software.
Maximum Threat Visibility
Malware Patrol’s customers are protected from the latest malicious campaigns thanks to the large number and variety of ingestion points. Geographically diverse honeypots, spam pots, and network sensors, along with collaboration agreements and continuous threat research maximize our data’s coverage.