+1.813.321.0987

INTELLIGENT THREAT DATA

Malware | Ransomware | DDoS | Cryptocurrencies

Malware Patrol

We are a team of threat data experts based in the USA and Brazil. Our history is one of community spirit and dedication to internet security that began in 2005 when a group began sharing malicious links through a simple mailing list.

Over a decade of collecting, analyzing, and sharing data has allowed us to develop an extensive network of sensors, sharing agreements, and community contributors, the result of which is our vast database of unique and historically rich – “intelligent” – threat data.

Malware Patrol’s indicators of compromise (IOCs) are now used by thousands to protect networks and assets in more than 175 countries.

To respect the time and resource limitations faced by information security professionals, automated systems verify each IOC in our lists every day to ensure that our feeds contain only active threats. To maximize our data’s coverage, we are continually updating the technology we use to scour the Internet for the latest malicious campaigns.

We offer commercial and non-commercial versions of our data.

 

threat data

Commercial Threat Data

Enterprise Threat Data Feeds

A wide range of IOCs feeds for security enterprises and researchers available for individual purchase: malware samples, malicious IPs, C2s, cryptomining sites, newly registered domains and more. For those with specific data or ingestion requirements, we can fully customize feed contents and formats at no additional cost. Request a FREE evaluation.
 

Business Protect Data Package

A pre-set package of feeds designed with the needs of small to medium sized security businesses – MSSPs and ISPs – in mind. The data offered helps protect your customers and their networks against malware infections, the transmission of compromised data, and communications with botnets and command and control (C2s) servers. Request a FREE evaluation.
 

Details

Both of these commercial threat data options include an unlimited commercial license for the use and resale of the data, regardless of the number of customers and/or end users.

Visit our commercial services page for more information about our threat data feeds for security companies.

Non-Commercial Block Lists 

Free Guard

Completely free block list of malware URLs updated every 72 hours. It contains the entries from our database that have been detected during the last 7 days.
 

Basic Defense

Subscription-based malware URL block list updated every 4 hours. It contains the entries from our database that have been detected during the last 15 days. Monthly and annual payment options are available, along with a 7-day money back guarantee.
 

Details

The malware URL block lists above are available in a variety of formats, compatible with the most popular filters, firewalls, and proxy systems. The data is strictly for personal or non-commercial use, such as home computers and the internal networks of businesses and educational organizations. These lists cannot be used to protect external customers or as part of any commercial security products or services.
 
Visit our non-commercial services page for more information, including the available feed formats for each subscription type.

What kind of threat data user are you?

Security Enterprise

You resell or integrate IOCs into your threat intelligence/security products. Or, you need custom data or samples for research.

Security Service Provider

MSSP, ISP, or the like, you use threat data to provide network security management services to your customers.

Non-Commercial

You use threat data strictly for the protection of your own computer or your company’s internal network and end users.

Why do companies choose Malware Patrol?

Dedicated & Accessible Support

There’s no calling 800 numbers to reach the next available agent. Commercial customers have an assigned team familiar with their specific needs and technological environments to ensure efficient and accurate implementations and support.

Focused, Real-Time Protection

Feeds are updated EVERY HOUR and customers have unlimited data downloads. The constant verification also means that only actionable threats are in our feeds. Our customers save time and resources by avoiding the ingestion and categorization of “possible threats”.

Z

Easy to Ingest

The contents or format of Enterprise data feeds can be customized to make the ingestion process as easy and reliable as possible. For our other services, we offer feeds and lists formatted for compatibility with the most common security platforms and software.

T

Maximum Threat Visibility

Customers are protected from the latest malicious campaigns thanks to the large number and variety of ingestion points. Geographically diverse honeypots, spam pots, and network sensors, along with collaboration agreements and continuous threat research maximize our data’s coverage.

How big are your threat data gaps?

See for yourself.

From the Blog

antivirus protection

Comparing Protection Mechanisms

In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.

Infosec Articles (9/17/18 – 10/1/18)

We've put together our bi-weekly compilation of infosec articles from around the security industry. Read updates on botnets like Gafgyt and Virobot. Learn about hackers targerting real estate deals,...
SpamAssassin

SpamAssassin Configuration Guide

Malware Patrol provides block lists compatible with SpamAssassin.   "Apache SpamAssassin is the #1 Open Source anti-spam platform giving system administrators a filter to classify email...
cryptominer

Infosec Articles – April 2018

We are thankful that so many companies and individual researchers take the time to publish articles about the latest threats. And when they share IOCs, it's even better! We've put together some of...
Infosec Articles (10/01/2018- 10/14/2018)

Infosec Articles (10/2/2018 – 10/15/2018)

Infosec articles we found in the first half of October 2018. We have included an article on what to do after a breach. Learn about malicious code can that be used to create a cryptominer, about the GPlayed trojan that poses as Google Play, and more. 

credit card fraud

Infosec Articles – May 2018

A selection of our favorite infosec articles from May 2018. Cryptocurrency-mining makes its regularly scheduled appearance, and for some 'fun' reading, check out the SecureList article "History of...
DNS

Why choose Malware Patrol over a free DNS protection service?

Customers and prospects have approached us recently with questions similar to this: why should we choose Malware Patrol instead of a free DNS protection service? The question is fair, especially in...

Infosec Articles (11/28/18 – 12/4/18)

Our handpicked selection of the most recent infosec articles, with a new use for IOT printers topping the list of creative efforts. To demonstrate their effectiveness, the printer advertising has...
L0rdix malware

Infosec Articles (11/21/2018 – 11/27/2018)

Our handpicked selection of the most recent infosec articles from around the web. L0rdix malware is available for sale in underground forums and there's JavaScript that can even track when using the...
DDoS attacks

DDoS Reflection and Amplification Attacks

Reflection and amplification are mechanisms commonly used in DDoS attacks. These simple and very effective techniques gained popularity around 2013. They take advantage of publicly accessible UDP...
RPZ - DNS

RPZ – DNS Firewall Configuration Guide

BIND is the world’s most used DNS server and can be configured as a DNS Firewall using RPZ zone files (RPZ - DNS). Response Policy Zone (RPZ) enables DNS administrators to...
#onpatrol4malware

Accessing threat data on AWS S3 buckets

Malware Patrol provides some of its threat data feeds via AWS/Amazon S3 buckets. Among the feeds are the "Malware Samples (Binaries)" and the "Bitcoin Transactions (JSON format)". Amazon...
kraken

Infosec Articles (10/29/2018 – 11/12/2018)

Our handpicked selection of the most recent infosec articles from the first half of November 2018. SamSam and Kraken ransomware make headlines, along with an appearance by Emotet with new email...
email security

Be Smart – 419 Nigerian Email Scams

Nigerian Email Scams Malware Patrol's spam traps and honeypots capture messages and malicious URLs from all sorts of email scams and spam. One of the most well known is called the 419 or...

Infosec Articles (9/4/18 – 9/16/18)

A few of our favorite infosec articles from the past few weeks. Learn about Android botnet “Black Rose Lucy” and about the“BlueBorne” bluetooth exploit. Read how the Necurs Botnet, DarkHydrus and other threat actors are turning to inconspicuous files to peddle malspam.

Infosec Articles (8/1/18 – 8/13/18)

A couple of updates on the Emotet trojan are among the highlights of our selected infosec articles from August 2018. Other important information includes Russian cyber attacks targeting U.S....
remote access Trojan

Infosec Articles (11/13/2018 – 11/20/2018)

Our selection of recent infosec articles from around the web. Remote access Trojans abound and new TP-Link router vulnerabilities (should) serve as a reminder for all of us to check our own...
pfsense logo

pfSense Configuration Guide

pfSense software is a free, open source customized distribution of FreeBSD specifically tailored for use as a firewall and router that is entirely managed via web interface. In addition to being a...
Best Practice

Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating...
DNS sinkholes

DNS Sinkholes Detect and Protect. Discovering What’s Inside Them Can Be the Key to Security.

Bots don’t sleep, ransomware finds new ways to infiltrate systems and yesterday’s defenses may be ineffective tomorrow. Cybersecurity requires vigilance. But vigilance alone won’t...