+1.813.321.0987

INTELLIGENT THREAT DATA

Malware | Ransomware | DDoS | Crypto | Phish

Malware Patrol

We are a team of threat data experts based in the USA and Brazil. Our history is one of community spirit and dedication to internet security that began in 2005 when a group started sharing malicious links using a simple mailing list.

Collecting, analyzing, and sharing data for over a decade has allowed us to develop an extensive network of sensors, sharing agreements, and community contributors, the result of which is our vast database of unique and historically rich – “intelligent” – threat data. Today our data is derived from over 60 sources, both public and proprietary, and we use our own custom algorithms to identify bad domains, IP addresses and networks.

Malware Patrol’s indicators of compromise (IOCs) are now used by thousands to protect networks and assets in more than 175 countries.

To respect the time and resource limitations faced by information security professionals, automated systems verify each IOC in our lists every day to ensure that our feeds contain only active threats. To maximize our data’s coverage, we are continually updating the technology we use to scour the Internet for the latest malicious campaigns.

We offer commercial and non-commercial versions of our data.

 

What kind of threat data user are you?

Security Enterprise

You resell or integrate IOCs into your threat intelligence/security products. Or, you need custom data or samples for research.

Security Service Provider

MSSP, ISP, or the like, you use threat data to provide network security management services to your customers.

Non-Commercial

You use threat data strictly for the protection of your own computer or your company’s internal network and end users.

Commercial Threat Data

Enterprise Threat Data Feeds

We offer a wide range of IOC feeds for security enterprises and researchers available for individual purchase: malware samples, malicious IPs, C2s, cryptomining sites, newly registered domains and more. For those with specific data or ingestion requirements, we can fully customize feed contents and formats at no additional cost. Request a FREE evaluation.
 

Business Protect Data Package

A pre-set package of feeds designed with the needs of small to medium sized security businesses – MSSPs and ISPs – in mind. The data offered helps protect your customers and their networks against malware infections, the transmission of compromised data, and communications with botnets and command and control (C2s) servers. Request a FREE evaluation.
 

Details

Both of these commercial threat data options include an unlimited commercial license for the use and resale of the data, regardless of the number of customers and/or end users.

Visit our commercial services page for more information about our threat data feeds for security companies.

threat data

Non-Commercial Block Lists 

Free Guard

Free block list of malware URLs updated every 72 hours. It contains the entries from our database that have been detected during the last 7 days.
 

Basic Defense

Subscription-based malware URL block list updated every 4 hours. It contains the entries from our database that have been detected during the last 15 days. Monthly and annual payment options are available, along with a 7-day money back guarantee.
 

Details

The malware URL block lists above are available in a variety of formats, compatible with the most popular filters, firewalls, and proxy systems. The data is strictly for personal or non-commercial use, such as home computers and the internal networks of businesses and educational organizations. These lists cannot be used to protect external customers or as part of any commercial security products or services.
 
Visit our non-commercial services page for more information, including the available feed formats for each subscription type.

How big are your threat data gaps?

See for yourself.

Why do companies choose Malware Patrol?

Dedicated & Accessible Support

There’s no calling 800 numbers to reach the next available agent. Commercial customers have an assigned team familiar with their specific needs and technological environments to ensure efficient and accurate implementations and support.

Focused, Real-Time Protection

Our feeds are updated EVERY HOUR and customers have unlimited data downloads. Because our feeds only contain actionable threats, our customers save time and resources by avoiding the ingestion and prioritization of “possible threats.”

Z

Easy to Ingest

The contents or format of Enterprise Data Feeds can be customized to make the ingestion process as easy and reliable as possible. For our other services, we offer feeds and lists formatted for compatibility with the most common security platforms and software.

T

Maximum Threat Visibility

Customers are protected from the latest malicious campaigns thanks to the large number and variety of ingestion points. Geographically diverse honeypots, spam pots, and network sensors, along with collaboration agreements and continuous threat research maximize our data’s coverage.

From the Blog

kraken

Infosec Articles (10/29/2018 – 11/12/2018)

Our handpicked selection of the most recent infosec articles from the first half of November 2018. SamSam and Kraken ransomware make headlines, along with an appearance by Emotet with new email...
online privacy

Is Online Privacy the Next Phase of Globalization

Google’s first privacy fine post-GDPR sounds substantial. $57 million could certainly buy a first-class infosec infrastructure for a medium-sized company and keep many payrolls rolling out for years...
mysterybot malware

Infosec Articles – June 2018

We've compiled a few of our favorite recent infosec articles from the best sources in the industry. Keep reading to learn about a decryptor tool for Everbe ransomware, malicious code ADB.miner, and...
Infosec Articles (10/01/2018- 10/14/2018)

Infosec Articles (10/2/2018 – 10/15/2018)

Infosec articles we found in the first half of October 2018. We have included an article on what to do after a breach. Learn about malicious code can that be used to create a cryptominer, about the GPlayed trojan that poses as Google Play, and more. 

Infosec Articles (5/13/19 – 5/27/19)

An article from IBM Security about macro malware is one of our favorites from the last couple of weeks. It covers some of the attack vector's history and provides tips for how to detect this kind of...
Linux security

Infosec Articles (1/15/19 – 1/29/19)

Linux security has taken its place among the most pressing security concerns in the industry, as explained in an article by UPI. Emotet evolves and Office documents continue to be infection vectors....
point-of-sale malware

Reputation Jacking: Unknown Threats on Well-Known Sites

Threat actors place malicious content on trusted sites to gain access to user’s devices and spread malware. Instead of an outside attack, they wait for the victim to download software from a trusted source or otherwise insinuate themselves into a normal operation.

C2s

Command and Control Servers: Fundamentals and a Few Details

Few topics in current cybersecurity generate as much press as command and control servers (C2s). They enable the cybercrime that often affects companies and individuals far outside the IT industry.

#onpatrol4malware

Accessing threat data on AWS S3 buckets

Malware Patrol provides some of its threat data feeds via AWS/Amazon S3 buckets. Among the feeds are the "Malware Samples (Binaries)" and the "Bitcoin Transactions (JSON format)". Amazon...

Infosec Articles (9/4/18 – 9/16/18)

A few of our favorite infosec articles from the past few weeks. Learn about Android botnet “Black Rose Lucy” and about the“BlueBorne” bluetooth exploit. Read how the Necurs Botnet, DarkHydrus and other threat actors are turning to inconspicuous files to peddle malspam.

Windows

Infosec Articles (1/30/19 – 2/13/19)

Our top picks for industry articles include a detailed explanation of fileless malware by the folks at Trend Micro. A great reference for those collecting threat data is the piece on Windows file...
malware threats

Synergistic Malware Threats

It’s easy to focus on the different kinds of malware threats. Data exfiltration, phishing, ransomware, Trojans, cryptomining and all the other threat vectors present sufficient challenges to cyber...
phishing

Phishing: The Tide Is Still Coming In

In cybersecurity the familiar is dangerous. Because of this, we must qualify what we “already know” and refresh our knowledge. Without this attention, cracks in the system grow until huge threats...

Infosec Articles (6/28/19 – 7/12/19)

MSPs and CSPs have been targeted by attackers in an attempt to access their systems and install ransomware. In other news, Android applications are taking more permissions than they are granted. For...
clamAV

Clam AV Software Configuration Guide

“Clam AV is an open source ant-virus engine for detecting trojans, viruses, malware & other malicious threats.” Malware Patrol provides signatures that are compatible with Clam AV software. You...

Phishing’s Next Wave: AI-Enabled Tactics for Attackers and Cybersecurity Pros

Cybercrime steals an estimated $600 billion from the global economy every year. In the next several years we can expect that number to reach well into the trillions. Phishing and spear phishing open...
malware analysis

Infosec Articles (12/5/18 – 12/12/18)

Read our blog for articles from the last week in infosec featuring new tools for malware analysis and identification.

FIDO2

Postpassword Security with FIDO2

Welcome to the dawn of the post-password world. Multifactor authentication orbits it and two-factor authentication is just a short ride away. A new adoption campaign has launched, and it’s bound for...
Malware

Popular Domains Hosting Malware

Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about "popular" and "important" domains being present in our block...
credit card fraud

Infosec Articles – May 2018

A selection of our favorite infosec articles from May 2018. Cryptocurrency-mining makes its regularly scheduled appearance, and for some 'fun' reading, check out the SecureList article "History of...