INTELLIGENT THREAT DATA

Malware | Ransomware | DDoS | Cryptocurrencies

Malware Patrol

We are a team of threat data experts based in the USA and Brazil. Our history is one of community spirit and dedication to internet security that began in 2005 when a small group began sharing malicious links through a simple mailing list.

Malware Patrol’s indicators of compromise (IOCs) are now used by thousands to protect networks and assets in more than 175 countries. Over a decade of collecting, analyzing, and sharing data has allowed us to develop an extensive network of sensors, sharing agreements, and community contributors, the result of which is a vast database of unique and historically rich – intelligent – threat data.

For the benefit of our customers’ limited time and security resources, our automated systems verify the data every day to ensure that it contains only active threats. For the same reason, we are continually updating the technology we use to scour the Internet for the latest malicious campaigns.

We offer commercial and non-commercial versions of our data.

 

threat data

Commercial Threat Data

Enterprise – A wide range of data – malware samples, malicious IPs, C2s, anti-mining, and more – for security researchers and enterprises. For those with specific data and/or ingestion requirements, we can fully customize feed contents and/or formats. Request a FREE evaluation.

Business Protect – A data package with the goal of protecting your customers and networks against malware infections, the transmission of compromised data, and communications with botnets and command and control (C2s) servers. Request a FREE evaluation.

e-Assets – Insight into threats related to your company’s most valuable electronic assets – domains, IP addresses, system access credentials. Request a FREE evaluation.

Non-Commercial Block Lists 

Our malware block lists are available in a variety of formats, compatible with the most popular content filters, firewalls, and proxy systems. The data is strictly for personal or non-commercial use, such as home computers and internal networks. It cannot be used to protect external customers or included in any commercial security products or services.

Free Guard – Completely free, updated every 72 hours.

Basic Defense – Monthly and annual subscription options, updated every 4 hours.

What kind of threat data user are you?

Security Enterprise

You resell or integrate IOCs into your threat intelligence/security products. Or, you need custom internet security data or samples for research.

Service Provider

MSP, MSSP, ISP, or the like, you use threat data to provide network security management services to your customers.

Non-Commercial

You use threat data strictly for the protection of your own computer or your company’s internal network and end users.

Why do companies choose Malware Patrol?

Real-time detection of malicious campaigns

Our experience in detecting, analyzing and monitoring malicious activities dates back to 2005. It is based on data collected from a large number of ingestion points that include honeypots, spampots, collaboration agreements and continuous threat research

Tech support that cares

The team is here to help you use our data to achieve the best results possible. We like to understand our customer’s needs and technological environments to properly help implement effective protection mechanisms

Fully customizable

The feeds can be fully customized to contain the information needed, making the ingestion process as easy and reliable as possible. We strive to minimizing the time and work needed to start using our data

Dependable and accurate

IOCs are constantly verified to guarantee the accuracy of our data. Feeds are updated every hour, so customers are sure to be protected from the latest malicious campaigns

From security experts to security experts

We are a group of experienced information security professionals. We speak your language and are ready to discuss your needs and present the best solutions

Our Blog And Configuration Guides

Best Practice

Spoofed DDoS Attacks and BCP 38

The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts and hide the IP address of the originating...
email security

Be Smart – 419 Nigerian Email Scams

Nigerian Email Scams Malware Patrol's spam traps and honeypots capture messages and malicious URLs from all sorts of email scams and spam. One of the most well known is called the 419 or...
Monero cryptocurrency

Malware Patrol – Protection Against Crypto Mining Abuse

Cryptocurrency mining as a service is a growing website monetization trend, especially popular on gaming and torrent sites, in which a JavaScript code utilizes the visitor's CPU for...
antimalware

Role of DGAs in Malware and Ransomware Campaigns

The vast majority of active malware and ransomware families include some sort of communication with command and control systems (C&Cs). This connection allows them to receive...
mysterybot malware

Infosec Articles – June 2018

We've compiled a few of our favorite recent infosec articles for our blog readers. Keep reading to learn about a decryptor tool for Everbe ransomware, malicious code ADB.miner, and mysterybot...
cryptominer

Infosec Articles – April 2018

We are thankful that so many companies and individual researchers take the time to publish articles about the latest threats. And when they share IOCs, it's even better! We've put together some of...
#onpatrol4malware

Accessing threat data on AWS S3 buckets

Malware Patrol provides some of its threat data feeds via AWS/Amazon S3 buckets. Among the feeds are the "Malware Samples (Binaries)" and the "Bitcoin Transactions (JSON format)". Amazon...
Malware

Popular Domains Hosting Malware

Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about "popular" and "important" domains being present in our block...
clamAV

Clam AV Software Configuration Guide

“Clam AV is an open source ant-virus engine for detecting trojans, viruses, malware & other malicious threats.” Malware Patrol provides signatures that are compatible with Clam AV software. You can...
pfsense logo

pfBlockerNG Configuration Guide

Malware Patrol provides block lists compatible with pfBlockerNG, a package for pfSense version 2.x that allows the usage of custom block list, IP filtering, and country block functionalities. You...
Bind9

BIND9 Configuration Guide

Bind is the world’s most used DNS server. Keep reading to learn how to configure Bind 9. Malware Patrol provides a zone file compatible with Bind 9. Its usage as a DNSBL (DNS black list) denies...
pfsense logo

pfSense Configuration Guide

pfSense software is a free, open source customized distribution of FreeBSD specifically tailored for use as a firewall and router that is entirely managed via web interface. In addition to being a...
new MacOS Malware

Infosec Articles – September 2018

Read a few interesting CyberSecurity news articles from the past few weeks, including an update on a rootkit named CEIDPageLock being distributed by the RIG Exploit kit, Mozilla’s plan to distrust TLS certificates issued by Symantec, new MacOS malware, and more.

DNS

Why choose Malware Patrol over a free DNS protection service?

Customers and prospects have approached us recently with questions similar to this: why should we choose Malware Patrol instead of a free DNS protection service? The question is fair, especially in...

Cisco ASA FirePOWER Configuration Guide

“With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing multiple solutions. This integrated approach...
antivirus protection

Comparing Protection Mechanisms

In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.

RPZ - DNS

RPZ – DNS Firewall Configuration Guide

BIND is the world’s most used DNS server and can be configured as a DNS Firewall using RPZ zone files (RPZ - DNS). Response Policy Zone (RPZ) enables DNS administrators to selectively block name...

Infosec Articles – August 2018

A couple of updates on the Emotet trojan are among the highlights of our selected infosec articles from August 2018. Other important information includes Russian cyber attacks targeting U.S....

Infosec Articles – September 2018

A few of our favorite infosec articles from the past few weeks. Learn about Android botnet “Black Rose Lucy” and about the“BlueBorne” bluetooth exploit. Read how the Necurs Botnet, DarkHydrus and other threat actors are turning to inconspicuous files to peddle malspam.

Exploit Kits

Infosec Articles – July 2018

Our selected infosec articles July 2018 include an Android malware that targets Israeli soldiers through fake Facebook profiles, an updated Trojan that can infect via a cryptor or a miner, a money...

How big are your threat data gaps?

See for yourself.