Malware, Ransomware, C2s, Cryptominers, DGAs, DDoS, and More

The Value of Threat Data

Cyber threats are constantly growing in frequency and complexity. Criminals use intricate and customized tactics, techniques and procedures (TTPs) to bypass even the most trusted security controls.

Security professionals tasked with protecting assets against these malicious actors often rely on indicators of compromise (IOCs) from external sources to improve their team’s threat landscape visibility. According to a recent study conducted by the Ponemon Institute:

  • 78% of respondents rate the importance of threat intelligence in achieving a strong cyber security posture as very high
  • 46% percent of respondents believe commercial data feeds provide more actionable intelligence than free sources.

Malware Patrol offers a wide variety of IOC feeds for commercial and research purposes. Our data provides a highly reliable layer of protection for your customers and networks against malware infections, the transmission of compromised data, sites using cryptomining scripts, as well as communications with botnets and command and control (C2) servers.

For ease of use, our feeds are formatted for compatibility with the most common security platforms and software – no API required – and:

– Allow for UNLIMITED downloads

– Contain over 13 years of historical data

– Each indicator is verified daily

– DNS names are resolved 4-6 times a day

– Newly discovered URLs are processed within an hour.

What kind of threat data user are you?

Security Service Provider

MSSP or ISP, you use threat data to provide security management services to your customers.

Threat Researcher/Analyst

You need data or samples for research purposes.

Security Enterprise

You integrate IOCs into your threat intelligence feeds or security products.

Choose the Right Data for Your Needs 

We offer two commercial data options:

Business Protect Data Feeds are a package of data designed to help small to medium sized businesses, such as MSSPs and ISPs, protect their customers’ networks and end users. The package includes malicious URLs and IP addresses of C2s and DGAs.

Enterprise Data Feeds are feeds for companies that have a mature cyber security model and require more specific threat intelligence and/or customization. These feeds can be purchased separately or in bundles, based on your business needs.