MALWARE PATROL BLOG
NEWS, CONFIGURATION GUIDES,
RESEARCH AND MORE
STAY CONNECTED
Sign up for our newsletter to receive occasional updates and cybersecurity news.
InfoSec Articles (03/15/2023 – 03/28/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Earth Preta’s Cyberespionage Campaign...
InfoSec Articles (02/28/2023 – 03/15/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "New HiatusRAT Router Malware",...
InfoSec Articles (02/14/2023 – 02/28/2023)
Over the past two weeks, we saw the new blog from TrendMicro presenting "A deep dive into the evolution of ransomware – Part 1". Also more relevant...
InfoSec Articles (02/02/2023 – 02/14/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Researchers Uncover 700+ Malicious Open...
InfoSec Articles (01/16/2023 – 02/02/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Hackers now use Microsoft OneNote...
InfoSec Articles (01/04/2023 – 01/16/2023)
Weekly our experts select relevant news in the cybersecurity industry. Over the last two weeks, we saw the "Abuse of Telegram bots for credential...
InfoSec Articles (12/19/2022 – 01/04/2023)
Over the past two weeks, we saw the "Microsoft research uncovers new Zerobot capabilities" and also, "IcedID Botnet Distributors Abuse Google PPC to...
Finding the Best Threat Intelligence Vendor
Everyone in our line of business wants to be considered the best threat intelligence vendor. The task of gathering and producing...
InfoSec Articles (12/07/2022 – 12/19/2022)
Over the past two weeks, we saw "The Twelve Frauds of Christmas – Payment Diversion Fraud" which is a type of fraud where criminals target an...
InfoSec Articles (11/22/2022 – 12/07/2022)
Over the past two weeks, we selected the cybersecurity highlights such as "Tractors vs. threat actors: How to hack a farm", "ChatGPT shows promise...
New OSINT Feeds: High Risk IPs ‣ Risk Indicators ‣ Tor Exit Nodes
Sharing is CaringTo our industry’s credit, there are many good open source intelligence (OSINT) feeds and data sharing platforms. Even...
InfoSec Articles (11/08/2022 – 11/22/2022)
Over the past two weeks, we saw the ultimate Trojan horses "Containers", the ultimate Trojan horses meant to be immutable. Also, TA542, an actor...
InfoSec Articles (10/25/2022 – 11/08/2022)
Over the past two weeks, we saw Emotet botnet starts blasting malware again after 4 month break. The Emotet malware operation is again spamming...
InfoSec Articles (10/13/2022 – 10/25/2022)
Over the last two weeks we saw the new “Prestige” ransomware that impacts organizations in Ukraine and Poland. Also, Cisco Talos discovered a new...
InfoSec Articles (09/29/2022 – 10/13/2022)
Over the last two weeks, we saw the news article from Cisco Talos, they discovered a new remote access trojan (RAT) called “MagicRAT,” developed and...
InfoSec Articles (09/12/2022 – 09/29/2022)
Over the last two weeks, we saw that while monitoring the Emotet botnet current activity, security researchers found that the Quantum and BlackCat...
InfoSec Articles (08/29/2022 – 09/12/2022)
Over the last two weeks, we saw the new BianLian ransomware gang, used subtle techniques to exploit, enumerate, and move laterally in victim...
Malware Hashes and Hash Functions
An Introduction to Malware Hashes and Hash Functions Malware hashes are found everywhere in our industry. And for a good reason. They...
InfoSec Articles (08/16/2022 – 08/29/2022)
Over the last few weeks the news of hackers build phishing pages using AWS apps. Also find here the threat alert - cloud network bandwidth now...
InfoSec Articles (08/01/2022 – 08/16/2022)
Over the last two weeks, SC Media shared the top three email-based threats, what they have in common and how you can protect your organization....
InfoSec Articles (07/19/2022 – 08/01/2022)
Over the last two weeks, we saw the DUCKTAIL, infostealer Malware that is targeting Facebook Business Accounts. Also, Palo Alto release the new...
InfoSec Articles (07/04/2022 – 07/19/2022)
Over the past two weeks, we saw the news about the infected WordPress site that revealed a malicious C&C script. Also, a new Android malware...
InfoSec Articles (06/20/2022 – 07/04/2022)
Over the last two weeks, we saw that relevant article "Dark Web Price Index 2022" - "As the global health crisis ground on for a second year, many...
MISP Project – A free & robust open source threat intelligence platform
The MISP project is a free open source threat intelligence platform (TIP) that stores, analyzes, and shares information about malware....
InfoSec Articles (06/06/2022 – 06/20/2022)
Over the last two weeks, we saw that a few months back, researchers discovered a new, undetected malware that acts in this parasitic nature...
InfoSec Articles (05/23/2022 – 06/06/2022)
Over the last two weeks, we saw the Clipminer malware gang stole $1.7M by hijacking crypto payments. According to researchers from Symantec, a...
InfoSec Articles (05/09/2022 – 05/23/2022)
Over the past two weeks, we saw The CrowdStrike Falcon OverWatch™ threat hunting team has uncovered a new and highly sophisticated Internet...
InfoSec Articles (04/25/2022 – 05/09/2022)
Over the last two weeks, we saw new LinkedIn scams, where cybercriminals attack when we may be at our most vulnerable – here’s what to look out for...
InfoSec Articles (04/11/2022 – 04/25/2022)
Over the past two weeks, we saw that In February 2022, CISA, FBI, the U.S. CCNMF, the United Kingdom’s NCSC-UK, and NSA released a joint statement...
InfoSec Articles (03/28/2022 – 04/11/2022)
Over the last two weeks, we saw that "from the beginning of 2022, we have dealt with six different strains of wiper malware targeting Ukraine:...
InfoSec Articles (03/15/2022 – 03/28/2022)
Over the last two weeks, we saw that KELA published a report on ransomware operators’ overall trends and movements over 2021. The cybersecurity firm...
InfoSec Articles (02/28/2022 – 03/15/2022)
Over the last couple of weeks we saw On February 24, 2022, Anonymous — a global collective of hackers — announced it was launching a cyber operation...
Threat Intelligence Providers vs Threat Intelligence Platforms
In information security, the ability to predict and adapt to the behaviors of criminals can help organizations improve defense strategies against...
InfoSec Articles (02/14/2022 – 02/28/2022)
Over the past two weeks, we saw that Cyclops Blink appears to be a replacement framework for the VPNFilter malware exposed in 2018, which exploited...
FortiSIEM Configuration Guide
Malware Patrol + FortiSIEMMalware Patrol offers (5) Enterprise* feeds formatted for integration into FortiSIEM. This allows users to combine the...
pfSense Configuration guide
pfSense The pfSense project is a free network firewall distribution, based on the FreeBSD operating system with a custom kernel and it also includes...
InfoSec Articles (02/01/2022 – 02/14/2022)
Over the past two weeks, we saw "FritzFrog", a peer-to-peer (P2P) botnet, which means its command and control server is not limited to a single,...
DNS Sinkholes Detect and Protect
Bots don’t sleep, ransomware finds new ways to infiltrate systems and yesterday’s defenses may be ineffective tomorrow. Cybersecurity...
InfoSec Articles (01/04/2022 – 01/31/2022)
Over the last two weeks, Varonis Threat Labs has observed one such RaaS provider, ALPHV (aka BlackCat ransomware), gaining traction since late 2021,...
InfoSec Articles (01/04/2022 – 01/17/2022)
Over the past two weeks, we saw the operators of the SFile ransomware (aka Escal) have developed a Linux version of their malware to expand their...
InfoSec Articles (12/21/2021 – 01/04/2022)
Over the past two weeks, we saw that AvosLocker is a relatively new ransomware-as-a-service. The Sophos Rapid Response team has so far seen...
InfoSec Articles (12/07/2021 – 12/20/2021)
Over the last two weeks, we saw the ten families of malicious samples are spreading using the Log4j2 vulnerability Now. NetLab published a blog...
InfoSec Articles (11/23/2021 – 12/06/2021)
Over the last 2 weeks we saw A new parasitic malware targets the popular Nginx web server, Sansec discovered. This novel code injects itself into a...
InfoSec Articles (11/8/2021 – 11/22/2021)
Over the past 2 weeks, we observed a QAKBOT operators resumed email spam operations towards the end of September after an almost three-month hiatus....
Avoiding Black Friday Phishing Scams
Black Friday is coming and threat actors are already surfing this wave of retail insanity. Not surprisingly, phishing remains an...
MISP Configuration Guide
MISP is a threat intelligence platform for gathering, sharing, storing, and correlating indicators of compromise of targeted attacks,...
Fortinet Configuration Guide
FortiGate NGFWs deliver industry-leading enterprise security for any edge at any scale with full visibility and threat protection. Organizations can...
InfoSec Articles (10/26/2021 – 11/8/2021)
Over the last two weeks, we observed a new threat referred to as “SQUIRRELWAFFLE” is being spread more widely via spam campaigns, infecting systems...
InfoSec Articles (10/12/21 – 10/25/2021)
Over the past two weeks, we saw New PurpleFox botnet variant uses WebSockets for C2 communication. In addition, since July 2021, malicious cyber...
Mikrotik Router Configuration
Malware Patrol provides a Mikrotik-compatible version of our Malicious Domains and the Tor Exit Nodes data feeds. In this Mikrotik...
What is Ransomware?
Malware Patrol's CEO Andre Correa was recently interviewed by Dana Mantilia from Identity Protection Planning. They discussed the basics - and more...
InfoSec Articles (9/28/21 – 10/11/21)
Malware patrol selected some relevant cybersecurity news over the past 2 weeks. A survey of cyber investigators and antiabuse service providers to...
InfoSec Articles (09/13/21 – 9/27/21)
In the past 2 weeks, CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have released a joint Cybersecurity...
InfoSec Articles (08/30/21 – 09/13/21)
In the first 2 weeks of September, we saw the LockFile is a new ransomware family that emerged in July 2021 following the discovery in April 2021 of...
InfoSec Articles (08/16/21 – 08/30/21)
In the last 2 weeks of August, we saw campaigns use a multitude of infection components to deliver two widely popular commodity malware and remote...
Best Practices to Protect Against Ransomware
Everyone wants to know how to protect against ransomware - 2021 is the year of ransomware! The Colonial Pipeline attack shutdown a major oil...
InfoSec Articles (08/02/21 – 08/16/21)
In this first half of August, we saw that during Cyble’s routine Open-Source Intelligence (OSINT) research, we came across a malware posted by a...
InfoSec Articles (07/19/21 – 08/02/21)
Over the past two weeks, we saw that the Government sanctioned cyber-surveillance is back in the news, following an exposé that reveals how...
Malware Patrol Data Offered in ThreatBlockr Marketplace
Updated on 2022.03.22 - Bandura Cyber now is ThreatBlockr.Press Release St. Petersburg, FL, July 28, 2021 -- Malware Patrol, the...
InfoSec Articles (07/05/21 – 07/19/21)
Over the past 2 weeks, we saw Threat actors behind the infamous TrickBot malware have been linked to a new ransomware strain named “Diavol,”. Also,...
InfoSec Articles (06/21/21 – 07/05/21)
Malware patrol selected some relevant news over the past 2 weeks. Microsoft has confirmed signing a malicious driver being distributed within gaming...
InfoSec Articles (06/07/21 – 06/21/21)
In the last two weeks of June, we saw the Japanese multinational conglomerate Fujifilm said it has refused to pay a ransom demand to the cyber gang...
Three Types of Cyber Threat Intelligence
Cyber Threat Intelligence (CTI) is one of the main pillars of cybersecurity. Although it is not the answer to all problems, CTI is one of the most...
InfoSec Articles (05/24/21 – 06/07/21)
At the end of March and beginning of June, we saw the Evolution of the JSWorm ransomware, the ransomware threat landscape has been gradually...
InfoSec Articles (05/10/21 – 05/24/21)
In the past two weeks of May, we noticed that the whole world is susceptible to cyber-attacks and even banks. Bizarro is another family of banking...
InfoSec Articles (04/26/21 – 05/10/21)
At the end of April and the first week of March, we realized that cyberattacks do not rest, recently the Cybereason Nocturnus team responded to...
InfoSec Articles (04/12/21 – 04/26/21)
In the second half of April, we noticed a growing wave of cyber attacks Microsoft threat analysts have been tracking activity where contact forms...
InfoSec Articles (03/29/21 – 04/12/21)
In this first half of April, we noticed that cyber threats are spreading all over the world and involve major investigations. This new threat, which...
InfoSec Articles (03/15/21 – 03/29/21)
In this second half of March, we observed an interesting email campaign by a threat actor we track as TA800. They distributed a new malware we are...
InfoSec Articles (03/01/21 – 03/15/21)
In the first half of March, we recently observed a new series of Microsoft-themed phishing attacks. Also, with ransomware becoming the most...
InfoSec Articles (02/15/21 – 03/01/21)
In the last two weeks' worth of infosec articles, we saw a lot of writing about APT activities and even a phishing attack method that uses Morse...
InfoSec Articles (01/31/21 – 02/14/21)
Onto the 2nd month of 2021, and we have seen supply-chain attacks, phishing campaigns, botnets, and ransomware such as the HelloKitty ransomware. CD...
InfoSec Articles (01/16/21 – 01/30/21)
On to the end of January and we're seeing banking malware such as Vadokrist and many others. Vadokrist is written in Delphi and has an unusually...
InfoSec Articles (01/01/21 – 01/15/21)
On to a new year, but it's still good to review some malware such as APT37 to help us understand more about cybercrimes. APT37 is associated with an...
InfoSec Articles (12/17/20 – 12/31/20)
On to the last day of the controversial year, cybercrime is still rife, as the attack activities of the Quasar Family. Quasar is an open-source RAT...
InfoSec Articles (12/02/20 – 12/16/20)
A week before Christmas, cryptocurrency mining botnet PGMiner is showing smarter ways to hack into a victim's machine. At its core, PGMiner attempts...
InfoSec Articles (11/17/20 – 12/01/20)
On to the start of the last month of the year and just around Thanksgiving, cyber crimes are still rampant. Even GoDaddy was also a victim of a scam...
InfoSec Articles (11/02/20 – 11/16/20)
Several cases were observed where DLL side-loading was used to execute the malicious code. Side-loading is the use of a malicious DLL spoofing a...
InfoSec Articles (10/18/20 – 11/01/20)
Upon entering the second to the last month of the year, there are a lot of botnets, banking malware, and malware making the news. But one that...
InfoSec Articles (10/03/20 – 10/17/20)
There has been a lot of RATs as well as botnets lately, such as HEH. HEH Botnet is spreading through brute force of the Telnet service on ports...
InfoSec Articles (09/18/20 – 10/02/20)
One of the common malware being reported nowadays is the Remote Access Trojan or RAT, such as the LodaRAT. Written in Autolt, LodaRAT not only have...
InfoSec Articles (09/03/20 – 09/17/20)
With almost everything being done online, cybercriminals were able to develop Baka skimmer to perform their goals. Baka skimmer has a sophisticated...
InfoSec Articles (08/19/20 – 09/02/20)
This batch of the most recent infosec articles from around the web, includes an evolution analysis of Transparent Tribe. In the last four years,...
InfoSec Articles (08/04/20 – 08/18/20)
Lots of malware have been creating cybercrime, but the old Agent Tesla uses new tricks to be able to stay on top. The Agent Tesla RAT has become one...
InfoSec Articles (07/20/20 – 08/03/20)
We have now come into a new month, and this set of InfoSec articles discusses how some specific malware operates. One of these is the Evilnum...
InfoSec Articles (07/05/20 – 07/19/20)
Onto the second half of 2020, and a lot of trojans are actively upping their game to spread banking malware. One of these is Trojan Cerberus which...
InfoSec Articles (06/20/20 – 07/04/20)
The latter half of the year has already begun, and cybercrimes show no signs of stopping. Just like how they're using Cobalt Strike to deploy Anchor...
InfoSec Articles (06/05/20 – 06/19/20)
Ransomware and malware, such as GuLoader, have been very active in campaigns against security. GuLoader is used to deliver malware with the help of...
InfoSec Articles (05/21/20 – 06/04/20)
Half of 2020 is here and malware such as Mylobot, ComRAT, and the likes have also upgraded their game. Mylobot has the ability to download and...
InfoSec Articles (05/06/20 – 05/20/20)
Ransomware has topped this InfoSec articles. One of which is the Netwalker ransomware. This involves malware that is not compiled but written in...
InfoSec Articles (04/21/20 – 05/05/20)
Among the cybercrime known to us, EventBot seems to be a real threat among many users. EventBot is targeting financial applications and steal SMS...
DoH! Not so great to the Enterprise
DoH, or DNS over HTTPS (RFC 8484), is a relatively new protocol that provides increased privacy and security. It does this by encrypting DNS...
InfoSec Articles (04/06/20 – 04/20/20)
xHelper, together with other malware and threat attacks, have added to the concerns of Android users. Read about this threat and more in the latest...
InfoSec Articles (03/22/20 – 04/05/20)
Cyber attacks, phishing, stalkerware, and malware such as Emissary Panda, have been rampant. They're taking advantage of the vulnerabilities in...
InfoSec Articles (03/07/20 – 03/21/20)
A lot of info stealer, malware campaigns, and scams have taken advantage of the COVID-19 pandemic. Coronavirus has posts threat not only in the...
Newly Registered Domains Related to COVID-19
The current outbreak of the COVID-19 created a perfect scenario for all sorts of scammers to monetize through fear, false promises and...
InfoSec Articles (02/21/20 – 03/06/20)
Infodemic is happening now to our world. The leverage of the current physical threat, the CoronaVirus, is being used as a social engineering trick...
InfoSec Articles (02/06/20 – 02/20/20)
The industry saw lot of phishing and smishing in the second month of 2020. Most of this was related to the coronavirus epidemic. Read some of the...
InfoSec Articles (01/22/20 – 02/05/20)
Entering into the second month of the year, there's more information about the various groups that are using the Golden Chicken...
Why Commercial Threat Intelligence Beats OSINT
Picture this: you’re in need of a new suit. You see that your favorite store is giving away designer suits for free and the pictures look fantastic....
InfoSec Articles (01/07/20 – 01/21/20)
Articles from the last couple of weeks reveal news about cyber threats targeting the electric utility industry and hackers boring into the gas...
Threat Intelligence: Essential For Your Cyber Defenses
Cyber risk is growing while confidence in internal defense resilience declining. According to Microsoft’s 2019 Global Cyber Risk Perception Survey,...
InfoSec Articles (12/23/19 – 01/06/20)
Off to an active start in 2020, threat groups are being quite agressive. Read articles about their attacks and several others in our industry...
InfoSec Articles (12/08/19 – 12/22/19)
Just a few weeks into the holiday season and Ryuk ransomware, among others, are making the news. Read articles about this menace and several others...
Infosec Articles (11/23/19 – 12/07/19)
Even with low usage rates, new exploit kits have been found targeting Internet Explorer, says Malwarebytes in their fall report. Secure List's...
Infosec Articles (11/8/19 – 11/22/19)
Ransomware takes the spotlight this time showing up targeting Windows users, production servers and, specifically, drives commonly associated with...
Infosec Articles (10/24/19 – 11/7/19)
Android malware and adware, along with mobile espionage made headlines during the last two weeks. No shortage of variety in malicious behavior,...
Infosec Articles (10/9/19 – 10/23/19)
There's a new Mirai variant and, big surprise, Android applications are taking more permissions than they are granted. For Linux users, there's a...
Infosec Articles (9/24/19 – 10/8/19)
Our selection of the most recent infosec articles from around the web, including write ups about both the Masad and Arcane stealer, all accompanied...
Infosec Articles (9/9/19 – 9/23/19)
Read our hand-picked selection of the latest security articles in which botnets and RATs make frequent appearances. Despite the changes in the...
Infosec Articles (8/25/19 – 9/8/19)
Read some of the most interesting and useful infosec articles from the last two weeks, in particular a couple about the newcomer Nemty ransomware....
Infosec Articles (8/11/19 – 8/24/19)
Our selection of the most recent infosec articles from around the web, including a vulnerability, a malware and a phishing attack all directed at...
Infosec Articles (7/28/19 – 8/10/19)
Our handpicked selection of the most recent infosec articles from around the web, including vulnerabilities found in Siemens and WhatsApp. The ACSC...
Palo Alto MineMeld Configuration Guide
Palo Alto MineMeld is an extensible Threat Intelligence processing framework and the multi-tool of threat indicator feeds. MineMeld can...
Infosec Articles (7/13/19 – 7/27/19)
There's a growing concern over what is thought to be a regrouping of the GandCrab ransomware developers to distribute what is being called “REvil,”...
Infosec Articles (6/28/19 – 7/12/19)
MSPs and CSPs have been targeted by attackers in an attempt to access their systems and install ransomware. In other news, Android applications are...
Infosec Articles (6/13/19 – 6/27/19)
New activity by Silex malware and one that uses InterPlanetary File System’s (IPFS) p2p network made the news over the last couple of weeks. An...
Infosec Articles (5/28/19 – 6/12/19)
Articles from the last couple of weeks reveal interesting new research about a method to fight ransomware by using flash-based storage on devices to...
Infosec Articles (5/13/19 – 5/27/19)
An article from IBM Security about macro malware is one of our favorites from the last couple of weeks. It covers some of the attack vector's...
Infosec Articles (4/29/19 – 5/13/19)
Ransomware has been a hot topic the last couple of weeks. We're seeing its versatility, with distribution techniques spanning server vulnerabilities...
Postpassword Security with FIDO2
Welcome to the dawn of the post-password world. Multifactor authentication orbits it and two-factor authentication is just a short ride away. A new...
Infosec Articles (4/14/19 – 4/28/19)
DNS hijacking is a worrisome threat for all Internet users and seems to be on the rise. There's a new (free) tool from the National Cyber Security...
Synergistic Malware Threats
It’s easy to focus on the different kinds of malware threats. Data exfiltration, phishing, ransomware, Trojans, cryptomining and all the other...
Infosec Articles (3/30/19 – 4/13/19)
Finally, some relief from the Windows updates process that has annoyed users the world over for years! We're seeing new tricks used by old malware...
Tips for Establishing Your Security Program
(And How the Cyber Insurance Industry May Help You for Free) I won’t keep you waiting. Before you get too excited about that free assist from the...
Infosec Articles (3/15/19 – 3/29/19)
The last couple of weeks provided the security community with a wide variety of topics, from an AV Comparatives study on antimalware security apps...
Command and Control Servers: Fundamentals and a Few Details
Few topics in current cybersecurity generate as much press as command and control servers (C2s). They enable the cybercrime that often affects companies and individuals far outside the IT industry.
Whitelisting for Block Lists
Malware Patrol's #1 goal is to protect customers from malware and ransomware infections. These days, this can mean blocking mainstream domains....
Infosec Articles (2/29/19 – 3/14/19)
Over the last couple of weeks we've seen point-of-sale malware making its way to the top of the threats list, at least in terms of headlines and...
Infosec Articles (2/14/19 – 2/28/19)
The second half of February 2019 continued to highlight server vulnerabilities with a Linux ransomware named B0r0nt0K making headlines. There's a...
Is Online Privacy the Next Phase of Globalization
Google’s first privacy fine post-GDPR sounds substantial. $57 million could certainly buy a first-class infosec infrastructure for a medium-sized...
Infosec Articles (1/30/19 – 2/13/19)
Our top picks for industry articles include a detailed explanation of fileless malware by the folks at Trend Micro. A great reference for those...
Phishing’s Next Wave: AI-Enabled Tactics for Attackers and Cybersecurity Pros
Cybercrime steals an estimated $600 billion from the global economy every year. In the next several years we can expect that number to reach well...
Infosec Articles (1/15/19 – 1/29/19)
Linux security has taken its place among the most pressing security concerns in the industry, as explained in an article by UPI. Emotet evolves and...
Phishing: The Tide Is Still Coming In
In cybersecurity the familiar is dangerous. Because of this, we must qualify what we “already know” and refresh our knowledge. Without this...
Infosec Articles (1/1/19 – 1/14/19)
Off to an active start in 2019, cryptocurrency mining malware is topping lists once again. Read articles about this nuisance and several others in...
Reputation Jacking: Unknown Threats on Well-Known Sites
Threat actors place malicious content on trusted sites to gain access to user’s devices and spread malware. Instead of an outside attack, they wait for the victim to download software from a trusted source or otherwise insinuate themselves into a normal operation.
Infosec Articles (12/13/18 – 12/31/18)
During the last couple weeks of the year the infosec industry was abuzz about methods for both building and using malicious Microsoft Office...
Infosec Articles (12/5/18 – 12/12/18)
Read our blog for articles from the last week in infosec featuring new tools for malware analysis and identification.
Infosec Articles (11/28/18 – 12/4/18)
Our handpicked selection of the most recent infosec articles, with a new use for IOT printers topping the list of creative efforts. To demonstrate...
Infosec Articles (11/21/2018 – 11/27/2018)
Our handpicked selection of the most recent infosec articles from around the web. L0rdix malware is available for sale in underground forums and...
Infosec Articles (11/13/2018 – 11/20/2018)
Our selection of recent infosec articles from around the web. Remote access Trojans abound and new TP-Link router vulnerabilities (should) serve as...
Infosec Articles (10/29/2018 – 11/12/2018)
Our handpicked selection of the most recent infosec articles from the first half of November 2018. SamSam and Kraken ransomware make headlines,...
Infosec Articles (10/16/2018 – 10/28/2018)
Read some of the most interesting and useful infosec articles we came across during the last half of October 2018. We have included information on...
Infosec Articles (10/2/2018 – 10/15/2018)
Infosec articles we found in the first half of October 2018. We have included an article on what to do after a breach. Learn about malicious code can that be used to create a cryptominer, about the GPlayed trojan that poses as Google Play, and more.
Infosec Articles (9/17/18 – 10/1/18)
We've put together our bi-weekly compilation of infosec articles from around the security industry. Read updates on botnets like Gafgyt and Virobot....
SpamAssassin Configuration Guide
Malware Patrol provides block lists compatible with SpamAssassin. "Apache SpamAssassin is the #1 Open Source anti-spam platform...
Infosec Articles (9/4/18 – 9/16/18)
A few of our favorite infosec articles from the past few weeks. Learn about Android botnet “Black Rose Lucy” and about the“BlueBorne” bluetooth exploit. Read how the Necurs Botnet, DarkHydrus and other threat actors are turning to inconspicuous files to peddle malspam.
Infosec Articles (8/14/18 – 9/3/18)
Read a few interesting CyberSecurity news articles from the past few weeks, including an update on a rootkit named CEIDPageLock being distributed by the RIG Exploit kit, Mozilla’s plan to distrust TLS certificates issued by Symantec, new MacOS malware, and more.
Infosec Articles (8/1/18 – 8/13/18)
A couple of updates on the Emotet trojan are among the highlights of our selected infosec articles from August 2018. Other important information...
Infosec Articles – July 2018
Our selected infosec articles July 2018 include an Android malware that targets Israeli soldiers through fake Facebook profiles, an updated Trojan...
Infosec Articles – June 2018
We've compiled a few of our favorite recent infosec articles from the best sources in the industry. Keep reading to learn about a decryptor tool for...
Infosec Articles – May 2018
A selection of our favorite infosec articles from May 2018. Cryptocurrency-mining makes its regularly scheduled appearance, and for some 'fun'...
Why choose Malware Patrol over a free DNS protection service?
Customers and prospects have approached us recently with questions similar to this: why should we choose Malware Patrol instead of a free DNS...
Accessing threat data on AWS S3 buckets
Malware Patrol provides some of its threat data feeds via Amazon / AWS S3 buckets. Among the feeds are the "Malware Samples (Binaries)"...
Malware Patrol – Protection Against Crypto Mining Abuse
Cryptocurrency mining as a service is a growing website monetization trend, especially popular on gaming and torrent sites, in which a...
DNS RPZ Firewall Configuration Guide
BIND is the world’s most used DNS server and can be configured as a DNS Firewall using RPZ files (DNS RPZ). Response Policy Zone (RPZ)...
Cisco ASA FirePOWER Configuration Guide
“With Cisco ASA with FirePOWER Services, you consolidate multiple security layers in a single platform, eliminating the cost of buying and managing...
Spoofed DDoS Attacks and BCP 38
The majority of recent DDoS attacks utilize source address spoofing techniques. These spoofed DDos attacks complicate mitigation efforts...
DDoS: What is a Reflection and Amplification Attack?
Updated on 06/13/2022 DDoS - What is it? A distributed denial-of-service (DDoS) attack is a type of cyber attack in which a malicious actor...
Popular Domains Hosting Malware
Malware Patrol has maintained a database of malicious URLs and IOCs since 2005. We often receive emails from our users about "popular"...
Role of DGAs (Domain Generation Algorithms) in Malware and Ransomware Campaigns
The vast majority of active malware and ransomware families include some sort of communication with command and control systems...
pfBlockerNG Configuration Guide
Malware Patrol provides block lists compatible with pfBlockerNG, a package for pfSense version 2.x that allows the usage of custom block...
Comparing Protection Mechanisms
In a market full of products and services that promise to solve the most varied security threats, it is important to put solutions into perspective, understand what they really deliver and never forget that no single vendor can protect from all threats.
Clam AV Software Configuration Guide
“Clam AV is an open source ant-virus engine for detecting trojans, viruses, malware & other malicious threats.” Malware Patrol provides...
Squid3 Web Proxy Configuration Guide
Squid is a proxy for the web that provides extensive access control lists, reduces bandwidth consumption and improves response times by caching and...
BIND9 Configuration Guide
Bind is the world’s most used DNS server. Keep reading to learn how to configure Bind9 to work with Malware Patrol's data. Getting Started Malware...