INTELLIGENT THREAT DATA
Malware | Ransomware | DDoS | Cryptocurrencies
We are a team of threat data experts based in the USA and Brazil. Our history is one of community spirit and dedication to internet security that began in 2005 when a small group began sharing malicious links through a simple mailing list.
Malware Patrol’s indicators of compromise (IOCs) are now used by thousands to protect networks and assets in more than 175 countries. Over a decade of collecting, analyzing, and sharing data has allowed us to develop an extensive network of sensors, sharing agreements, and community contributors, the result of which is a vast database of unique and historically rich – intelligent – threat data.
For the benefit of our customers’ limited time and security resources, our automated systems verify the data every day to ensure that it contains only active threats. For the same reason, we are continually updating the technology we use to scour the Internet for the latest malicious campaigns.
Commercial Threat Data
Enterprise – A wide range of data – malware samples, malicious IPs, C2s, anti-mining, and more – for security researchers and enterprises. For those with specific data and/or ingestion requirements, we can fully customize feed contents and/or formats. Request a FREE evaluation.
Business Protect – A data package with the goal of protecting your customers and networks against malware infections, the transmission of compromised data, and communications with botnets and command and control (C2s) servers. Request a FREE evaluation.
Non-Commercial Block Lists
Our malware block lists are available in a variety of formats, compatible with the most popular content filters, firewalls, and proxy systems. The data is strictly for personal or non-commercial use, such as home computers and internal networks. It cannot be used to protect external customers or included in any commercial security products or services.
Free Guard – Completely free, updated every 72 hours.
Basic Defense – Monthly and annual subscription options, updated every 4 hours.
Why do companies choose Malware Patrol?
Real-time detection of malicious campaigns
Our experience in detecting, analyzing and monitoring malicious activities dates back to 2005. It is based on data collected from a large number of ingestion points that include honeypots, spampots, collaboration agreements and continuous threat research
Tech support that cares
The team is here to help you use our data to achieve the best results possible. We like to understand our customer’s needs and technological environments to properly help implement effective protection mechanisms
The feeds can be fully customized to contain the information needed, making the ingestion process as easy and reliable as possible. We strive to minimizing the time and work needed to start using our data
Dependable and accurate
IOCs are constantly verified to guarantee the accuracy of our data. Feeds are updated every hour, so customers are sure to be protected from the latest malicious campaigns
From security experts to security experts
We are a group of experienced information security professionals. We speak your language and are ready to discuss your needs and present the best solutions
Our Blog And Configuration Guides
Read a few interesting CyberSecurity news articles from the past few weeks, including an update on a rootkit named CEIDPageLock being distributed by the RIG Exploit kit, Mozilla’s plan to distrust TLS certificates issued by Symantec, new MacOS malware, and more.
In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.
A few of our favorite infosec articles from the past few weeks. Learn about Android botnet “Black Rose Lucy” and about the“BlueBorne” bluetooth exploit. Read how the Necurs Botnet, DarkHydrus and other threat actors are turning to inconspicuous files to peddle malspam.