Threat Trends Digest – February 2026

?

Welcome to the Threat Trends Digest, a monthly view of real-world threat patterns.

This report compiles data from the previous month using Malware Patrol’s global telemetry and live attack observations to surface key stats on malware, phishing, ransomware, C2s, and domain generation algorithms (DGAs). You’ll find insights into the most exploited TLDs, frequently seen malware hashes and IPs, and other critical indicators. Use this digest to keep a close pulse on attacker behavior, uncover shifting patterns, and better align your defenses with the latest threat activity.

For more articles, check out our #onpatrol4malware blog.

January Threat Trends
January Threat Trends
January Threat Trends
January Threat Trends
??

IOCs

Top Malicious IPs

74.115.51.9
213.186.33.16
66.147.242.174
104.21.65.87
172.67.189.179
211.97.84.77
198.23.50.111
8.218.200.39
213.186.33.17
149.56.178.73
95.173.180.244
54.83.252.56
67.20.113.17
82.165.181.201
116.196.150.210
169.150.221.147
142.4.17.174
173.231.196.56
64.37.63.18
60.31.192.68

Top Malware Hashes

59ce0baba11893f90527fc951ac69912
8bdd2cdd39b2ad7b679faa50f629ce2b
3849f30b51a5c49e8d1546960cc206c7
eec5c6c219535fba3a0492ea8118b397
a73ddd6ec22462db955439f665cad4e6
ecf47832c60945488d601012e568b663
3a8e23ef4cc9578a00b292323579b4d4
5377e8f2ebdb280216c37a6195da9d6c
fbe51695e97a45dc61967dc3241a37dc
9b6c3518a91d23ed77504b5416bfb5b3
3a9349af006440c7e0da677724551239
d65960b89e28e465691ed757a2fdec2a
9fa84266be8c795dc61dd60fd5c1567c
c210a847989f7e47e7569ce1df92ae9e
724f25e7f93eae0ae54a80142e11b7ef
dbc520ea1518748fec9fcfcf29755c30
0b0212e124390ff12d9c04a483e2334e
ad6a76af945f652961da68bf364cdde1
cbcb58ffe45c202c11bcf2070496aed6
cb41caac2b6d810837618e153dfc3cc5

Top Attacking IPs

176.65.128.158
84.247.147.74
60.251.54.203
23.137.105.55
154.26.139.222
84.247.147.209
161.97.115.157
95.174.113.63
45.153.34.104
45.153.34.106
34.80.38.201
84.247.147.238
161.97.117.226
173.249.17.160
36.102.207.194
82.197.69.32
84.247.147.68
173.249.25.37
207.180.221.87
173.249.29.134

To learn more about how we collect, analyze, and deliver actionable threat intelligence, explore our Threat Intelligence Services. If you’re interested in running your own queries – whether for threat actors, CVEs, infrastructure, or emerging activity – see how our MCP Server helps turn intelligence into practical security insight. Both are designed to support real-world analysis, investigation, and decision-making.

Take advantage of our free threat intel trial.

?

MCP Servers for Cybersecurity

MCP Servers for Cybersecurity: Smarter, Safer, and Ready to Work

The adoption of AI in cybersecurity is accelerating, but both integration and security remain challenges.

While large language models (LLMs) are great at understanding language, they don’t easily connect to structured threat data or existing tools. Prompting alone isn’t enough to make AI useful in the SOC.

That’s where MCP servers come in.

What Is an MCP Server?

MCP stands for Model Context Protocol. It’s an open standard that allows LLMs to interface with tools, APIs, and data sources in a secure, structured way. An MCP server acts as a bridge between a language model and the tools it needs to work with, such as a SIEM, threat intelligence platform, malware sandbox, or internal detection engine.

Instead of encoding instructions into long prompts, an LLM connected to an MCP server can:

  • Discover available tools and documentation
  • Select and call the right tool
  • Pass inputs and receive outputs in structured formats
  • Chain multiple actions for more complex workflows

It effectively gives LLMs real operational capabilities in the cybersecurity space.

How MCP Servers Work

At its core, an MCP server exposes tools in a standardized JSON format. Each tool has metadata, documentation, and security controls. The LLM can inspect available tools and choose which to call based on the user query and system context.

Example:

  1. A user asks, “Find indicators tied to APT29 in the last 90 days.”
  2. The model calls a threat intelligence search function through MCP.
  3. The tool returns matching IOCs from a database.
  4. The LLM interprets and summarizes the results.

The server handles routing, context tracking, and access controls, so the model only works within approved boundaries.

Why MCP Servers Matter in Cybersecurity

For LLMs to be useful in cybersecurity, they must interact with:

  • Threat intelligence platforms
  • Malware analysis tools
  • SIEMs and XDRs
  • Incident response workflows
  • Case management and alerting systems

Public models like ChatGPT or Copilot don’t offer secure access to any of these. MCP servers fill that gap by allowing LLMs to operate inside controlled environments with full traceability.

Real Use Cases for MCP in Security

Security teams are already exploring how MCP servers can:

  • Generate threat actor profiles from live data
  • Run malware samples in sandboxes and summarize behavior
  • Enrich alerts with correlated IOCs
  • Automate triage and investigation flows
  • Generate or validate YARA and Sigma rules

Projects and Tools Using MCP in Cybersecurity

Here are some MCP-related projects and offers currently available in the industry:

Secure-by-Design: What to Look For

As with any tool in cybersecurity, MCP servers should be built securely:

  • Role-based access control
  • Tool-specific authorization
  • Logging and auditing of all calls
  • Input validation
  • Session-aware context isolation
  • Support for on-prem or air-gapped deployment

The Bottom Line

MCP servers make it possible to safely combine the reasoning power of LLMs with real cybersecurity tools. They’re becoming a key part of how AI is being embedded into SOCs, IR platforms, and threat intel systems.

For AI to work in security, it must interact with tools and data in a controlled, auditable way. MCP is the protocol making that possible.

Want to see a real-world example? Check out Malware Patrol’s MCP Server.

?

How big are your threat data gaps?

See for yourself.

?

Introducing the Malware Patrol MCP Server

Introducing the Malware Patrol MCP Server for Cybersecurity Teams

We recently wrote about how MCP servers are unlocking new ways to use AI in cybersecurity. If you missed it, start here to learn what MCP servers are and how they work.

Today, we’re excited to announce the beta launch of our own MCP server, purpose-built for security teams.

Why We Built It

Security professionals need AI that’s more than just a chatbot. The Malware Patrol MCP server connects a custom-trained LLM to structured data, IOCs, and security context, enabling real-world workflows like:

  • Threat actor profiling
  • IOC investigation and correlation
  • Campaign tracking and attribution
  • CVE and malware analysis
  • Infrastructure overlap detection
  • Alert enrichment

What Powers the Malware Patrol MCP Server

Our model has been trained on a curated set of cybersecurity industry content, including:

  • APT and threat group profiles
  • Campaign breakdowns
  • Post-incident investigation reports
  • Security research articles

From this content, we extract structured indicators such as:

  • Threat actor profiles
  • IP addresses
  • File hashes
  • Email addresses used to exfiltrate data and in phishing and other malicious campaigns
  • CVEs abused by threat actors
  • Cryptocurrency wallet addresses

This information is stored and made accessible through our MCP interface. You can query it using natural language.

Sample Questions You Can Ask

  • What are all the known aliases of APT28?
  • What is the timeline of known activity for APT15?
  • Retrieve the latest IOCs associated with APT39.
  • Which threat actors are known to use Cobalt Strike and target retail?
  • Which CVEs are exploited by both APT15 and APT35?
  • Which actor is associated with the hash 7568062ad4b22963f3930205d1a14df7?

These are just a few of the hundreds of supported queries.

Built for Integration and Control

Malware Patrol MCP server supports:

  • Role-based access and authentication
  • Session-aware tool calling
  • Input validation and call logging
  • API integration with internal tools or threat intel platforms

As the system evolves, we will add more tools and workflows based on customer needs and feedback.

Join the Beta Program

AI is powerful. Connected to your tools, your intelligence, and your policies, it becomes operational. We’re offering early access to security teams, MSSPs, and researchers interested in:

  • Using LLMs for real-world threat research
  • Automating investigation workflows
  • Connecting AI to internal tools
  • Helping shape the next generation of cybersecurity copilots

Request beta access here.

?

How big are your threat data gaps?

See for yourself.

?