Saturday, February 15, 2025
HomePress ReleaseANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats

ANY.RUN Upgrades Threat Intelligence to Identify Emerging Threats

Published on

SIEM as a Service

Follow Us on Google News

ANY.RUN announced an upgrade to its Threat Intelligence Portal, enhancing its capabilities to identify and analyze emerging cyber threats. This upgrade underscores ANY.RUN’s commitment to providing comprehensive threat intelligence solutions, empowering users to navigate the ever evolving landscape of cyber threats. 

About Threat Intelligence Lookup 

The main page of ANY.RUN TI portal 

Threat Intelligence Lookup is a streamlined platform designed to help users find relevant threat data extracted from ANY.RUN’s extensive database of malware analysis sessions carried out in its interactive sandbox. This tool transforms isolated data into a holistic view of both persistent and emerging threats, offering users insights into malicious activities, suspicious connections, and hidden indicators of compromise. 

Accessible through an intuitive web interface and an API for seamless integration with existing security solutions, TI Lookup allows users to examine various data points including: 

  • Processes 
  • Modules 
  • Files 
  • Network activity 
  • Registry interactions 

This comprehensive approach enables cybersecurity analysts to gain detailed context about attacks, helping them understand the nature, scope, and potential impact of threats. 

Expanded Search Capabilities 

In addition to the enhancements to Threat Intelligence Lookup, ANY.RUN has significantly expanded its search capabilities, now offering over 40 parameters for querying its extensive database. This upgrade allows users to filter searches by file hashes, IP addresses, domain names, and more, facilitating a more targeted and efficient investigation of potential threats. 

How TI Lookup Helps in Investigating Emerging Threats 

ANY.RUN showcased the effectiveness of its TI Lookup feature through a practical use case. By utilizing a single suspicious IP address, users can efficiently identify associated malware.  

Search by the IP address in ANY.RUN TI Lookup 

For instance, investigating the IP address by submitting the query destinationIP : 185.196.9.26 revealed connections to Redline malware, which is used to steal login credentials and other sensitive data. 

The close integration between the ANY.RUN sandbox and Threat Intelligence Lookup allows users to directly access recorded sandbox sessions where the specific IP address was detected. By accessing the sandbox session, users can examine the malware’s actions in a secure environment. 

Analysis of the Redline stealer in the ANY.RUN sandbox 

One of the significant advantages of TI Lookup is its ability to provide immediate insights into threat behavior, collecting crucial data such as Indicators of Compromise IOCs and Tactics, Techniques, and Procedures TTPs. 

With these significant upgrades, ANY.RUN reaffirms its position as a leader in threat intelligence solutions, equipping cybersecurity analysts with the tools necessary to combat emerging threats effectively. 

Users who want to experience ANY.RUN’s enhanced Threat Intelligence portal firsthand can sign up for a 14-day free trial to unlock powerful tools for detecting, analyzing, and combating emerging cyber threats. 

Contact

The ANY.RUN team
ANYRUN FZCO
pr@any.run
+1 657-366-5050

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Fake BSOD Attack Launched via Malicious Python Script

A peculiar malicious Python script has surfaced, employing an unusual and amusing anti-analysis trick...

SocGholish Malware Dropped from Hacked Web Pages using Weaponized ZIP Files

A recent wave of cyberattacks leveraging the SocGholish malware framework has been observed using...

Lazarus Group Targets Developers Worldwide with New Malware Tactic

North Korea's Lazarus Group, a state-sponsored cybercriminal organization, has launched a sophisticated global campaign...

North Korean IT Workers Penetrate Global Firms to Install System Backdoors

In a concerning escalation of cyber threats, North Korean IT operatives have infiltrated global...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Gcore Radar Report Reveals 56% Year-on-year Increase in DDoS Attacks

Gcore, the global provider of edge AI, cloud, network, and security solutions has released...

Michael Trites Joins Aembit as Senior Vice President of Global Sales

Aembit, the non-human identity and access management (IAM) company, today announced that Michael Trites...

SpyCloud Leads the Way in Comprehensive Identity Threat Protection

SpyCloud, a leading identity threat protection company, has unveiled key innovations in its portfolio,...