INTELLIGENT THREAT DATA
Malware | Ransomware | DDoS | Cryptocurrencies
We are a team of threat data experts based in the USA and Brazil. Our history is one of community spirit and dedication to internet security that began in 2005 when a group began sharing malicious links through a simple mailing list.
Over a decade of collecting, analyzing, and sharing data has allowed us to develop an extensive network of sensors, sharing agreements, and community contributors, the result of which is our vast database of unique and historically rich – “intelligent” – threat data.
Malware Patrol’s indicators of compromise (IOCs) are now used by thousands to protect networks and assets in more than 175 countries.
To respect the time and resource limitations faced by information security professionals, automated systems verify each IOC in our lists every day to ensure that our feeds contain only active threats. To maximize our data’s coverage, we are continually updating the technology we use to scour the Internet for the latest malicious campaigns.
Commercial Threat Data
Enterprise – A wide range of IOCs for security enterprises and researchers: malware samples, malicious IPs, C2s, cryptomining sites, newly registered domains and more. For those with specific data or ingestion requirements, we can fully customize feed contents and formats at no additional cost. Request a FREE evaluation.
Business Protect – A package of feeds designed with the needs of small to medium sized security businesses – such as MSSPs and ISPs – in mind. The data offered helps protect your customers and their networks against malware infections, the transmission of compromised data, and communications with botnets and command and control (C2s) servers. Request a FREE evaluation.
Non-Commercial Block Lists
Our malware block lists are available in a variety of formats, compatible with the most popular filters, firewalls, and proxy systems. The data is strictly for personal or non-commercial use, such as home computers and the internal networks of businesses and educational organizations. It cannot be used to protect external customers or as part of any commercial security products or services.
Free Guard – Completely free, updated every 72 hours and contains malware URLs detected in the last 7 days.
Basic Defense – Features monthly and annual subscription options, updated every 4 hours, and includes malware URLs detected in the last 15 days.
Visit our non-commercial services page for more information, including the available feed formats for each subscription type.
Why do companies choose Malware Patrol?
Dedicated & Accessible Support
There’s no calling 800 numbers to reach the next available agent. Commercial customers have dedicated support reps familiar with their specific needs and technological environments to efficiently help implement and support the most effective protection mechanisms.
Focused, Real-Time Protection
Feeds are updated EVERY HOUR and customers have unlimited data downloads. The constant verification also means that only actionable threats are in our feeds. Our customers save time and resources by avoiding the ingestion and categorization of “possible threats”.
Easy to Ingest
The contents or format of Enterprise data feeds can be customized to make the ingestion process as easy and reliable as possible. For our other services, we offer feeds and lists formatted for compatibility with the most common security platforms and software.
Maximum Threat Visibility
Customers are protected from the latest malicious campaigns thanks to the large number and variety of ingestion points. Geographically diverse honeypots, spam pots, and network sensors, along with collaboration agreements and continuous threat research maximize our data’s coverage.
How big are your threat data gaps?
See for yourself.
From the Blog
Read a few interesting CyberSecurity news articles from the past few weeks, including an update on a rootkit named CEIDPageLock being distributed by the RIG Exploit kit, Mozilla’s plan to distrust TLS certificates issued by Symantec, new MacOS malware, and more.
A few of our favorite infosec articles from the past few weeks. Learn about Android botnet “Black Rose Lucy” and about the“BlueBorne” bluetooth exploit. Read how the Necurs Botnet, DarkHydrus and other threat actors are turning to inconspicuous files to peddle malspam.