fbpx

INTELLIGENT THREAT DATA

Malware | Ransomware | DDoS | Crypto | Phish

Malware Patrol is a team of threat data experts based in the USA and Brazil. Our history is one of community spirit and dedication to Internet security that began in 2005 when a group started sharing malicious links using a simple mailing list.

The indicators of compromise (IOCs) collected by Malware Patrol are now used by thousands to protect networks and assets in more than 175 countries.

Collecting, analyzing, and sharing data for over a decade has allowed us to develop an extensive network of sensors, sharing agreements, and community contributors. The result is our vast database of unique and historically rich – “intelligent” – threat data.

Today, our data is derived from over 60 sources, both public and proprietary.

To respect the time and resource limitations faced by information security professionals, automated systems verify each IOC in our lists every day to ensure that our feeds contain only active threats. To maximize our data’s coverage, the Malware Patrol team is continually updating the technology we use to scour the Internet for the latest malicious campaigns.

We offer commercial and non-commercial versions of our data.

 

Malware Patrol

What kind of threat data user are you?

Security Enterprise

You 1) use IOCs in your SIEM/TIP or other platform, 2)integrate data into your security products, or 3) need custom data for research purposes.

Security Service Provider

MSSP or small security team, you use threat data to provide network security management services to your customers or internal networks.

Registry

For ICANN compliance purposes you need to track and be able to act on malicious activity hosted at or perpetrated by your TLDs.

Non-Commercial

You use threat data strictly for the protection of your own computer or your company’s internal network and end users.

Malware Patrol Commercial Threat Data

All commercial threat data options at Malware Patrol include an unlimited commercial license for the use and resale of the data, regardless of the number of customers or end users.

Enterprise Data Feeds

We offer a wide range of IOC feeds for security teams, enterprises and researchers available for individual purchase: malware URLs and samples, malicious IPs, C2s, DGAs, cryptomining sites, newly registered domains and more. For those with specific data or ingestion requirements, we can fully customize feed contents and formats at no additional cost. Request a FREE evaluation.
 

DNS Firewall

Our DNS RPZ firewall offers flexible, up-to-the-minute protection. With five separate zone files updated every five minutes, users are protected against C2s, DGAs (used by over 40 malware and ransomware families), malware, cryptominers, and phishing sites. A DNS Firewall subscription also includes the Business Protect package.
 

Phishing Threat Intelligence

Our phishing URLs come from a variety of sources – crawlers, emails, spam traps and more – to ensure coverage of the most current campaigns. A combination of human and machine analysis allows us to catch even those hard-to-detect phish. We also capture JPEG images of the phishing websites from our feed and generate perceptual hashing data, both of which can be added on to a phishing feed subscription for machine learning and educational uses.
 

Registry Compliance Data

This service helps registries track malicious activities related to their TLDs, an ICANN compliance requirement. An easy-to-use report, based only on the registry’s TLDs, is offered with IOCs related to the following threat types:

  • Anti-Mining
  • Command and Control Servers (C2s)
  • DGAs
  • Malware & Ransomware
  • Phishing

 

Small Business Protection

A package of malware URLs feeds in a variety of useful formats. This service was designed with the needs of small to medium-sized businesses – particularly MSSPs and ISPs – in mind. The data offered protects against the latest malware and ransomware campaigns. Request a FREE evaluation.

How big are your threat data gaps?

See for yourself.

Why do companies choose Malware Patrol?

Dedicated & Accessible Support

There’s no calling 800 numbers to reach the next available agent. Commercial customers have an assigned team familiar with their specific needs and technological environments to ensure efficient and accurate implementations and support.

Focused, Real-Time Protection

Our feeds are updated EVERY HOUR and customers have unlimited data downloads. Because our feeds only contain actionable threats, our customers save time and resources by avoiding the ingestion and prioritization of “possible threats.”

Z

Easy to Ingest

The contents or format of Enterprise Data Feeds can be customized to make the ingestion process as easy and reliable as possible. For our other services, we offer feeds and lists formatted for compatibility with the most common security platforms and software.

T

Maximum Threat Visibility

Malware Patrol’s customers are protected from the latest malicious campaigns thanks to the large number and variety of ingestion points. Geographically diverse honeypots, spam pots, and network sensors, along with collaboration agreements and continuous threat research maximize our data’s coverage.

InfoSec Articles (01/22/20 – 02/05/20)

Entering into the second month of the year, there's more information about the various groups that are using the Golden Chicken Malware-as-a-Service. In addition, there's a...

Why Commercial Threat Intelligence Beats OSINT

Picture this: you’re in need of a new suit. You see that your favorite store is giving away designer suits for free and the pictures look fantastic. But digging into the...

InfoSec Articles (01/07/20 – 01/21/20)

Articles from the last couple of weeks reveal news about cyber threats targeting the electric utility industry and hackers boring into the gas company industry. And with...

Threat Intelligence: Essential For Your Cyber Defenses

Cyber risk is growing while confidence in internal defense resilience declining. According to Microsoft’s 2019 Global Cyber Risk Perception Survey, cyber security is a top...

InfoSec Articles (12/23/19 – 01/06/20)

Off to an active start in 2020, threat groups are being quite agressive. Read articles about their attacks and several others in our industry article picks for the first of...

InfoSec Articles (12/08/19 – 12/22/19)

Just a few weeks into the holiday season and Ryuk ransomware, among others, are making the news. Read articles about this menace and several others in our picks from the...

Infosec Articles (11/23/19 – 12/07/19)

Even with low usage rates, new exploit kits have been found targeting Internet Explorer, says Malwarebytes in their fall report. Secure List's article about Q3 spam and...

Infosec Articles (11/8/19 – 11/22/19)

Ransomware takes the spotlight this time showing up targeting Windows users, production servers and, specifically, drives commonly associated with removable devices and...

Infosec Articles (10/24/19 – 11/7/19)

Android malware and adware, along with mobile espionage made headlines during the last two weeks. No shortage of variety in malicious behavior, there are also articles...

Infosec Articles (10/9/19 – 10/23/19)

There's a new Mirai variant and, big surprise, Android applications are taking more permissions than they are granted. For Linux users, there's a new ransomware family...

Infosec Articles (9/24/19 – 10/8/19)

Our selection of the most recent infosec articles from around the web, including write ups about both the Masad and Arcane stealer, all accompanied by a possible link...

Infosec Articles (9/9/19 – 9/23/19)

Read our hand-picked selection of the latest security articles in which botnets and RATs make frequent appearances. Despite the changes in the industry earlier this year...

Infosec Articles (8/25/19 – 9/8/19)

Read some of the most interesting and useful infosec articles from the last two weeks, in particular a couple about the newcomer Nemty ransomware. The NCSC published a...

Infosec Articles (8/11/19 – 8/24/19)

Our selection of the most recent infosec articles from around the web, including a vulnerability, a malware and a phishing attack all directed at Microsoft users. Sucuri...

Infosec Articles (7/28/19 – 8/10/19)

Our handpicked selection of the most recent infosec articles from around the web, including vulnerabilities found in Siemens and WhatsApp. The ACSC published an informative...

Stay Connected

Sign up for our newsletter to receive occasional updates and cybersecurity news.
 
Newsletter - Sidebar