#ANYRUN's August updates:
π New connectors for Microsoft Sentinel & OpenCTI
π§ SDK upgrade with Linux Debian ARM support
β‘ 2,200+ new detection rules for broader coverage
π See how these upgrades boost detection.
π New connectors for Microsoft Sentinel & OpenCTI
π§ SDK upgrade with Linux Debian ARM support
β‘ 2,200+ new detection rules for broader coverage
π See how these upgrades boost detection.
β€7πΎ3π1
π¨ Salty2FA is a new phishkit linked to Storm-1575. Active since June, it bypasses 2FA methods, giving attackers access beyond stolen creds.
With its unique domain pattern and multi-stage execution chain, it targets finance, energy, telecom and more.
π Read analysis.
With its unique domain pattern and multi-stage execution chain, it targets finance, energy, telecom and more.
π Read analysis.
πΎ7β€3π1
Top 10 last week's threats by uploads π
β¬οΈ #Lumma 746 (796)
β¬οΈ #Xworm 521 (407)
β¬οΈ #Quasar 388 (470)
β¬οΈ #Agenttesla 342 (344)
β¬οΈ #Vidar 282 (260)
β¬οΈ #Remcos 272 (169)
β¬οΈ #Hijackloader 267 (90)
β¬οΈ #Stealc 228 (229)
β¬οΈ #Dcrat 219 (245)
β¬οΈ #Amadey 200 (227)
π Track them all.
#Top10Malware
β¬οΈ #Lumma 746 (796)
β¬οΈ #Xworm 521 (407)
β¬οΈ #Quasar 388 (470)
β¬οΈ #Agenttesla 342 (344)
β¬οΈ #Vidar 282 (260)
β¬οΈ #Remcos 272 (169)
β¬οΈ #Hijackloader 267 (90)
β¬οΈ #Stealc 228 (229)
β¬οΈ #Dcrat 219 (245)
β¬οΈ #Amadey 200 (227)
π Track them all.
#Top10Malware
β€7πΎ2π₯1
π¨ ACR Stealer is a rising MaaS that steals credentials, crypto wallets and business data while evading defenses.
Its distribution has surged in 2025, targeting both enterprises and individuals.
π See how it works and how threat intelligence helps stop it.
Its distribution has surged in 2025, targeting both enterprises and individuals.
π See how it works and how threat intelligence helps stop it.
β€9πΎ2π₯1
π Phishing activity in the past 7 days.
Track latest phishing threats in TI Lookup, now available for free.
Track latest phishing threats in TI Lookup, now available for free.
β€7πΎ3π1
π¨βπ» TI Lookup gives your SOC/DFIR instant access to live threat data and real-world attack context, helping optimize detection and response.
95% of teams already speed up investigations.
π Start for free.
95% of teams already speed up investigations.
π Start for free.
β€7π3πΎ2
π #ANYRUN's TI Feeds now integrate with IBM QRadar SIEM.
Cut MTTR/D, boost KPIs & optimize SOC ROI.
π Achieve stronger security and business results now.
Cut MTTR/D, boost KPIs & optimize SOC ROI.
π Achieve stronger security and business results now.
β€5π5π2πΎ1
Evasive malware tactics bypass traditional defenses π¨
Join our technical webinar where our experts will walk through real-world cases and share practical detection tips.
π September 17 | Live session + Q&A
π Register and bring your team
Join our technical webinar where our experts will walk through real-world cases and share practical detection tips.
π September 17 | Live session + Q&A
π Register and bring your team
β€6π₯3π1
π¨ Fileinfectors Evolved: Spreading Ransomware Across Enterprise Networks
β οΈ Fileinfector malware inserts its code into files. These threats once spread mainly through external drives and local systems. Todayβs file infectors are mostly hybrid variants, frequently combined with ransomware.
These variants encrypt data and inject malicious code into files, enabling further spread when infected files are executed.
βοΈ They are especially dangerous in corporate environments with shared folders, where a single infected file can rapidly spread across the network and cause widespread damage.
Such outbreaks overwhelm security teams, complicate incident response, and disrupt business continuity.
π¨βπ» An optimized SOC that relies on early detection, behavioral analysis, and proactive hunting is critical to limiting impact. Letβs see malware execution on a live system.
π See analysis.
In this case, the malware is interacting with multiple files and modifying their content. The infected files became executables, with PE headers confirming injected malicious code.
The analysis revealed hybrid behavior: a fileinfector acting like ransomware, enabling further spread on execution.
π Use this TI Lookup search query to explore fileinfector activity and enrich IOCs with actionable threat context.
πΎ Gather malware hashes and infected files to power proactive hunting.
Hybrid fileinfectors pose a significant threat to enterprise networks. Leveraging #ANYRUN Sandbox and TI Lookup reduces MTTR by up to 21 minutes per case and gives access to 24x more IOCs from millions of past analyses.
Strengthen resilience and protect critical assets through proactive security with #ANYRUN π #ExploreWithANYRUN
β οΈ Fileinfector malware inserts its code into files. These threats once spread mainly through external drives and local systems. Todayβs file infectors are mostly hybrid variants, frequently combined with ransomware.
These variants encrypt data and inject malicious code into files, enabling further spread when infected files are executed.
βοΈ They are especially dangerous in corporate environments with shared folders, where a single infected file can rapidly spread across the network and cause widespread damage.
Such outbreaks overwhelm security teams, complicate incident response, and disrupt business continuity.
π¨βπ» An optimized SOC that relies on early detection, behavioral analysis, and proactive hunting is critical to limiting impact. Letβs see malware execution on a live system.
π See analysis.
In this case, the malware is interacting with multiple files and modifying their content. The infected files became executables, with PE headers confirming injected malicious code.
The analysis revealed hybrid behavior: a fileinfector acting like ransomware, enabling further spread on execution.
π Use this TI Lookup search query to explore fileinfector activity and enrich IOCs with actionable threat context.
πΎ Gather malware hashes and infected files to power proactive hunting.
Hybrid fileinfectors pose a significant threat to enterprise networks. Leveraging #ANYRUN Sandbox and TI Lookup reduces MTTR by up to 21 minutes per case and gives access to 24x more IOCs from millions of past analyses.
Strengthen resilience and protect critical assets through proactive security with #ANYRUN π #ExploreWithANYRUN
πΎ5β€4π₯1
πΎ 73% of attacks start with phishing, yet SOC teams often miss early signs. IOC enrichment helps detect them earlier and refine detection rules.
π See how context-rich data strengthens proactive defense.
π See how context-rich data strengthens proactive defense.
π₯6β€2πΎ2
Which artifact is hardest to investigate without context?
Anonymous Poll
19%
Domains & URLs
46%
File hashes
19%
IP addresses
38%
TTPs
β€6π¨βπ»2πΎ2
Top 10 last week's threats by uploads π
β¬οΈ #Lumma 969 (726)
β¬οΈ #Quasar 399 (381)
β¬οΈ #Amadey 382 (192)
β¬οΈ #Redline 376 (179)
β¬οΈ #Vidar 365 (275)
β¬οΈ #Agenttesla 291 (336)
β¬οΈ #Remcos 274 (262)
β¬οΈ #Xworm 261 (515)
β¬οΈ #Dcrat 245 (209)
β¬οΈ #Stealc 233 (224)
π Track them all.
#Top10Malware
β¬οΈ #Lumma 969 (726)
β¬οΈ #Quasar 399 (381)
β¬οΈ #Amadey 382 (192)
β¬οΈ #Redline 376 (179)
β¬οΈ #Vidar 365 (275)
β¬οΈ #Agenttesla 291 (336)
β¬οΈ #Remcos 274 (262)
β¬οΈ #Xworm 261 (515)
β¬οΈ #Dcrat 245 (209)
β¬οΈ #Stealc 233 (224)
π Track them all.
#Top10Malware
π₯5β€3πΎ2
π¨ How prepared is your SOC for evasive malware?
Get practical tips in our live technical #webinar on September 17.
Our experts will break down real cases β from #phishing kits and #ClickFix to Living-Off-the-Land attacks β and share detection methods teams can apply right away.
π Save your spot.
Get practical tips in our live technical #webinar on September 17.
Our experts will break down real cases β from #phishing kits and #ClickFix to Living-Off-the-Land attacks β and share detection methods teams can apply right away.
π Save your spot.
β€6π₯3π1