<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">

<channel>
	<title>ANY.RUN RSS feed</title>
	<atom:link href="https:///feed/" rel="self" type="application/rss+xml"/>
	<link/>
	<description>The latest posts and cybersecurity news</description>
	<lastBuildDate>Wed, 08 Apr 2026 12:03:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>/cybersecurity-blog/wp-content/uploads/2025/10/android-chrome-512x512-1-70x70.png</url>
	<title>ANY.RUN's Cybersecurity Blog</title>
	<link/>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Building Phishing Detection That Works: 3 Steps for CISOs </title>
		<link>/cybersecurity-blog/phishing-detection-steps-for-cisos/</link>
					<comments>/cybersecurity-blog/phishing-detection-steps-for-cisos/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Wed, 08 Apr 2026 11:12:04 +0000</pubDate>
				<category><![CDATA[Cybersecurity Lifehacks]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">/cybersecurity-blog/?p=19856</guid>

					<description><![CDATA[<p>90% of attacks&#160;start with&#160;phishing.&#160;For CISOs, the real&#160;pain begins when the SOC cannot quickly tell whether a suspicious alert is just&#160;noise or the&#160;start of credential theft, account compromise, malware delivery, or wider business disruption.&#160; Modern&#160;phishing&#160;campaigns are designed to create exactly that uncertainty. QR codes, redirect chains, CAPTCHAs,&#160;phishing&#160;kits, and AI-generated lures can all hide the real&#160;objective&#160;until late [&#8230;]</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/phishing-detection-steps-for-cisos/">Building Phishing Detection That Works: 3 Steps for CISOs </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>90% of attacks&nbsp;start with&nbsp;<a href="https://any.run/phishing/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktophishing" target="_blank" rel="noreferrer noopener">phishing</a>.&nbsp;For CISOs, the real&nbsp;pain begins when the SOC cannot quickly tell whether a suspicious alert is just&nbsp;noise or the&nbsp;start of credential theft, account compromise, malware delivery, or wider business disruption.&nbsp;</p>



<p>Modern&nbsp;phishing&nbsp;campaigns are designed to create exactly that uncertainty. QR codes, redirect chains, CAPTCHAs,&nbsp;phishing&nbsp;kits, and AI-generated lures can all hide the real&nbsp;objective&nbsp;until late in the attack flow.&nbsp;&nbsp;</p>



<p>So what does phishing detection that actually works look like for a modern SOC or <a href="https://any.run/mssp/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktomssplanding" target="_blank" rel="noreferrer noopener">MSSP</a>? Let’s find out. </p>



<h2 class="wp-block-heading">Why Modern&nbsp;Phishing&nbsp;Still Breaks SOC Workflows&nbsp;</h2>



<p>Phishing&nbsp;is&nbsp;still one of the most&nbsp;common ways attackers get into organizations, but the threat no longer follows a simple pattern.&nbsp;<a href="https://any.run/cybersecurity-blog/enterprise-phishing-analysis/" target="_blank" rel="noreferrer noopener">Modern&nbsp;phishing</a>&nbsp;campaigns are built to hide their real&nbsp;intent, delay validation, and make investigation harder for already overloaded security teams.&nbsp;</p>



<p>What makes today’s&nbsp;phishing&nbsp;especially disruptive is the mix of techniques now used in a single campaign. Security teams are no longer dealing with one suspicious email and one malicious link. They are dealing with layered attack flows that may include:&nbsp;</p>



<ul class="wp-block-list">
<li>redirect chains that hide the real&nbsp;destination&nbsp;</li>



<li><a href="https://any.run/cybersecurity-blog/qr-extractor/" target="_blank" rel="noreferrer noopener">QR codes</a>&nbsp;that bypass traditional inspection&nbsp;</li>



<li>CAPTCHAs that slow or block analysis</li>



<li>Phishing-as-a-Service kits that make advanced attacks&nbsp;easier to launch&nbsp;&nbsp;</li>



<li>AI-generated lures and deepfake content that make&nbsp;phishing&nbsp;more convincing&nbsp;</li>
</ul>



<p>This combination puts much more pressure on SOC workflows.&nbsp;The challenge is understanding what&nbsp;actually happens&nbsp;next and&nbsp;doing it fast&nbsp;enough to reduce business risk.&nbsp;</p>



<p>The numbers reflect this&nbsp;shift. 20% of&nbsp;phishing&nbsp;campaigns hide links in QR codes, while <a href="https://any.run/malware-trends/tycoon/" target="_blank" rel="noreferrer noopener">Tycoon2FA</a> attacks increased by 25% between Q1 and Q3 2025. Gartner also found that 62% of companies experienced a deepfake attack in 2025. Together, these trends show that&nbsp;phishing&nbsp;is more adaptive, more evasive, and more difficult to investigate&nbsp;quickly.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img fetchpriority="high" decoding="async" width="1024" height="484" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-06.33.37-1024x484.png" alt="Numbers proving the danger of modern phishing attacks" class="wp-image-19866" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-06.33.37-1024x484.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-06.33.37-300x142.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-06.33.37-768x363.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-06.33.37-1536x725.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-06.33.37-2048x967.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-06.33.37-370x175.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-06.33.37-270x127.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-06.33.37-740x349.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Numbers proving the&nbsp;danger&nbsp;of modern&nbsp;phishing&nbsp;attacks</em></figcaption></figure></div>


<p>For SOC teams, this creates a dangerous workflow gap. An alert may show that something&nbsp;looks suspicious, but it often does not reveal whether credentials are being harvested, whether MFA is being bypassed, whether malware is delivered after the&nbsp;phishing&nbsp;stage, or how far the attack could spread if it succeeds.&nbsp;That&nbsp;<strong>lack of visibility</strong>&nbsp;is where delays begin.&nbsp;</p>



<p>When visibility breaks down, the workflow usually breaks down with it:&nbsp;</p>



<ul class="wp-block-list">
<li>triage takes longer&nbsp;</li>



<li>confidence in&nbsp;decisions&nbsp;drops&nbsp;</li>



<li>more cases are escalated&nbsp;</li>



<li>response slows at the exact moment speed matters most&nbsp;</li>
</ul>



<p>To make&nbsp;phishing&nbsp;detection work, CISOs need an approach that helps the SOC spot threats sooner, understand their impact&nbsp;earlier, and&nbsp;contain&nbsp;them before they escalate.&nbsp;</p>



<h2 class="wp-block-heading">Step 1: Strengthen Monitoring with Fresh Phishing Intelligence</h2>



<p>The first step is making sure the SOC can see phishing activity early enough to act on it. If malicious domains, URLs, or campaign indicators surface too late, the team starts every investigation from behind.</p>



<p>Strong monitoring is not just about collecting more alerts. It is about improving what the SOC sees first and giving teams a better chance to catch phishing before it spreads further. The more current and relevant the intelligence is, the easier it becomes to recognize real threats early and prioritize them correctly.</p>



<p>This is where the quality and scale of threat data make a real difference. ANY.RUN’s <a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">phishing intelligence</a> is built on first-hand investigations of active campaigns observed across <strong>15,000 organizations</strong> and used by more than <strong>600,000 security professionals worldwide</strong>. That gives teams access to <a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">fresh phishing indicators</a> grounded in real attack activity, not just static or generic reputation data.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" width="1024" height="464" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-10.08.13-1024x464.png" alt="TI Feeds delivering actionable IOCs into your existing stack" class="wp-image-19865" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-10.08.13-1024x464.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-10.08.13-300x136.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-10.08.13-768x348.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-10.08.13-1536x697.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-10.08.13-2048x929.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-10.08.13-370x168.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-10.08.13-270x122.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-10.08.13-740x336.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>TI Feeds delivering actionable IOCs&nbsp;into your existing&nbsp;stack</em></figcaption></figure></div>


<p>With this kind of monitoring in place, SOC teams can:&nbsp;</p>



<ul class="wp-block-list">
<li>spot malicious URLs, domains, and payloads&nbsp;earlier&nbsp;</li>



<li>improve coverage across emerging&nbsp;phishing&nbsp;campaigns&nbsp;</li>



<li>enrich detections with context tied to real&nbsp;investigations&nbsp;</li>



<li>prioritize alerts faster and with more confidence&nbsp;</li>
</ul>



<p>A&nbsp;stronger monitoring layer gives the SOC a much better&nbsp;starting point. And when&nbsp;phishing&nbsp;is detected&nbsp;earlier, every&nbsp;step that follows becomes more effective.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">99% unique </span> threat intel for your SOC
<br>Catch threats early. Act with <span class="highlight">clear evidence.</span>
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=phishing-detection-steps-for-CISOs&#038;utm_term=080426&#038;utm_content=linktotifeedslanding#contact-sales" rel="noopener" target="_blank">
Power your SOC now
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Step 2:&nbsp;Improve&nbsp;Triage with&nbsp;Full&nbsp;Attack-Chain&nbsp;Visibility&nbsp;</h2>



<p>Early detection is only the&nbsp;starting point. Once a&nbsp;phishing&nbsp;alert reaches the SOC, the next challenge is figuring out what the attack is&nbsp;actually doing&nbsp;and whether it creates&nbsp;real&nbsp;business&nbsp;risk.&nbsp;</p>



<p>This is where triage often slows down. A suspicious URL or attachment may trigger an alert, but that alone does not show whether the campaign leads to credential theft,&nbsp;MFA&nbsp;bypass, malware delivery, or a broader account takeover attempt. Without that visibility, teams spend more time&nbsp;validating&nbsp;the threat,&nbsp;confidence in verdicts drops, and more cases are escalated than necessary.&nbsp;</p>



<p>Strong&nbsp;phishing&nbsp;triage should help teams&nbsp;quickly answer a few critical questions:&nbsp;</p>



<ul class="wp-block-list">
<li>Where does the attack flow&nbsp;actually lead?&nbsp;</li>



<li>Is the user being pushed to a fake login page?&nbsp;</li>



<li>Are credentials or session tokens being&nbsp;stolen?&nbsp;</li>



<li>Does the&nbsp;phishing&nbsp;stage end in malware delivery?&nbsp;</li>
</ul>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>&nbsp;helps close this gap with Interactive&nbsp;Sandbox&nbsp;analysis that exposes the full&nbsp;phishing&nbsp;chain in a safe environment. Teams can detonate suspicious URLs and files, follow redirects, open attachments, scan QR codes, and inspect CAPTCHA-protected flows to see how the attack behaves in practice. </p>



<p>Instead of relying on assumptions, they can validate the threat based on what actually happens. Analysts can also interact with the environment at any time, which makes it easier to investigate suspicious behavior manually when a deeper look is needed.</p>



<p>See how a real quishing attack can be analyzed inside ANY.RUN’s <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a> in seconds:</p>



<figure class="wp-block-video aligncenter"><video controls src="https://files.any.run/images/phishing_analysis.mp4"></video><figcaption class="wp-element-caption"><em>Quishing attack analyzed inside ANY.RUN sandbox</em></figcaption></figure>



<p>This process becomes even faster with <a href="https://any.run/cybersecurity-blog/automated-interactivity-stage-two/" target="_blank" rel="noreferrer noopener">Automated Interactivity</a>. By imitating analyst behavior inside the sandbox, it can interact with phishing pages automatically, uncover hidden links behind QR codes, solve CAPTCHAs, and continue the analysis flow without waiting for manual input. That helps teams move through evasive phishing stages faster and reach the real malicious behavior sooner.</p>



<p><a href="https://app.any.run/tasks/84ce3c25-b524-4189-8b0e-23ce5203616d/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Check&nbsp;sandbox&nbsp;analysis with Automated Interactivity</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" width="1024" height="639" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-12.03.58-1024x639.png" alt="Multi-stage phishing attack " class="wp-image-19871" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-12.03.58-1024x639.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-12.03.58-300x187.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-12.03.58-768x479.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-12.03.58-1536x959.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-12.03.58-2048x1278.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-12.03.58-370x231.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-12.03.58-270x168.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-12.03.58-740x462.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Multi-stage phishing attack discovered inside ANY.RUN sandbox</em></figcaption></figure></div>


<p>Stronger triage reduces&nbsp;uncertainty,&nbsp;cuts wasted effort and helps teams reach conclusions faster. That means fewer unnecessary escalations, quicker containment, and less chance for&nbsp;phishing&nbsp;incidents to grow into broader operational or&nbsp;financial impact.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight"> Reduce </span> the risk of delayed detection
<br>Help your team <span class="highlight">investigate faster</span>  and respond earlier
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=phishing-detection-steps-for-CISOs&#038;utm_term=080426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Power up your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Step 3: Speed Up Response with Clear&nbsp;Verdicts and Actionable Evidence&nbsp;</h2>



<p>Phishing&nbsp;detection does not end when the SOC confirms that something&nbsp;looks suspicious. The next challenge is turning that analysis into fast, confident&nbsp;response.&nbsp;</p>



<p>This is where many&nbsp;workflows&nbsp;still slow down. Even after a&nbsp;phishing&nbsp;attack has been investigated, teams often need to manually collect indicators, document what happened, map&nbsp;behavior&nbsp;to known techniques, and prepare findings for escalation or response. That extra effort creates delays at exactly the moment when speed matters most.&nbsp;</p>



<p>A strong response workflow should give teams what they need to act without friction:</p>



<ul class="wp-block-list">
<li>a clear&nbsp;verdict on the threat&nbsp;</li>



<li><a href="https://any.run/cybersecurity-blog/enrich-iocs-with-threat-intelligence/" target="_blank" rel="noreferrer noopener">extracted IOCs</a>&nbsp;for blocking and investigation&nbsp;</li>



<li>mapped TTPs for faster understanding&nbsp;</li>



<li>structured reports for escalation and handoff&nbsp;</li>



<li>evidence that helps response teams move with confidence&nbsp;</li>
</ul>



<p>ANY.RUN helps speed up this stage by turning phishing analysis into decision-ready outputs. Teams can see how the attack unfolds across redirects, phishing pages, credential theft attempts, and payload delivery, often reaching a verdict within the<strong> first 60 seconds</strong>. Clear verdicts, extracted IOCs, <a href="https://any.run/cybersecurity-blog/malware-ttps-explained/" target="_blank" rel="noreferrer noopener">mapped TTPs</a>, visual behavior details, and <a href="https://any.run/cybersecurity-blog/malware-analysis-report/" target="_blank" rel="noreferrer noopener">auto-generated reports</a> make incidents easier to understand and faster to contain.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="504" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-09.45.43-1024x504.png" alt="Auto-generated report for faster response" class="wp-image-19874" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-09.45.43-1024x504.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-09.45.43-300x148.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-09.45.43-768x378.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-09.45.43-1536x756.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-09.45.43-2048x1008.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-09.45.43-370x182.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-09.45.43-270x133.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-08-at-09.45.43-740x364.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Auto-generated report for faster response</em></figcaption></figure></div>


<p>For CISOs, the real benefit is a faster path from investigation to containment. It helps teams&nbsp;contain&nbsp;phishing&nbsp;incidents sooner, make more consistent decisions under pressure, and reduce the time attackers&nbsp;have to&nbsp;turn a&nbsp;phishing&nbsp;attempt into credential theft, fraud, or wider business disruption.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight"> 64% </span> of Fortune 500 companies rely on ANY.RUN 
<br>to strengthen their <span class="highlight">SOC operations</span> 
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=phishing-detection-steps-for-CISOs&#038;utm_term=080426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate into your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">What SOC Teams Gain from&nbsp;Stronger&nbsp;Phishing&nbsp;Detection&nbsp;</h2>



<p>When SOC teams improve monitoring, sharpen triage, and speed up response, phishing becomes much harder to turn into a larger incident. Stronger phishing detection helps teams identify suspicious activity sooner, understand it more quickly, and act with greater confidence when time matters most.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="725" src="/cybersecurity-blog/wp-content/uploads/2026/04/How-ANYRUN-Powers-Phishing-Detection-2-1024x725.png" alt="SOC Teams Gain from Stronger Phishing Detection " class="wp-image-19877" style="width:650px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/How-ANYRUN-Powers-Phishing-Detection-2-1024x725.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/How-ANYRUN-Powers-Phishing-Detection-2-300x213.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/How-ANYRUN-Powers-Phishing-Detection-2-768x544.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/How-ANYRUN-Powers-Phishing-Detection-2-1536x1088.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/How-ANYRUN-Powers-Phishing-Detection-2-2048x1451.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/04/How-ANYRUN-Powers-Phishing-Detection-2-370x262.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/How-ANYRUN-Powers-Phishing-Detection-2-270x191.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/How-ANYRUN-Powers-Phishing-Detection-2-740x524.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Mains steps for stronger phishing detection with ANY.RUN</em></figcaption></figure></div>


<p>This approach drives measurable improvements across day-to-day SOC operations:&nbsp;</p>



<ul class="wp-block-list">
<li>36% higher detection rate&nbsp;</li>



<li>up to 58% more threats detected&nbsp;</li>



<li>21 minutes faster MTTR per incident&nbsp;</li>



<li>up to 20% lower Tier 1 workload&nbsp;</li>



<li>30% fewer Tier 1 to Tier 2 escalations&nbsp;</li>
</ul>



<p>The value goes beyond the numbers. Better&nbsp;phishing&nbsp;detection helps reduce alert fatigue by making suspicious activity easier to assess.&nbsp;It also helps Tier 1 handle more cases with confidence instead of pushing unclear investigations further down the workflow.&nbsp;</p>



<!-- Highlight Block HTML START -->
<div class="window">
  <div class="window-header">
    <div class="pill"><img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f4ca.png" alt="📊" class="wp-smiley" style="height: 1em; max-height: 1em;" />Key Outcomes for CISOs:</div>
  </div>
  <div class="window-body">
    <ul>
      <li><b>Lower breach risk</b> through earlier detection and more informed response</li>
      <li><b>Reduce the cost of phishing incidents</b> by containing threats faster </li>
      <li><b>Ease alert fatigue</b> with faster clarity on suspicious activity </li>
<li><b>Improve SOC efficiency</b> with quicker, better-informed decisions</li>
<li><b>Reduce Tier 1 workload</b> by helping front-line teams close more cases sooner </li>
<li><b>Improve consistency </b> in phishing investigations and response workflow</li>
<li><b>Avoid hardware costs</b> by using cloud-based analysis </li>
<li><b>Scale operations more easily</b> as phishing volume grows</li>
<li><b>Get more value from existing teams</b> without adding the same operational burden</li>
<li><b>Reduce the likelihood of wider business disruption</b> by stopping phishing earlier </li>
    </ul>
  </div>
</div>
<!-- Highlight Block HTML END -->


<!-- Highlight Block CSS START -->
<style>
  .window {
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);

    border-radius: 4px;
    margin: 20px auto 50px auto;
    padding: 20px 40px;
    line-height: 2rem;
  }

  .window-header {
    display: flex;
    justify-content: center;
    margin-bottom: 20px;
  }

  .pill {
    background-color: #fff;
    border-radius: 20px;
    color: #333;
    font-weight: bold;
    padding: 8px 32px;
border: 1px solid rgba(75, 174, 227, 0.32);
  }

  @media (max-width: 480px) {
    .window {
      padding: 10px;
    }
    
    .pill {
      font-size: 14px;
      padding: 6px 12px;
    }
  }
</style>
<!-- Highlight Block CSS END -->



<p>Phishing&nbsp;is often the first&nbsp;step in account compromise, fraud, malware delivery, and wider business disruption. When SOC teams can detect it&nbsp;earlier and respond faster, the organization is in a much&nbsp;stronger position to&nbsp;stop the attack before the damage spreads.&nbsp;</p>



<h2 class="wp-block-heading">About&nbsp;ANY.RUN&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps organizations detect, investigate, and respond to modern phishing attacks with greater speed and clarity.</p>



<p>By combining <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, <a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Lookup</a>, and <a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>, ANY.RUN gives SOC and MSSP teams the tools to spot phishing activity sooner, investigate threats more effectively, and respond with structured findings. Its approach helps security teams expose full attack chains, investigate evasive phishing techniques, and make more confident decisions under pressure.</p>



<p>Trusted by more than&nbsp;<strong>15,000 organizations</strong>&nbsp;and&nbsp;<strong>600,000 security professionals worldwide</strong>, including&nbsp;<strong>74% of Fortune 100 companies</strong>,&nbsp;ANY.RUN&nbsp;is built to support modern security operations with faster threat visibility,&nbsp;stronger investigation workflows, and more informed response. The company&nbsp;is&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener"><strong>SOC 2 Type II certified</strong></a>, reflecting its focus on&nbsp;strong security controls and customer data protection.&nbsp;</p>



<p><a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=phishing-detection-steps-for-CISOs&amp;utm_term=080426&amp;utm_content=linktoenterprise#contact-sales" target="_blank" rel="noreferrer noopener">Integrate&nbsp;ANY.RUN’s solution for Tier 1/2/3 in your organization →</a>&nbsp;</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/phishing-detection-steps-for-cisos/">Building Phishing Detection That Works: 3 Steps for CISOs </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/cybersecurity-blog/phishing-detection-steps-for-cisos/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ClickFix Meets AI: A Multi-Platform Attack Targeting macOS in the Wild</title>
		<link>/cybersecurity-blog/macos-clickfix-amos-attack/</link>
					<comments>/cybersecurity-blog/macos-clickfix-amos-attack/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Tue, 07 Apr 2026 10:50:07 +0000</pubDate>
				<category><![CDATA[Cybersecurity Lifehacks]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[ClickFix]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[macOS]]></category>
		<category><![CDATA[malware analysis]]></category>
		<category><![CDATA[malware behavior]]></category>
		<category><![CDATA[malware sandbox]]></category>
		<guid isPermaLink="false">/cybersecurity-blog/?p=19822</guid>

					<description><![CDATA[<p>For years, macOS environments carried an aura of relative safety. Not immunity, but lower priority in the threat landscape. That&#160;perception&#160;has aged about as well as an unpatched server.&#160;&#160;The reality in 2026 is&#160;very different. Apple devices now make up a significant share of corporate endpoints.&#160;And they sit in the hands of the people attackers most want [&#8230;]</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/macos-clickfix-amos-attack/">ClickFix Meets AI: A Multi-Platform Attack Targeting macOS in the Wild</a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>For years, macOS environments carried an aura of relative safety. Not immunity, but lower priority in the threat landscape. That&nbsp;perception&nbsp;has aged about as well as an unpatched server.&nbsp;<br>&nbsp;<br>The reality in 2026 is&nbsp;very different. Apple devices now make up a significant share of corporate endpoints.&nbsp;And they sit in the hands of the people attackers most want to reach. Engineers, product leads, finance teams, and the C-suite are&nbsp;disproportionately&nbsp;Mac users. They have access to source code repositories, financial systems, privileged cloud credentials, and sensitive business data.&nbsp;</p>



<h2 class="wp-block-heading">Key Takeaways&nbsp;</h2>



<ul class="wp-block-list">
<li><strong>macOS is no longer a low-risk environment</strong>. Engineering, product, and executive teams are disproportionately Mac users with privileged access, making them high-value targets.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>A single compromised Mac can be an enterprise-wide&nbsp;breach&nbsp;entry point</strong>. Stolen session tokens, Keychain credentials, and SaaS cookies harvested from one device can grant attackers persistent access to cloud environments and internal systems without triggering authentication alerts.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>The&nbsp;ClickFix&nbsp;technique has evolved</strong>. Attackers&nbsp;now&nbsp;mimic&nbsp;and abuse&nbsp;legitimate AI platforms like Claude Code&nbsp;and Grok, exploiting the trust employees&nbsp;place&nbsp;in these tools to bypass traditional security controls entirely.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Automated sandboxes miss macOS threats by design</strong>. Without interactive analysis, the execution paths are never&nbsp;triggered,&nbsp;and the threat goes undetected.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener"><strong>ANY.RUN&#8217;s macOS sandbox</strong></a><strong>&nbsp;closes a years-long visibility gap</strong>. Security teams can now investigate Apple-targeted threats inside the same unified workflow used for Windows, Linux, and Android —&nbsp;eliminating&nbsp;the context-switching and tooling fragmentation that slows incident response.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Why macOS Threat Analysis Now Belongs in Your Security Stack&nbsp;</h2>



<p>Static or automated scanners often miss the full picture because many macOS threats stay dormant until a user enters a password, approves a dialog, or interacts with the system. This creates dangerous visibility gaps, longer dwell times, and slower incident response in mixed Windows/macOS environments.&nbsp;</p>



<p><a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive sandbox analysis</a>&nbsp;lets&nbsp;security teams safely detonate suspicious files or URLs,&nbsp;observe&nbsp;real-time behavior, and simulate genuine user actions,&nbsp;revealing&nbsp;hidden intent, data exfiltration paths, and attacker capabilities that would otherwise remain invisible.&nbsp;</p>



<ul class="wp-block-list">
<li><a href="https://moonlock.com/2025-macos-threat-report" target="_blank" rel="noreferrer noopener">Moonlock’s&nbsp;Mac Security Survey</a>&nbsp;2025 found that 66% of Mac users have&nbsp;encountered&nbsp;at least one cyber threat within the past year.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Over 80 countries affected by major Mac stealer malware campaigns.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>A 67% increase in registered macOS backdoor variants in 2025.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">The Use Case: A macOS&nbsp;ClickFix&nbsp;Campaign Targeting AI Users&nbsp;</h2>



<p>ANY.RUN recently uncovered a sophisticated macOS-specific&nbsp;ClickFix&nbsp;campaign aimed squarely at users of popular AI development tools&nbsp;—&nbsp;including Claude Code, Grok, n8n,&nbsp;NotebookLM, Gemini CLI,&nbsp;OpenClaw, and Cursor.&nbsp;</p>



<p><a href="https://app.any.run/tasks/74f5000d-aa91-4745-9fc7-fdd95549874b/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Observe the attack chain in a live sandbox session</a>&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="577" src="/cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_1-1024x577.png" alt="" class="wp-image-19830" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_1-1024x577.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_1-300x169.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_1-768x433.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_1-370x208.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_1-270x152.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_1-740x417.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_1.png 1507w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Multi-OS&nbsp;attack: malicious terminal commands for&nbsp;various&nbsp;platforms</em></figcaption></figure>



<p>Attackers bought Google ads that redirected victims to convincing fake documentation pages mimicking legitimate AI platforms (Claude Code in this case). Once there, a&nbsp;<a href="https://any.run/cybersecurity-blog/click-fix-attacks-eric-parker-analysis/" target="_blank" rel="noreferrer noopener">ClickFix-style</a>&nbsp;social engineering prompt tricked users into running a terminal command.&nbsp;&nbsp;</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="493" height="317" src="/cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_2.png" alt="" class="wp-image-19831" style="width:650px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_2.png 493w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_2-300x193.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_2-370x238.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_2-270x174.png 270w" sizes="(max-width: 493px) 100vw, 493px" /><figcaption class="wp-element-caption"><em>macOS terminal command downloading the malicious script</em>&nbsp;</figcaption></figure>



<p>This downloaded an obfuscated script that installed the AMOS&nbsp;<a href="https://any.run/malware-trends/stealer/" target="_blank" rel="noreferrer noopener">Stealer</a>&nbsp;malware.&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="405" height="599" src="/cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_3.png" alt="" class="wp-image-19833" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_3.png 405w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_3-203x300.png 203w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_3-370x547.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_3-270x399.png 270w" sizes="(max-width: 405px) 100vw, 405px" /><figcaption class="wp-element-caption"><em>ZIP archive containing the stolen data</em> </figcaption></figure>



<p>AMOS escalated to root privileges, swept browser credentials and session cookies from Chrome, Safari, and Firefox, emptied cryptocurrency wallet applications, harvested saved passwords from the macOS Keychain, collected files from the Desktop, Documents, and Downloads folders, and installed a persistent backdoor that restarted itself within seconds if terminated.&nbsp;&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="559" height="378" src="/cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_4.png" alt="" class="wp-image-19834" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_4.png 559w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_4-300x203.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_4-370x250.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/clickfix_macos_4-270x183.png 270w" sizes="(max-width: 559px) 100vw, 559px" /><figcaption class="wp-element-caption"><em>Backdoor C2 registration request</em> </figcaption></figure>



<p>This backdoor upgraded from basic command polling to a fully interactive reverse shell over WebSocket with PTY support, giving attackers real-time, hands-on control of the compromised Mac. </p>



<p>To validate your detection coverage, research the campaign’s IOCs <a href="https://x.com/anyrun_app/status/2036799877213011999" target="_blank" rel="noreferrer noopener">collected in our X post</a> and subscribe to ANY.RUN via X.  </p>



<h3 class="wp-block-heading">Why This Attack Works&nbsp;</h3>



<p>This campaign&nbsp;represents&nbsp;a fundamental shift in how risk reaches organizations. The delivery mechanism was not a phishing email or a malicious attachment — two threat vectors that corporate security infrastructure is built to intercept. It was a search engine result, a paid advertisement, and a trusted AI interface. Employees were not behaving carelessly; they were using the same research tools they use every day to get work done.&nbsp;</p>



<ul class="wp-block-list">
<li><strong>AI workflows normalize experimentation</strong>: users expect to copy commands, test tools, and troubleshoot issues. The attack blends into that behavior.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>macOS users often&nbsp;operate&nbsp;with elevated trust</strong>: there is still a lingering&nbsp;perception&nbsp;that macOS is less targeted, which lowers suspicion.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Security tools are not built for “user-driven execution”</strong>: when a user intentionally runs a command, many controls interpret it as legitimate activity.&nbsp;</li>
</ul>



<p>In short, the attack&nbsp;doesn’t&nbsp;break the rules. It borrows them.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Close the macOS visibility gap before it becomes a breach<br>Equip your SOC with deeper <span class="highlight">multi-platform threat analysis</span></br>
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=macos_clickfix_amos_attack&#038;utm_term=070426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Request for your team
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">What This Means for Business&nbsp;</h3>



<p>This type of campaign&nbsp;doesn’t&nbsp;rely on technical failure, but on human-process alignment:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Compromise without exploitation</strong>: traditional vulnerability management offers no protection here. The attack path is behavioral.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>High-value users are directly exposed</strong>: the targets of AI tools are often the&nbsp;same&nbsp;people with access to sensitive systems and data.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Detection timelines&nbsp;increase</strong>:&nbsp;without clear malicious signatures,&nbsp;identifying&nbsp;the attack depends on recognizing suspicious behavior patterns.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Incident scope can expand quickly</strong>: once access is&nbsp;established, attackers can pivot into internal systems, especially in loosely governed tool environments.&nbsp;</li>
</ul>



<p>Traditional security tools largely failed to detect this campaign because the initial payload (a shell command pasted from a legitimate website) produced no files, no installer, and no warning dialogs. Understanding and blocking the full attack chain required behavioral analysis in an environment that could replicate what a real macOS user would experience. That is precisely what interactive sandbox analysis provides. </p>



<h2 class="wp-block-heading">ANY.RUN Now Covers the Full Enterprise Attack Surface </h2>



<p>Recognizing that modern enterprises are not single-OS environments, ANY.RUN&nbsp;<a href="https://any.run/cybersecurity-blog/anyrun-macos-sandbox/" target="_blank" rel="noreferrer noopener">has extended</a>&nbsp;its&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>&nbsp;to include macOS virtual machines, now available in beta for Enterprise Suite customers. This brings the platform to four major operating systems&nbsp;(Windows, Linux, Android, and macOS)&nbsp;within a single unified investigation workflow.&nbsp;</p>



<p>When a macOS-specific file surfaces alongside Windows samples in a phishing campaign, analysts no longer need to switch context, stand up separate infrastructure, or route the sample to a different team. Cross-platform campaigns can be&nbsp;investigated as a whole.&nbsp;</p>



<p>Interactive analysis catches what automated tools&nbsp;miss. A critical characteristic of many macOS threats,&nbsp;including the AMOS campaign described above,&nbsp;is that they are designed not to trigger until a user takes a specific action.&nbsp;&nbsp;</p>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>&#8216;s interactive environment allows analysts to replicate genuine user actions during live sandbox execution. The result is that deceptive authentication dialogs, staged execution chains, and social engineering lures become visible and documentable,&nbsp;rather than hidden behind an execution condition the sandbox never triggered.&nbsp;&nbsp;</p>



<p>In one documented analysis of the&nbsp;<a href="https://any.run/malware-trends/miolab/" target="_blank" rel="noreferrer noopener">Miolab</a>&nbsp;Stealer, a macOS-targeting infostealer, the sandbox surfaced the malware&#8217;s fake authentication prompt, the AppleScript routine used to collect files from user directories, and the outbound data transfer via a curl POST request,&nbsp;providing a complete behavioral picture of the attack chain in minutes.&nbsp;</p>



<p>The practical impact of adding macOS to the sandbox workflow is measurable at multiple levels:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Security teams</strong>&nbsp;can now&nbsp;validate&nbsp;suspicious files and URLs targeting Mac endpoints within minutes using behavioral analysis, rather than&nbsp;escalating to&nbsp;manual investigation or accepting the risk of unconfirmed alerts. The reduction in triage time directly compresses Mean Time to Detect and Mean Time to Respond:&nbsp;both metrics that translate directly into&nbsp;breach&nbsp;risk and regulatory exposure.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>For organizations where macOS&nbsp;represents&nbsp;a significant portion&nbsp;of the device&nbsp;fleet&nbsp;</strong>this closes a visibility gap that has existed for years. Attackers have been aware of and exploiting that gap. The tools to close it now exist.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>For MSSPs managing diverse client environments</strong>, the ability to investigate macOS threats within the same platform used for Windows and Linux analysis means consistent SLAs, fewer escalation paths, and the capacity to handle cross-platform incidents without specialized personnel for each OS.&nbsp;</li>
</ul>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Expand your SOC’s cross-platform threat visibility</br>
<span class="highlight">Speed up triage and response </span>across 4 major OS
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=macos_clickfix_amos_attack&#038;utm_term=070426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Contact ANY.RUN
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Conclusion&nbsp;</h2>



<p>The campaign that weaponized AI platforms to deliver credential-stealing malware to macOS users is a clear indicator of where threat actors are investing their development effort. AI services trust, search engine visibility, and macOS endpoints are converging into a high-value attack surface: one that is actively being exploited against enterprises today.&nbsp;</p>



<p>ANY.RUN&#8217;s expansion of its Interactive Sandbox to macOS gives security leaders a direct answer to a question that has grown more urgent with every major Apple-targeted campaign: when a threat targets our Mac users, can we&nbsp;actually see&nbsp;what it does? That answer is&nbsp;now&nbsp;yes.&nbsp;</p>



<p>The capability is available in beta for <a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktoenterprise" target="_blank" rel="noreferrer noopener">Enterprise Suite</a> customers. For organizations running mixed-OS environments — which today means nearly every enterprise — it represents a concrete step toward closing the gap between the threats targeting their users and the tools available to analyze them. </p>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams investigate threats faster and with greater clarity across modern enterprise environments.&nbsp;&nbsp;</p>



<p>It allows teams to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real behavior in an&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>, enrich&nbsp;indicators&nbsp;with immediate context through&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>, and&nbsp;monitor&nbsp;emerging malicious infrastructure using&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>. Together, these capabilities help reduce investigation uncertainty, accelerate triage, and limit unnecessary escalations across the SOC.&nbsp;&nbsp;</p>



<p>ANY.RUN is trusted by thousands of organizations worldwide and meets enterprise security and compliance expectations. It is&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=macos_clickfix_amos_attack&amp;utm_term=070426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certified</a>,&nbsp;demonstrating&nbsp;its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;</p>



<h2 class="wp-block-heading">FAQ&nbsp;</h2>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1775558342679"><strong class="schema-faq-question"><strong>Is macOS really at risk in enterprise environments, or is this overstated?</strong> </strong> <p class="schema-faq-answer">The volume and sophistication of macOS-targeted malware has grown substantially since 2023. Campaigns like the one described in this article are not isolated incidents; they reflect a sustained, commercially organized effort targeting Apple endpoints. </p> </div> <div class="schema-faq-section" id="faq-question-1775558360205"><strong class="schema-faq-question"><strong>Why couldn&#8217;t existing security tools detect the AI-abusing ClickFix campaign?</strong> </strong> <p class="schema-faq-answer">Because the initial infection vector produced nothing that traditional tools are built to flag. Signature-based detection and perimeter controls had nothing to intercept. Only behavioral analysis, observing what happens after that command executes, can surface the full attack chain. </p> </div> <div class="schema-faq-section" id="faq-question-1775558861465"><strong class="schema-faq-question"><strong>What is the difference between interactive and automated sandbox analysis for macOS threats?</strong> </strong> <p class="schema-faq-answer">An automated sandbox executes a sample and records what it does without any user interaction. Many macOS threats are specifically engineered to detect this: they stay dormant, exit cleanly, or display nothing until a user takes a specific action — entering a password, clicking a dialog, or running a terminal command. Interactive analysis allows an analyst to replicate those real user actions inside the sandbox, triggering conditional execution paths that automated tools never reach.  </p> </div> <div class="schema-faq-section" id="faq-question-1775558875544"><strong class="schema-faq-question"><strong>What should organizations do immediately to reduce exposure to this type of attack?</strong> </strong> <p class="schema-faq-answer">Three steps deliver the most immediate risk reduction. First, ensure your SOC has the capability to analyze macOS-specific samples behaviorally — not just flag them as unreviewed. Second, implement user education specifically around AI platform trust: employees need to understand that content appearing on ChatGPT or Grok is not inherently safe, and that no legitimate service will ask them to paste commands into Terminal. Third, treat macOS endpoints with the same endpoint detection, logging, and incident response coverage you apply to Windows systems. Coverage parity is the baseline. </p> </div> <div class="schema-faq-section" id="faq-question-1775558893359"><strong class="schema-faq-question"><strong>Is ANY.RUN&#8217;s macOS sandbox available to all customers?</strong> </strong> <p class="schema-faq-answer">The macOS virtual machine environment is currently available in beta for Enterprise Suite users. Organizations interested in evaluating macOS threat analysis capabilities as part of their existing or planned ANY.RUN deployment should contact the ANY.RUN team directly to discuss access and roadmap. </p> </div> </div>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/macos-clickfix-amos-attack/">ClickFix Meets AI: A Multi-Platform Attack Targeting macOS in the Wild</a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/cybersecurity-blog/macos-clickfix-amos-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>From Reactive to Proactive: 5 Steps to SOC Maturity with Threat Intelligence </title>
		<link>/cybersecurity-blog/soc-maturity-with-threat-intelligence/</link>
					<comments>/cybersecurity-blog/soc-maturity-with-threat-intelligence/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 10:22:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity Lifehacks]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware analysis]]></category>
		<guid isPermaLink="false">/cybersecurity-blog/?p=19766</guid>

					<description><![CDATA[<p>Reaching a&#160;higher&#160;level&#160;of&#160;SOC maturity&#160;takes&#160;better, more consistent decision-making&#160;during malware and phishing investigation.&#160; This requires a shift in how threat intelligence&#160;is used:&#160;not&#160;as a reference point, but as a&#160;core layer in the decision process.&#160; Moving from reactive to confidently proactive security means&#160;establishing&#160;a threat intelligence workflow that: In this model, threat intelligence becomes part of the SOC’s operational fabric.&#160;That’s&#160;what ANY.RUN [&#8230;]</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/soc-maturity-with-threat-intelligence/">From Reactive to Proactive: 5 Steps to SOC Maturity with Threat Intelligence </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Reaching a&nbsp;higher&nbsp;level&nbsp;of&nbsp;SOC maturity&nbsp;takes&nbsp;better, more consistent decision-making&nbsp;during malware and <a href="https://any.run/cybersecurity-blog/how-to-investigate-phishing-attacks/" target="_blank" rel="noreferrer noopener">phishing</a> investigation.&nbsp;</p>



<p>This requires a shift in how threat intelligence&nbsp;is used:&nbsp;not&nbsp;as a reference point, but as a&nbsp;core layer in the decision process.&nbsp;</p>



<p>Moving from reactive to confidently proactive security means&nbsp;establishing&nbsp;a threat intelligence workflow that:</p>



<ul class="wp-block-list">
<li><strong>Solve&nbsp;</strong>key challenges,&nbsp;from alert fatigue to blind spots&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Integrate&nbsp;</strong>across SOC workflows, supporting them&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Deliver&nbsp;</strong>compounding value&nbsp;as a unified system&nbsp;</li>
</ul>



<p>In this model, threat intelligence becomes part of the SOC’s operational fabric.&nbsp;That’s&nbsp;what <a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=soc-maturity-with-threat-intelligence&amp;utm_term=020426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a> Threat Intelligence is designed&nbsp;for.&nbsp;</p>



<p>It&nbsp;becomes&nbsp;a layer inside your SOC’s operations. A layer that provides&nbsp;behavioral&nbsp;context, workflow support, and data delivery for faster triage, incident response, and <a href="https://any.run/cybersecurity-blog/threat-hunting-for-soc-and-mssp/" target="_blank" rel="noreferrer noopener">threat hunting</a>.&nbsp;</p>



<p>Read further to see how it changes each stage of your <a href="https://any.run/cybersecurity-blog/soc-business-success-cases-anyrun/" target="_blank" rel="noreferrer noopener">SOC operations.</a>&nbsp;</p>



<h2 class="wp-block-heading">Key takeaways&nbsp;</h2>



<ul class="wp-block-list">
<li>Threat intelligence must move from data to decisions, as its value is measured by how it improves SOC actions, not how much data it provides.</li>



<li>Context is the differentiator. Linking IOCs to behavior and TTPs is what enables accurate triage and detection.</li>



<li><a href="https://any.run/cybersecurity-blog/streamline-your-soc/" target="_blank" rel="noreferrer noopener">Unified</a> TI drives consistency in SOC teams, embedding intelligence across workflows.</li>



<li>Operationalized TI compounds over time. Every investigation strengthens detection, automation, and future response.</li>



<li>ANY.RUN’s threat intelligence is built on live attack data that provides unique, real-time visibility into emerging threats and supports the full investigation cycle.</li>
</ul>



<h2 class="wp-block-heading">Solving Key SOC&nbsp;Challenges&nbsp;with&nbsp;Behavioral&nbsp;TI&nbsp;</h2>



<p>Most threat intelligence today is still delivered as bare indicator feeds, standalone reports, or enrichment tools with fragmented intelligences that&nbsp;exist&nbsp;outside the core SOC workflow.&nbsp;</p>



<p>In this model, threat intelligence behaves as an input, not as part of the system itself. Indicators without context create noise. Context without operationalization creates friction. As a direct outcome, SOCs struggle with:&nbsp;</p>



<ul class="wp-block-list">
<li>Time-consuming manual enrichment&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Operational bottlenecks across processes&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Detection that gets delayed by the lack of fresh data&nbsp;</li>
</ul>



<p>Human-centered challenges in SOC teams&nbsp;are often not analysts’ fault&nbsp;either.&nbsp;Alert fatigue and unnecessary escalations stem from fragmented, hard-to-access threat data that&nbsp;fails to&nbsp;deliver usable context during investigations.&nbsp;</p>



<p>The&nbsp;path to improvement&nbsp;lies in&nbsp;acquiring&nbsp;actionable&nbsp;threat intelligence&nbsp;that&nbsp;<strong>operationalizes SOC tasks&nbsp;</strong>and&nbsp;<strong>completes the&nbsp;workflow</strong>, supporting the entire&nbsp;investigation cycle.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Reach a higher level of <span class="highlight">SOC maturity</span></br>
Integrate threat intelligence for proactive business security
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/plans-ti/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=soc-maturity-with-threat-intelligence&#038;utm_term=020426&#038;utm_content=linktotipricing#threat-intelligence-april" rel="noopener" target="_blank">
Power your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Threat Intelligence That Offers&nbsp;More than Just Indicators&nbsp;</h2>



<p>What SOC teams&nbsp;require&nbsp;is&nbsp;<strong>actionable&nbsp;</strong>intelligence&nbsp;that&nbsp;supports&nbsp;decisions and execution, enabling&nbsp;analysts&nbsp;to&nbsp;move&nbsp;from enrichment to understanding, and from understanding to detection and rapid response.&nbsp;</p>



<p>Where traditional TI may fail because of its fragmented, add-on nature, actionable&nbsp;threat intelligence&nbsp;encompasses the entire&nbsp;malware and phishing investigation cycle by:&nbsp;</p>



<ul class="wp-block-list">
<li>Connecting&nbsp;indicators to behavior (processes, command lines, network activity, registry changes)&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Providing&nbsp;immediate context for triage decisions&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Translating&nbsp;findings into detections and hunting hypotheses&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Continuously feeding&nbsp;SOC pipelines (SIEM, SOAR, EDR)&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Remaining&nbsp;relevant through real-time, fresh data&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Supporting&nbsp;both automation and analyst-driven workflows&nbsp;</li>
</ul>



<p>This is&nbsp;threat intelligence&nbsp;that&nbsp;doesn&#8217;t&nbsp;exist beside your SOC, but an&nbsp;<strong>essential&nbsp;operational layer</strong>&nbsp;within it&nbsp;that turns repetitive work into a scalable workflow where each detection enhances overall security and proactive protection <a href="https://any.run/cybersecurity-blog/threat-monitoring-ti-feeds/" target="_blank" rel="noreferrer noopener">from similar threats in the future</a>.&nbsp;</p>



<p>A key differentiator of effective threat intelligence is its foundation in live, real-world attack activity.&nbsp;</p>



<p>ANY.RUN Threat Intelligence is built on continuously analyzed data from over 15,000 organizations and 600,000 analysts conducting daily malware and phishing investigations worldwide. This creates a unique, constantly evolving dataset of active threats processed and&nbsp;validated&nbsp;to minimize noise.&nbsp;</p>



    <h3 class="wpdt-c"
        id="wdt-table-title-288"> Operational Impact of Actionable Threat Intelligence   </h3>
<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-288"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="2"
           data-rows="3"
           data-wpID="288"
           data-responsive="0"
           data-has-header="0">

                    <tbody>        <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-bold"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:50%;                    padding:10px;
                    "
                    >
                                        For analysts                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:50%;                    padding:10px;
                    "
                    >
                                         Less manual work, faster understanding of threats, confident decisions during triage and investigation                      </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-bold"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        For SOC leaders                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Improved detection quality, reduced dwell time; consistent, predictable operations across teams                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-bold"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        For CISOs                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Lower risk exposure, better visibility into threats and coverage gaps; stronger confidence in security effectiveness and ROI                      </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-288'>
table#wpdtSimpleTable-288{ table-layout: fixed !important; }
table#wpdtSimpleTable-288 td, table.wpdtSimpleTable288 th { white-space: normal !important; }
</style>




<h2 class="wp-block-heading">ANY.RUN’s&nbsp;TI As an Operational Layer in Your SOC&nbsp;</h2>



<p>ANY.RUN’s approach to&nbsp;behavioral&nbsp;threat&nbsp;intelligence is built around the&nbsp;idea of treating it not as a dataset but as an operational&nbsp;layer&nbsp;that&nbsp;connects&nbsp;context&nbsp;and <a href="https://any.run/cybersecurity-blog/reduce-soc-mttr-with-ti/" target="_blank" rel="noreferrer noopener">action</a> across the SOC lifecycle.&nbsp;</p>



<p>This approach reframes TI from a passive resource into an&nbsp;<strong>active&nbsp;component&nbsp;</strong>of the&nbsp;SOC&nbsp;system&nbsp;that:&nbsp;</p>



<h3 class="wp-block-heading">1.&nbsp;Links&nbsp;Isolated&nbsp;IOCs to malware behavior and TTPs&nbsp;via TI Lookup&nbsp;</h3>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="568" src="/cybersecurity-blog/wp-content/uploads/2026/04/lookup-1024x568.png" alt="" class="wp-image-19772" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/lookup-1024x568.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/lookup-300x166.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/lookup-768x426.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/lookup-370x205.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/lookup-270x150.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/lookup-740x410.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/lookup.png 1337w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>IP identified as Moonrise RAT infrastructure, enriched with linked behavioral analyses and attack context</em>. <em>TI Lookup</em></figcaption></figure></div>


<p>Instead of treating indicators as isolated data points,&nbsp;with&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=soc-maturity-with-threat-intelligence&amp;utm_term=020426&amp;utm_content=linktotilookuplanding">Threat Intelligence Lookup</a> (TI Lookup), a solution for instant enrichment and threat research,&nbsp;analysts&nbsp;immediately&nbsp;see how they behave in real attacks. Any artifact (IP, domain, hash, or URL) is enriched with execution context, infrastructure relationships, and associated TTPs.&nbsp;</p>



<p>This allows&nbsp;teams&nbsp;to move from “what is this?” to “how does this operate?” within seconds, improving triage quality and enabling faster, more confident decisions.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Turn intelligence into action</br>
Make confident decisions with <span class="highlight">ANY.RUN&#8217;s TI</span></p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/plans-ti/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=soc-maturity-with-threat-intelligence&#038;utm_term=020426&#038;utm_content=linktotipricing#threat-intelligence-april" rel="noopener" target="_blank">
Upgrade your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">2.&nbsp;Embeds context directly into triage and response&nbsp;</h3>



<p>Whether through integrations or manual use, threat intelligence from ANY.RUN&nbsp;becomes&nbsp;a part of&nbsp;the SOC&nbsp;investigation cycle&nbsp;that supports&nbsp;early detection and smart decisions.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="577" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-02-at-12.38.01-1024x577.png" alt="" class="wp-image-19773" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-02-at-12.38.01-1024x577.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-02-at-12.38.01-300x169.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-02-at-12.38.01-768x433.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-02-at-12.38.01-1536x866.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-02-at-12.38.01-2048x1155.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-02-at-12.38.01-370x209.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-02-at-12.38.01-270x152.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-04-02-at-12.38.01-740x417.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Integration opportunities for ANY.RUN Threat Intelligence</em>&nbsp;</figcaption></figure></div>


<ul class="wp-block-list">
<li>Threat Intelligence Lookup and <a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=soc-maturity-with-threat-intelligence&amp;utm_term=020426&amp;utm_content=linktotifeedslanding">Threat Intelligence Feeds</a> are available for integration via connectors or API/SDK.&nbsp;<a href="https://any.run/cybersecurity-blog/all-integrations-and-connectors/" target="_blank" rel="noreferrer noopener">See all integrations</a>&nbsp;</li>
</ul>



<h3 class="wp-block-heading">3.&nbsp;Enables conversion of intelligence into detections&nbsp;via YARA Search&nbsp;</h3>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="550" src="/cybersecurity-blog/wp-content/uploads/2026/04/image7-1024x550.png" alt="" class="wp-image-19784" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/image7-1024x550.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/image7-300x161.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/image7-768x412.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/image7-1536x824.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/image7-370x199.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/image7-270x145.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/image7-740x397.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/image7.png 1623w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>YARA Search accumulating artifacts and sandbox analyses&nbsp;</em>&nbsp;</figcaption></figure></div>


<p>Threat intelligence becomes&nbsp;particularly&nbsp;valuable when it&nbsp;directly&nbsp;translates into detections. YARA Search&nbsp;enables that by helping analysts test, refine,&nbsp;validate, and create&nbsp;YARA rules&nbsp;to&nbsp;ensure&nbsp;coverage of relevant&nbsp;threats&nbsp;with reduced false positives.&nbsp;</p>



<p>The result is more reliable detections&nbsp;and greater confidence in security controls.&nbsp;</p>



<h3 class="wp-block-heading">4.&nbsp;Delivers continuous, real-time intelligence streams&nbsp;via TI Feeds&nbsp;</h3>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="468" src="/cybersecurity-blog/wp-content/uploads/2026/04/monitoring_feeds1-1024x468.png" alt="" class="wp-image-19785" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/monitoring_feeds1-1024x468.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/monitoring_feeds1-300x137.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/monitoring_feeds1-768x351.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/monitoring_feeds1-370x169.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/monitoring_feeds1-270x123.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/monitoring_feeds1-740x338.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/monitoring_feeds1.png 1465w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>TI</em>&nbsp;<em>Feeds streamline operations with 99% unique threat data</em>&nbsp;</figcaption></figure></div>


<p><a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=soc-maturity-with-threat-intelligence&amp;utm_term=020426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a> are&nbsp;continuously delivered into existing security pipelines rather than accessed on demand, and that’s how&nbsp;real-time, validated indicators&nbsp;sourced from&nbsp;live attack data&nbsp;flow directly into SIEM, SOAR, and EDR systems, supporting automated detection, correlation, and response.&nbsp;</p>



<p>This reduces manual workload, improves alert quality, and&nbsp;lowers dwell time.&nbsp;</p>



<h3 class="wp-block-heading">5.&nbsp;Fills visibility&nbsp;gaps with TI Reports&nbsp;</h3>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="503" src="/cybersecurity-blog/wp-content/uploads/2026/04/image9-1-1024x503.png" alt="" class="wp-image-19774" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/image9-1-1024x503.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/image9-1-300x147.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/image9-1-768x377.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/image9-1-1536x755.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/image9-1-370x182.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/image9-1-270x133.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/image9-1-740x364.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/image9-1.png 1801w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>TI Reports, a module of ANY.RUN&#8217;s Threat Intelligence</em></figcaption></figure></div>


<p><a href="https://any.run/cybersecurity-blog/threat-intelligence-reports/">ANY.RUN TI Reports</a> address the partial visibility challenge in SOC teams by providing threat overviews curated by our experts, turning analyst-driven insights into&nbsp;strategic intelligence with&nbsp;threat behaviors, TTPs, and detection opportunities already described&nbsp;and contextualized.&nbsp;</p>



<p>This enables teams to quickly understand emerging risks,&nbsp;validate&nbsp;their coverage, and&nbsp;identify&nbsp;blind spots without investing&nbsp;additional&nbsp;investigation time.&nbsp;</p>



<h2 class="wp-block-heading">Threat Intelligence Across&nbsp;Processes and Outcomes&nbsp;</h2>



<p>ANY.RUN Threat Intelligence’s goal is not to improve a single step, but to encompass the entire operational cycle.&nbsp;</p>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-289"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="5"
           data-wpID="289"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:33.333333333333%;                    padding:10px;
                    "
                    >
                                        SOC Process                     </th>
                                                <th class="wpdt-cell wpdt-bold"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:33.333333333333%;                    padding:10px;
                    "
                    >
                                        ANY.RUN’s Threat Intelligence Action                     </th>
                                                <th class="wpdt-cell wpdt-bold"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:33.333333333333%;                    padding:10px;
                    "
                    >
                                        Outcomes                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Triage and Alert Enrichment                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                         Centralized validation of indicators with immediate context and prioritization; scalability for teams of any size and secure integration                       </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Faster triage, reduced manual enrichment, fewer unnecessary escalations, improved MTTR and FP rate                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Threat Hunting & Detection Engineering                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Behavior-driven search with access to real attack data and analyses; supports conversion of findings into detections                      </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Proactive threat discovery, stronger and more consistent detections, elimination of repetitive work                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Incident Response                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Immediate access to unified threat context across incidents, enabling consistent investigation and decision-making                      </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Faster response, reduced dwell time, lower operational risk                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        SOC Management & Performance                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Continuous, real-time intelligence aligned with current threats; visibility into threat landscape and coverage gaps                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="C5"
                    data-col-index="2"
                    data-row-index="4"
                    style="                    padding:10px;
                    "
                    >
                                        Improved MTTD/MTTR,measurable SOC performance, clearer ROI, and risk reduction                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-289'>
table#wpdtSimpleTable-289{ table-layout: fixed !important; }
table#wpdtSimpleTable-289 td, table.wpdtSimpleTable289 th { white-space: normal !important; }
</style>




<h2 class="wp-block-heading">Conclusion&nbsp;</h2>



<p>High-performing SOCs are defined by how effectively threat intelligence is integrated into their operations.&nbsp;</p>



<p>When threat intelligence components&nbsp;operate&nbsp;as a unified system rather than isolated capabilities, they stop being tools and become part of the SOC’s operational infrastructure.&nbsp;</p>



<p>In this model, Threat Intelligence is:&nbsp;</p>



<ul class="wp-block-list">
<li>a unified, behavior-driven intelligence layer;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>a continuous link from indicators to behavior and from detection to automation;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>a real-time stream of relevant, active threat data;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>embedded across triage, incident response, threat hunting, detection, and management.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=soc-maturity-with-threat-intelligence&amp;utm_term=020426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a> provides <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=soc-maturity-with-threat-intelligence&amp;utm_term=020426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">interactive malware analysis</a> and behavior-driven <a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=soc-maturity-with-threat-intelligence&amp;utm_term=020426&amp;utm_content=linktotilookuplanding">threat intelligence </a>solutions designed to support real-world SOC operations. The platform enables security teams to understand threats faster, make informed decisions, and operationalize intelligence across detection and response workflows.</p>



<p>Used by over 15,000 organizations and 600,000 security professionals worldwide, ANY.RUN delivers continuously updated intelligence based on live attack analysis. The company is <a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certified</a>, ensuring strong security controls and protection of customer data.</p>



<h2 class="wp-block-heading">FAQ</h2>



<div class="schema-faq wp-block-yoast-faq-block"><div class="schema-faq-section" id="faq-question-1775123038453"><strong class="schema-faq-question"><strong>What is ANY.RUN Threat Intelligence?</strong><br/></strong> <p class="schema-faq-answer">ANY.RUN Threat Intelligence features TI Lookup, TI Feeds, TI Reports, and YARA Search as a unified, behavior-driven intelligence layer that connects indicators with malware behavior, TTPs, and artifacts—supporting decision-making across SOC workflows.</p> </div> <div class="schema-faq-section" id="faq-question-1775123046738"><strong class="schema-faq-question"><strong>How is it different from traditional threat intelligence?</strong><br/></strong> <p class="schema-faq-answer">Traditional feeds primarily deliver indicators. ANY.RUN&#8217;s TI provides context, behavioral analysis, and enables conversion into detections, while continuously integrating into SOC processes.</p> </div> <div class="schema-faq-section" id="faq-question-1775123062275"><strong class="schema-faq-question"><strong>What data is it based on?</strong><br/></strong> <p class="schema-faq-answer">It is built on real-time analysis data from over 15,000 organizations and 600,000 analysts conducting malware and phishing investigations worldwide.</p> </div> <div class="schema-faq-section" id="faq-question-1775123069106"><strong class="schema-faq-question"><strong>How does it improve SOC operations?</strong><br/></strong> <p class="schema-faq-answer">By reducing manual enrichment, accelerating triage and response, improving detection quality, and enabling more consistent, data-driven decisions.</p> </div> <div class="schema-faq-section" id="faq-question-1775123075587"><strong class="schema-faq-question"><strong>Does it support both m</strong>anual<strong> and a</strong>utomated workflows<strong>?</strong><br/></strong> <p class="schema-faq-answer">Yes. It is designed to be used both manually by analysts and automatically via integrations with SIEM, SOAR, EDR, and other platforms.</p> </div> <div class="schema-faq-section" id="faq-question-1775123083087"><strong class="schema-faq-question"><strong>How does it help reduce risk?</strong><br/></strong> <p class="schema-faq-answer">By providing early visibility into emerging threats, improving detection coverage, and shortening the time between threat emergence and response.</p> </div> </div>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/soc-maturity-with-threat-intelligence/">From Reactive to Proactive: 5 Steps to SOC Maturity with Threat Intelligence </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/cybersecurity-blog/soc-maturity-with-threat-intelligence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Major Cyber Attacks in March 2026: OAuth Phishing, SVG Smuggling, Magecart, and More </title>
		<link>/cybersecurity-blog/major-cyber-attacks-march-2026/</link>
					<comments>/cybersecurity-blog/major-cyber-attacks-march-2026/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Wed, 01 Apr 2026 12:08:31 +0000</pubDate>
				<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[malware analysis]]></category>
		<category><![CDATA[malware behavior]]></category>
		<guid isPermaLink="false">/cybersecurity-blog/?p=19709</guid>

					<description><![CDATA[<p>March 2026 brought a wave of cyber attacks that reflected how quickly modern threats can move from subtle early signals to serious business impact. ANY.RUN analysts identified and explored several major threats this month, exposing phishing campaigns, stealthy malware, payment-skimming activity, and resilient botnet infrastructure affecting organizations across industries. From Microsoft 365 token abuse and [&#8230;]</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/major-cyber-attacks-march-2026/">Major Cyber Attacks in March 2026: OAuth Phishing, SVG Smuggling, Magecart, and More </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>March 2026 brought a wave of cyber attacks that reflected how quickly modern threats can move from subtle early signals to serious business impact. <a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a> analysts identified and explored several major threats this month, exposing phishing campaigns, stealthy malware, payment-skimming activity, and resilient botnet infrastructure affecting organizations across industries.</p>



<p>From Microsoft 365 token abuse and registry-hidden RAT delivery to card theft, macOS backdoor activity, and multi-vector DDoS operations, the threat landscape in March showed how much harder early detection has become for security teams.</p>



<h2 class="wp-block-heading">Key Business Risks That Stood Out in March Attacks&nbsp;</h2>



<ul class="wp-block-list">
<li>Trusted services and normal-looking workflows were repeatedly used to hide malicious activity, increasing the risk of delayed detection across enterprise email, cloud, payment, and endpoint environments.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Attacks&nbsp;observed&nbsp;in March affected industries including&nbsp;<strong>government,&nbsp;</strong><a href="https://any.run/by-industry/finance/" target="_blank" rel="noreferrer noopener"><strong>finance</strong></a><strong>, healthcare, technology, education, manufacturing, and energy</strong>, with risks extending beyond&nbsp;initial&nbsp;access into&nbsp;token abuse, remote access, card theft, and broader malware deployment.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Stealthy, multi-stage delivery methods made early&nbsp;signals weaker and investigations slower, raising the likelihood of escalation before security teams could confirm malicious behavior.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>For organizations, the business impact was not limited to infection alone, but included&nbsp;<strong>fraud, downtime, deeper compromise, and higher operational costs tied to delayed response</strong>.&nbsp;</li>
</ul>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight"> Reduce </span> the risk of delayed detection
<br>Help your team <span class="highlight">investigate faster</span>  and respond earlier
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=major-cyber-attacks-march-2026&#038;utm_term=010426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Power up your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">1.&nbsp;EvilTokens: OAuth Device Code Phishing Enables M365 Account Takeover Without Credential Theft&nbsp;</h2>



<p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7434937055455055872" target="_blank" rel="noreferrer noopener">Post on LinkedIn</a></p>



<p><a href="https://any.run/cybersecurity-blog/oauth-device-code-phishing/" target="_blank" rel="noreferrer noopener">Check detailed breakdown</a>&nbsp;</p>



<p>ANY.RUN analysts&nbsp;observed&nbsp;a sharp rise in&nbsp;<strong>EvilTokens</strong>, a phishing campaign abusing Microsoft’s OAuth Device Code flow, with more than&nbsp;<strong>180 phishing URLs detected in just one week</strong>. Instead of stealing credentials on a fake login page, attackers trick victims into entering a verification code on&nbsp;<strong>microsoft[.]com/devicelogin</strong>, which causes Microsoft to issue OAuth tokens directly to the attacker.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="768" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/04/HCkQkhaWAAAle4c-768x1024.jpeg" alt="" class="wp-image-19722" style="width:408px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/HCkQkhaWAAAle4c-768x1024.jpeg 768w, /cybersecurity-blog/wp-content/uploads/2026/04/HCkQkhaWAAAle4c-225x300.jpeg 225w, /cybersecurity-blog/wp-content/uploads/2026/04/HCkQkhaWAAAle4c-1152x1536.jpeg 1152w, /cybersecurity-blog/wp-content/uploads/2026/04/HCkQkhaWAAAle4c-1536x2048.jpeg 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/HCkQkhaWAAAle4c-370x493.jpeg 370w, /cybersecurity-blog/wp-content/uploads/2026/04/HCkQkhaWAAAle4c-270x360.jpeg 270w, /cybersecurity-blog/wp-content/uploads/2026/04/HCkQkhaWAAAle4c-740x987.jpeg 740w, /cybersecurity-blog/wp-content/uploads/2026/04/HCkQkhaWAAAle4c-scaled.jpeg 1920w" sizes="(max-width: 768px) 100vw, 768px" /><figcaption class="wp-element-caption"><em>Execution chain of&nbsp;EvilTokens</em></figcaption></figure></div>


<p>This makes&nbsp;EvilTokens&nbsp;especially dangerous for organizations relying on traditional phishing detection. The user&nbsp;signs in through a legitimate Microsoft page, completes MFA, and never&nbsp;submits&nbsp;credentials to the phishing site. As a result, the compromise shifts from&nbsp;<strong>password theft to token abuse</strong>, giving attackers access to Microsoft 365 resources while blending into normal authentication activity.&nbsp;</p>



<p>Because the workflow runs over encrypted HTTPS and uses legitimate Microsoft infrastructure, key attack&nbsp;signals are often hidden from security teams. That delays validation, extends investigations, and increases the chance of escalation before analysts can confirm what happened.&nbsp;</p>



<p><a href="https://app.any.run/tasks/885afc1c-b616-46d7-9bc3-81185ee07fe3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">See full attack flow exposed in ANY.RUN Sandbox</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="657" src="/cybersecurity-blog/wp-content/uploads/2026/04/oauth_3-1024x657.png" alt="Fake verification granting access to external client" class="wp-image-19723" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/oauth_3-1024x657.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/oauth_3-300x192.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/oauth_3-768x493.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/oauth_3-370x237.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/oauth_3-270x173.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/oauth_3-740x475.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/oauth_3.png 1384w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Fake verification granting access to external client</em>&nbsp;</figcaption></figure></div>


<p>Inside ANY.RUN Sandbox, automatic&nbsp;<strong>SSL decryption</strong>&nbsp;revealed the hidden JavaScript and backend communication used to orchestrate the phishing flow. In this case, analysts uncovered high-confidence network indicators such as:&nbsp;</p>



<ul class="wp-block-list">
<li>/api/device/start&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>/api/device/status/*&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>X-Antibot-Token&nbsp;</li>
</ul>



<p>When seen in HTTP requests to non-legitimate hosts, these artifacts become strong hunting&nbsp;signals for&nbsp;identifying&nbsp;related phishing infrastructure and improving detection coverage.&nbsp;</p>



<p>To investigate similar activity and&nbsp;validate&nbsp;detection logic, use this&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI&nbsp;Lookup</a>&nbsp;query:&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktotilookup#%7B%22query%22:%22threatName:%5C%22oauth-ms-phish%5C%22%22,%22dateRange%22:7%7D" target="_blank" rel="noreferrer noopener">threatName:&#8221;oauth-ms-phish&#8221;</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="700" src="/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1024x700.png" alt="" class="wp-image-19724" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/imageb-1024x700.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/imageb-300x205.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/imageb-768x525.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/imageb-370x253.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/imageb-270x185.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/imageb-740x506.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/imageb.png 1159w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Targeted industries and countries displayed in TI&nbsp;Lookup</em>&nbsp;</figcaption></figure></div>


<p>TI Lookup helps teams quickly assess the broader attack landscape around EvilTokens and related OAuth phishing activity. Recent submissions show notable targeting across <strong>Technology, Education, Manufacturing, and Government &amp; Administration</strong>, especially in the United States and India, while other regions are also affected.</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Get <span class="highlight">broader visibility</span> into malware and phishing activity
<br>Use <span class="highlight">TI Lookup</span> to track related infrastructure and IOCs
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://app.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=major-cyber-attacks-march-2026&#038;utm_term=010426&#038;utm_content=linktotilookup#register?redirect-ref=intelligence.any.run/analysis/lookup" rel="noopener" target="_blank">
Investigate in TI Lookup
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>This gives SOC teams access to related sandbox analyses, IOCs, and behavioral patterns they can use to strengthen detections and hunting. For CISOs, that means earlier visibility into relevant campaigns, better prioritization of response efforts, and a stronger ability to reduce the business impact of Microsoft 365 account takeover.&nbsp;</p>



<p>IOCs related to this attack:&nbsp;</p>



<ul class="wp-block-list">
<li>singer-bodners-bau-at-s-account[.]workers[.]dev&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>dibafef289[.]workers[.]dev&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>ab-monvoisinproduction-com-s-account[.]workers[.]dev&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>subzero908[.]workers[.]dev&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>sandra-solorzano-duncanfamilyfarms-net-s-account[.]workers[.]dev&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>tyler2miler-proton-me-s-account[.]workers[.]dev&nbsp;</li>
</ul>



<h2 class="wp-block-heading">2.&nbsp;macOS&nbsp;ClickFix&nbsp;Campaign Targets Claude Code Users with AMOS Stealer and Backdoor Access&nbsp;</h2>



<p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7442565604059828224/" target="_blank" rel="noreferrer noopener">Post on LinkedIn</a></p>



<p>ANY.RUN analysts&nbsp;identified&nbsp;a&nbsp;<strong>macOS-specific&nbsp;ClickFix&nbsp;campaign</strong>&nbsp;targeting users of AI tools such as&nbsp;Claude Code, Grok, n8n,&nbsp;NotebookLM, Gemini CLI,&nbsp;OpenClaw, and Cursor. In the observed case, attackers used a redirect from&nbsp;Google Ads&nbsp;to a fake Claude Code documentation page, where a&nbsp;ClickFix&nbsp;flow pushed the victim to run a terminal command that&nbsp;ultimately delivered&nbsp;<strong>AMOS Stealer</strong>.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="570" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.14.06-1024x570.png" alt="Fake Claude Code documentation page used as a lure" class="wp-image-19725" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.14.06-1024x570.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.14.06-300x167.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.14.06-768x428.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.14.06-1536x855.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.14.06-2048x1141.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.14.06-370x206.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.14.06-270x150.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.14.06-740x412.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Fake Claude Code documentation page used as a lure</em></figcaption></figure></div>


<p>Once executed, the infection chain moved beyond credential theft. The malware collected browser data, saved credentials, Keychain contents, and sensitive files, then deployed a backdoor that provided continued access to the infected Mac. This makes the attack more serious than a one-time stealer infection, especially in enterprise environments where&nbsp;macOS&nbsp;systems often hold developer access, internal documentation, and business-critical credentials.&nbsp;</p>



<p>How the attack unfolds:&nbsp;</p>



<ul class="wp-block-list">
<li>Google Ads redirect sends the victim to a fake Claude Code documentation page&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>ClickFix&nbsp;lures the user into running a terminal command&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The command downloads and executes an encoded script&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>AMOS Stealer</strong>&nbsp;collects browser data, saved credentials, Keychain contents, and sensitive files&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>A backdoor is deployed for continued access&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The updated&nbsp;~/.mainhelper&nbsp;module enables an interactive reverse shell over WebSocket with PTY support&nbsp;</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="621" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.22.00-1024x621.png" alt="AMOS Stealer detected by ANY.RUN " class="wp-image-19726" style="width:560px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.22.00-1024x621.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.22.00-300x182.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.22.00-768x465.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.22.00-370x224.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.22.00-270x164.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.22.00-740x448.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.22.00.png 1188w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>AMOS Stealer detected by ANY.RUN</em>&nbsp;</figcaption></figure></div>


<p>A key finding in this case was the evolution of the backdoor module&nbsp;<strong>~/.mainhelper</strong>. Previously described as a more limited implant, the updated variant now supports a fully interactive reverse shell, giving attackers persistent, hands-on access to the infected system in real time.&nbsp;</p>



<p>For defenders, that changes the risk&nbsp;significantly. What starts as a phishing-style&nbsp;ClickFix&nbsp;infection can quickly turn into long-term remote access, data theft, and broader compromise. Multi-stage delivery, obfuscated scripts, and abuse of legitimate&nbsp;macOS&nbsp;components also break visibility into weaker&nbsp;signals, which can slow validation and delay escalation.&nbsp;</p>



<p><a href="https://app.any.run/tasks/74f5000d-aa91-4745-9fc7-fdd95549874b/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener"><strong>See the full&nbsp;macOS&nbsp;ClickFix campaign execution chain</strong></a><strong></strong>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="768" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/04/HEQqsLIXsAAnCXU-768x1024.jpeg" alt="macOS ClickFix campaign details discovered by ANY.RUN" class="wp-image-19727" style="width:514px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/HEQqsLIXsAAnCXU-768x1024.jpeg 768w, /cybersecurity-blog/wp-content/uploads/2026/04/HEQqsLIXsAAnCXU-225x300.jpeg 225w, /cybersecurity-blog/wp-content/uploads/2026/04/HEQqsLIXsAAnCXU-1152x1536.jpeg 1152w, /cybersecurity-blog/wp-content/uploads/2026/04/HEQqsLIXsAAnCXU-1536x2048.jpeg 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/HEQqsLIXsAAnCXU-370x493.jpeg 370w, /cybersecurity-blog/wp-content/uploads/2026/04/HEQqsLIXsAAnCXU-270x360.jpeg 270w, /cybersecurity-blog/wp-content/uploads/2026/04/HEQqsLIXsAAnCXU-740x987.jpeg 740w, /cybersecurity-blog/wp-content/uploads/2026/04/HEQqsLIXsAAnCXU-scaled.jpeg 1920w" sizes="(max-width: 768px) 100vw, 768px" /><figcaption class="wp-element-caption"><em>macOS&nbsp;ClickFix&nbsp;campaign details discovered by ANY.RUN</em></figcaption></figure></div>


<p>ANY.RUN Sandbox helps teams investigate&nbsp;<a href="https://any.run/cybersecurity-blog/anyrun-macos-sandbox/" target="_blank" rel="noreferrer noopener"><strong>macOS</strong></a><strong>, Windows, Linux, and Android</strong>&nbsp;threats with visibility into execution flow, attacker&nbsp;behavior, persistence mechanisms, and dropped artifacts. In cases like this, this cross-platform threat analysis helps analysts confirm malicious activity faster, attribute the intrusion with greater confidence, and strengthen detection logic before the compromise expands further.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">Expand your SOC’s <span class="highlight">cross-platform threat visibility</span>
<br> <span class="highlight">Reduce breach risk </span> with analysis across 4 major operating systems 
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=major-cyber-attacks-march-2026&#038;utm_term=010426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Request for your team
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">3. RUTSSTAGER: Registry-Stored DLL Leads to&nbsp;OrcusRAT&nbsp;Deployment&nbsp;</h2>



<p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7435323496978882560/" target="_blank" rel="noreferrer noopener">Post on LinkedIn</a></p>



<p>ANY.RUN analysts detected&nbsp;<strong>RUTSSTAGER</strong>, a stealthy malware stager that hides a DLL inside the Windows registry in hexadecimal form, making the payload harder to spot during early triage. In the observed chain, the stager led to the deployment of&nbsp;<strong>OrcusRAT</strong>, followed by an&nbsp;additional&nbsp;binary that helped&nbsp;maintain&nbsp;persistence, ran PowerShell-based system checks, and relaunched the RAT when needed.&nbsp;</p>



<p>What makes this threat notable is the way it avoids a straightforward on-disk delivery path. By storing the DLL in the registry instead of dropping it as a conventional file, the malware reduces its visibility and gives defenders fewer obvious artifacts to catch at first glance. The follow-on activity then helps stabilize the infection and keep remote access available on the compromised system.&nbsp;</p>



<p><a href="https://app.any.run/tasks/b357aa61-29d5-4c7f-87f8-359281319a72/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Review the full execution chain</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-1024x1024.jpeg" alt="RUTSSTAGER attack details revealed inside ANY.RUN sandbox" class="wp-image-19728" style="width:524px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-1024x1024.jpeg 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-300x300.jpeg 300w, /cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-150x150.jpeg 150w, /cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-768x768.jpeg 768w, /cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-1536x1536.jpeg 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-2048x2048.jpeg 2048w, /cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-70x70.jpeg 70w, /cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-370x370.jpeg 370w, /cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-270x270.jpeg 270w, /cybersecurity-blog/wp-content/uploads/2026/04/HCpwCklWIAE9xnG-740x740.jpeg 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>RUTSSTAGER attack details revealed inside ANY.RUN sandbox</em>&nbsp;</figcaption></figure></div>


<p>Inside ANY.RUN Sandbox,&nbsp;behavioral&nbsp;analysis exposed how the infection unfolded across stages, while file system and process monitoring helped reveal the relationship between the stager, the deployed RAT, and the persistence&nbsp;component. Process synchronization events were especially useful here, showing that the payload components were not acting independently but as part of a coordinated, multi-stage execution chain.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">Catch <span class="highlight">multi-stage malware</span> before it goes further
<br> Expose hidden execution chains and <span class="highlight">speed up </span> validation
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://app.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=major-cyber-attacks-march-2026&#038;utm_term=010426&#038;utm_content=linktoregistration" rel="noopener" target="_blank">
Sign up now
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>To explore related activity, review relevant sandbox analyses and assess the broader threat landscape, use the following&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI&nbsp;Lookup</a>&nbsp;query:&nbsp;<a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522registryName:%255C%2522%5Erutsdll32$%255C%2522%2522,%2522dateRange%2522:180%7D" target="_blank" rel="noreferrer noopener">registryName:&#8221;^rutsdll32$&#8221;</a>&nbsp;</p>



<p><strong>Gathered IOCs:</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>57ce6187be65c1c692a309c08457290ae74a0047304de6805dbb4feb89c0d7e5&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>6a581c3b6fe7847bb327f5d76e05653a1504e51023454c41835e5dc48bc13ba4&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>7d157366d74312965912a35cbba4187532cfeb3b803119a3a04c9ba0ba7d4ab0&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>07f56ac8b5bd7cdb4c33ea5e9cd42bc7f9d3cd5504aabbb476ef010a142d7e29&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>a6f72590792b3f26271736e5a7ba80102292546bb118cf84ff29df99341abfbe&nbsp;</li>
</ul>



<h2 class="wp-block-heading">4. Fake PDF Attachments Hide HTML Phishing Pages That Steal Credentials&nbsp;</h2>



<p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7437492983123529728/" target="_blank" rel="noreferrer noopener">Post on LinkedIn</a></p>



<p>ANY.RUN analysts&nbsp;identified&nbsp;phishing emails carrying&nbsp;<strong>HTM/HTML attachments disguised as PDF files</strong>. In the observed case, a file named&nbsp;<strong>pdf.htm</strong>&nbsp;opened a fake login page and sent&nbsp;submitted&nbsp;credentials in JSON format through an HTTP POST request to the&nbsp;<strong>Telegram Bot API</strong>.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="768" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/04/HDIlLHIWkAAtM9u-768x1024.jpeg" alt="Attack details discovered by ANY.RUN" class="wp-image-19730" style="width:520px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/HDIlLHIWkAAtM9u-768x1024.jpeg 768w, /cybersecurity-blog/wp-content/uploads/2026/04/HDIlLHIWkAAtM9u-225x300.jpeg 225w, /cybersecurity-blog/wp-content/uploads/2026/04/HDIlLHIWkAAtM9u-1152x1536.jpeg 1152w, /cybersecurity-blog/wp-content/uploads/2026/04/HDIlLHIWkAAtM9u-1536x2048.jpeg 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/HDIlLHIWkAAtM9u-370x493.jpeg 370w, /cybersecurity-blog/wp-content/uploads/2026/04/HDIlLHIWkAAtM9u-270x360.jpeg 270w, /cybersecurity-blog/wp-content/uploads/2026/04/HDIlLHIWkAAtM9u-740x987.jpeg 740w, /cybersecurity-blog/wp-content/uploads/2026/04/HDIlLHIWkAAtM9u-scaled.jpeg 1920w" sizes="(max-width: 768px) 100vw, 768px" /><figcaption class="wp-element-caption"><em>Attack details discovered by ANY.RUN</em>&nbsp;</figcaption></figure></div>


<p>The attack relies on a simple but effective disguise: the attachment looks like a document but actually launches a phishing page designed to collect login data. Some samples also include obfuscated scripts, which makes the credential theft logic less obvious during manual inspection and slows down triage.</p>



<p>Once a victim enters their credentials, attackers can use them to access business email, internal services, and other corporate systems tied to the compromised account. For security teams, this turns what may&nbsp;look&nbsp;like a routine attachment into a fast-moving account takeover risk.&nbsp;</p>



<p><a href="https://app.any.run/tasks/3a6af151-cf57-461f-b600-19c39fdfcce6?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">See the analysis session</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="222" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-22.15.49-1024x222.png" alt="Less than 1 minute required to reveal the phishing behavior inside ANY.RUN sandbox" class="wp-image-19731" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-22.15.49-1024x222.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-22.15.49-300x65.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-22.15.49-768x166.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-22.15.49-370x80.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-22.15.49-270x58.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-22.15.49-740x160.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-22.15.49.png 1192w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Less than 1 minute&nbsp;required&nbsp;to reveal the phishing&nbsp;behavior&nbsp;inside ANY.RUN sandbox</em></figcaption></figure></div>


<p>Inside ANY.RUN Sandbox, the phishing&nbsp;behavior&nbsp;became visible in under 60 seconds, exposing the outbound communication, loaded scripts, and file contents involved in the theft flow. This helps teams quickly confirm whether an attachment is just suspicious or part of an active credential-harvesting attack, reducing review time and helping analysts act before the stolen access is used.&nbsp;</p>



<h2 class="wp-block-heading">5. SVG Smuggling Campaign Targets Colombian Organizations&nbsp;</h2>



<p><a href="https://www.linkedin.com/feed/update/urn:li:activity:7441841298115989505/" target="_blank" rel="noreferrer noopener">Post on LinkedIn</a></p>



<p>ANY.RUN analysts&nbsp;observed&nbsp;a phishing campaign targeting organizations in&nbsp;<strong>Colombia</strong>, particularly in&nbsp;<strong>government, finance, oil and gas, and healthcare</strong>. The attackers use Spanish-language phishing emails with an attached&nbsp;<strong>SVG file</strong>&nbsp;that acts as more than an image: it&nbsp;contains&nbsp;embedded JavaScript that rebuilds the next attack stage locally through&nbsp;<strong>SVG smuggling</strong>.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="538" src="/cybersecurity-blog/wp-content/uploads/2026/04/HEGX8rXWMAEcy9z-1024x538.jpeg" alt="SVG smuggling campaign details revealed by ANY.RUN" class="wp-image-19732" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/HEGX8rXWMAEcy9z-1024x538.jpeg 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/HEGX8rXWMAEcy9z-300x158.jpeg 300w, /cybersecurity-blog/wp-content/uploads/2026/04/HEGX8rXWMAEcy9z-768x403.jpeg 768w, /cybersecurity-blog/wp-content/uploads/2026/04/HEGX8rXWMAEcy9z-1536x806.jpeg 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/HEGX8rXWMAEcy9z-2048x1075.jpeg 2048w, /cybersecurity-blog/wp-content/uploads/2026/04/HEGX8rXWMAEcy9z-370x194.jpeg 370w, /cybersecurity-blog/wp-content/uploads/2026/04/HEGX8rXWMAEcy9z-270x142.jpeg 270w, /cybersecurity-blog/wp-content/uploads/2026/04/HEGX8rXWMAEcy9z-740x389.jpeg 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>SVG smuggling campaign details revealed by ANY.RUN</em></figcaption></figure></div>


<p>Instead of downloading a payload from an external source right away, the SVG uses a&nbsp;<strong>blob URL</strong>&nbsp;to generate an intermediate HTML lure inside the browser. That lure imitates a document-related workflow and creates a&nbsp;<strong>password-protected ZIP archive</strong>&nbsp;for the victim to open, pushing the attack forward while reducing obvious early network&nbsp;signals.&nbsp;</p>



<p>This staged delivery makes the campaign harder to catch during&nbsp;initial&nbsp;triage. SVG smuggling, blob-generated content, and the later use of legitimate Windows components break the compromise into smaller artifacts that may&nbsp;look&nbsp;weak or unrelated on their own, slowing detection and investigation.&nbsp;</p>



<p>Inside ANY.RUN Sandbox, analysts were able to reconstruct the full flow:&nbsp;</p>



<p><strong>SVG smuggling → Blob-based HTML lure → Password-protected ZIP →&nbsp;Notificacion&nbsp;Fiscal.js → radicado.hta → J0Ogv7Hf.ps1 → C2 communication</strong>&nbsp;</p>



<p>That visibility helps security teams connect scattered artifacts faster, uncover hidden delivery stages, and confirm malicious activity before the intrusion progresses further.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">Catch hidden delivery chains before they lead to compromise
<br> Give your team <span class="highlight">earlier visibility</span> into multi-stage attacks
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=major-cyber-attacks-march-2026&#038;utm_term=010426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Power up your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>You can use the following Vjw0rm C2 response commands as detection&nbsp;signals to detect active compromise in your environment:&nbsp;&nbsp;</p>



<ul class="wp-block-list">
<li>Cl — execution termination&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>AW — active window data collection and exfiltration&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Ex — PowerShell code execution&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>SF / RF — base64 payload delivery, storage, and execution&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>DL — file download from URL with optional execution&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>DLF — file delivery via C2 with storage and execution&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Un — removal of persistence mechanisms and related artifacts&nbsp;</li>
</ul>



<h2 class="wp-block-heading">6. Active&nbsp;Magecart&nbsp;Campaign Hijacks&nbsp;eStores&nbsp;and Steals Card Data&nbsp;</h2>



<p><a href="https://any.run/cybersecurity-blog/banks-magecart-campaign/" target="_blank" rel="noreferrer noopener">Check detailed breakdown</a>&nbsp;</p>



<p>ANY.RUN analysts uncovered an active&nbsp;<strong>Magecart&nbsp;campaign</strong>&nbsp;targeting e-commerce websites, with a notable concentration in&nbsp;<strong>Spain</strong>. In the observed cases, attackers hijacked checkout flows, replaced legitimate payment steps with fake interfaces, and stole card data through&nbsp;<strong>WebSocket-based exfiltration</strong>.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1-1024x1024.png" alt="WebSocket exfiltration code" class="wp-image-19733" style="width:543px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1-1024x1024.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1-300x300.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1-150x150.png 150w, /cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1-768x768.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1-1536x1536.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1-70x70.png 70w, /cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1-370x370.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1-270x270.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1-740x740.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/image2e-1-2048x2048-1.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>WebSocket exfiltration code</em></figcaption></figure></div>


<p>What makes this campaign especially dangerous is its durability. The operation remained active for more than&nbsp;<strong>24 months&nbsp;</strong>and&nbsp;relied on a large infrastructure of&nbsp;<strong>100+ domains</strong>, using staged payload delivery, fallback domains, and payment-page mimicry to stay operational and avoid disruption. In Spain-focused cases, the attackers notably abused&nbsp;<strong>Redsys-themed&nbsp;</strong>payment context to make the fraudulent flow appear legitimate.&nbsp;</p>



<p>The campaign also stood out for how it blended card theft into trusted payment experiences. Instead of relying on a simple fake form, the malware dynamically adapted the checkout page, injected malicious elements, and transmitted stolen payment data outside normal HTTP flows, making detection harder for defenders and increasing fraud risk for banks and payment ecosystems.&nbsp;</p>



<p><a href="https://app.any.run/tasks/7e66942b-82f5-4dc7-9be3-b73ac0600fb1/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">See the full payment-skimming chain</a>&nbsp;&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="569" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.53.02-1024x569.png" alt="PayPlug SAS payment window imitation displayed inside ANY.RUN sandbox " class="wp-image-19734" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.53.02-1024x569.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.53.02-300x167.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.53.02-768x427.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.53.02-1536x853.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.53.02-2048x1138.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.53.02-370x206.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.53.02-270x150.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-31-at-23.53.02-740x411.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>PayPlug&nbsp;SAS payment window imitation displayed inside ANY.RUN sandbox</em>&nbsp;</figcaption></figure></div>


<p>Inside ANY.RUN Sandbox, analysts exposed the multi-stage delivery logic, malicious script injection, fake payment overlays, and WebSocket-based card data exfiltration. This helps security teams understand how the skimmer&nbsp;operates,&nbsp;identify&nbsp;related infrastructure faster, and strengthen detections against long-running payment theft campaigns.&nbsp;</p>



<h2 class="wp-block-heading">7.&nbsp;Kamasers: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide&nbsp;</h2>



<p><a href="https://any.run/cybersecurity-blog/kamasers-technical-analysis/" target="_blank" rel="noreferrer noopener">Check detailed analysis</a>&nbsp;</p>



<p>ANY.RUN published a detailed technical analysis of&nbsp;<strong>Kamasers</strong>, a multi-vector&nbsp;<strong>DDoS botnet</strong>&nbsp;designed to carry out both application-layer and transport-layer attacks while also supporting follow-on payload delivery. The research shows how the malware&nbsp;operates, how it receives commands, and why it creates risk beyond disruption alone.&nbsp;</p>



<p><a href="https://app.any.run/tasks/232034c5-de22-4eb4-a3ab-62e58d041205?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">See&nbsp;Kamasers&nbsp;behavior&nbsp;exposed</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="901" src="/cybersecurity-blog/wp-content/uploads/2026/04/image2-2-1024x901.png" alt="Communication between the infected host and the C2 server observed inside ANY.RUN" class="wp-image-19736" style="width:470px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/image2-2-1024x901.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/image2-2-300x264.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/image2-2-768x676.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/image2-2-370x326.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/image2-2-270x238.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/image2-2-740x651.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/image2-2.png 1432w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Communication between the infected host and the C2 server&nbsp;observed&nbsp;inside ANY.RUN</em></figcaption></figure></div>


<p>Inside the sandbox, analysts&nbsp;observed&nbsp;the botnet retrieving command-and-control data, communicating with active infrastructure, executing DDoS-related commands, and in some cases downloading&nbsp;additional&nbsp;files for execution. This helps security teams confirm malicious&nbsp;behavior&nbsp;faster and understand whether an infected host is being used only for flooding activity or as part of a broader compromise.&nbsp;</p>



<p>Kamasers&nbsp;supports multiple attack methods, including&nbsp;<strong>HTTP, TLS, UDP, TCP, and&nbsp;GraphQL-based flooding</strong>. In addition, it can act as a&nbsp;<strong>loader</strong>, which increases the risk of further malware delivery, data theft, or ransomware.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text"><span class="highlight"> Reduce </span>the chance of data theft and financial loss
<br> Help your team <span class="highlight">contain threats</span> before the damage grows
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=major-cyber-attacks-march-2026&#038;utm_term=010426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Power up your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>Another notable finding was the botnet’s resilient&nbsp;<strong>Dead Drop Resolver</strong>&nbsp;design. Instead of depending on a single static C2 location,&nbsp;Kamasers&nbsp;uses legitimate public services such as&nbsp;<strong>GitHub Gist, Telegram, Dropbox, Bitbucket, and&nbsp;Etherscan&nbsp;</strong>to retrieve active command-and-control addresses, making disruption and early detection more difficult.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="901" height="198" src="/cybersecurity-blog/wp-content/uploads/2026/04/image10.png" alt="DDR links in the Kamasers codebase" class="wp-image-19737" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/image10.png 901w, /cybersecurity-blog/wp-content/uploads/2026/04/image10-300x66.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/image10-768x169.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/image10-370x81.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/image10-270x59.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/image10-740x163.png 740w" sizes="(max-width: 901px) 100vw, 901px" /><figcaption class="wp-element-caption"><em>DDR links in the&nbsp;Kamasers&nbsp;codebase</em></figcaption></figure></div>


<p>For organizations, that means a single infected system can become both a source of external attacks and a foothold for deeper intrusion, increasing operational, financial, and reputational risk.&nbsp;</p>



<p>To review related sandbox analyses and broader activity, use the following&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI&nbsp;Lookup</a>&nbsp;query:&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktotilookup#{%22query%22:%22threatName:%5C%22kamasers%5C%22%22,%22dateRange%22:30}" target="_blank" rel="noreferrer noopener">threatName:&#8221;kamasers&#8221;</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="446" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-24-at-19.16.58-2048x892-1-1024x446.png" alt="Kamasers attacks displayed inside TI Lookup" class="wp-image-19738" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-24-at-19.16.58-2048x892-1-1024x446.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-24-at-19.16.58-2048x892-1-300x131.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-24-at-19.16.58-2048x892-1-768x335.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-24-at-19.16.58-2048x892-1-1536x669.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-24-at-19.16.58-2048x892-1-370x161.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-24-at-19.16.58-2048x892-1-270x118.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-24-at-19.16.58-2048x892-1-740x322.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-24-at-19.16.58-2048x892-1.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ANY.RUN’s&nbsp;sandbox&nbsp;sessions related to the&nbsp;Kamasers&nbsp;attacks displayed inside TI&nbsp;Lookup</em></figcaption></figure></div>


<h2 class="wp-block-heading">8.&nbsp;MicroStealer: A Fast-Spreading Infostealer with Limited Detection&nbsp;</h2>



<p><a href="https://any.run/cybersecurity-blog/microstealer-technical-analysis/" target="_blank" rel="noreferrer noopener">Check technical analysis</a>&nbsp;</p>



<p>ANY.RUN analysts found&nbsp;<strong>MicroStealer</strong>, a fast-spreading infostealer that gained traction despite limited public detection. In observed activity, the malware appeared in&nbsp;<strong>40+ sandbox sessions in less than a month</strong>, using a multi-stage chain to steal credentials, session data, screenshots, and wallet files.&nbsp;</p>



<p><a href="https://app.any.run/tasks/d59c90ed-820e-4f3d-be47-77bd997835aa/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">See the full execution chain</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="555" src="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-11-at-23.53.40-2048x1110-1-1024x555.png" alt="First observed analysis session with MicroStealer" class="wp-image-19739" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-11-at-23.53.40-2048x1110-1-1024x555.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-11-at-23.53.40-2048x1110-1-300x163.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-11-at-23.53.40-2048x1110-1-768x416.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-11-at-23.53.40-2048x1110-1-1536x833.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-11-at-23.53.40-2048x1110-1-370x201.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-11-at-23.53.40-2048x1110-1-270x146.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-11-at-23.53.40-2048x1110-1-740x401.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/Screenshot-2026-03-11-at-23.53.40-2048x1110-1.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>First&nbsp;observed&nbsp;analysis&nbsp;session&nbsp;with&nbsp;MicroStealer</em></figcaption></figure></div>


<p>Inside the sandbox, analysts were able to quickly confirm how the threat unfolds and what data it targets. This kind of visibility helps security teams move from an unclear file to a confident verdict faster, reducing review time and lowering the chance of missed credential theft.&nbsp;</p>



<p>How the attack unfolds:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>NSIS installer</strong>&nbsp;delivers the&nbsp;initial&nbsp;payload&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Electron loader</strong>&nbsp;requests elevated privileges and launches the next stage&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Java module</strong>&nbsp;executes the main stealer logic&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Browser credentials, session data, screenshots, and wallet files are collected&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Stolen data is sent to attacker-controlled infrastructure&nbsp;</li>
</ul>



<p>What makes&nbsp;MicroStealer&nbsp;notable is not only what it steals, but how it delays confident detection. The layered&nbsp;<strong>NSIS → Electron → Java</strong>&nbsp;execution chain, combined with obfuscation and anti-analysis checks, makes the malware harder to understand during early triage.&nbsp;</p>



<p>To review related sandbox analyses and broader activity, use the following; <a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI&nbsp;Lookup</a>&nbsp;query:&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktotilookup#{%22query%22:%22threatName:%5C%22microstealer%5C%22%22,%22dateRange%22:180}" target="_blank" rel="noreferrer noopener">threatName:&#8221;microstealer&#8221;</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="565" src="/cybersecurity-blog/wp-content/uploads/2026/04/image12-2048x1129-1-1024x565.png" alt="Relevant sandbox sessions with MicroStealer" class="wp-image-19740" srcset="/cybersecurity-blog/wp-content/uploads/2026/04/image12-2048x1129-1-1024x565.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/04/image12-2048x1129-1-300x165.png 300w, /cybersecurity-blog/wp-content/uploads/2026/04/image12-2048x1129-1-768x423.png 768w, /cybersecurity-blog/wp-content/uploads/2026/04/image12-2048x1129-1-1536x847.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/04/image12-2048x1129-1-370x204.png 370w, /cybersecurity-blog/wp-content/uploads/2026/04/image12-2048x1129-1-270x149.png 270w, /cybersecurity-blog/wp-content/uploads/2026/04/image12-2048x1129-1-740x408.png 740w, /cybersecurity-blog/wp-content/uploads/2026/04/image12-2048x1129-1.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ANY.RUN&nbsp;TI&nbsp;Lookup&nbsp;demonstrates&nbsp;relevant sandbox sessions with&nbsp;MicroStealer</em></figcaption></figure></div>


<p>For organizations, this&nbsp;risk goes beyond a single infected endpoint. Stolen browser credentials and active sessions can give attackers access to SaaS apps, internal systems, and cloud services, increasing the chance of account compromise and broader intrusion.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text"><span class="highlight"> 64% of Fortune 500 </span>companies rely on ANY.RUN
<br> to strengthen their SOC operations
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=major-cyber-attacks-march-2026&#038;utm_term=010426&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate in your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">About ANY.RUN&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of interactive malware analysis and threat intelligence solutions, helps security teams detect threats earlier, investigate incidents faster, and build stronger response workflows. With&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a>,&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence&nbsp;Lookup</a>, and&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>, the company gives SOC and MSSP teams the visibility and context they need to move from alert to confident decision more quickly.&nbsp;&nbsp;</p>



<p>Today, more than <strong>15,000 organizations</strong> and <strong>600,000 security professionals</strong> worldwide rely on ANY.RUN. The company is <a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major-cyber-attacks-march-2026&amp;utm_term=010426&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certified</a>, reflecting its focus on strong security controls and customer data protection.</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/major-cyber-attacks-march-2026/">Major Cyber Attacks in March 2026: OAuth Phishing, SVG Smuggling, Magecart, and More </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/cybersecurity-blog/major-cyber-attacks-march-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Release Notes: Cross-Platform Threat Analysis with macOS, SSL Decryption, and 1,300+ New Detections </title>
		<link>/cybersecurity-blog/release-notes-march-2026/</link>
					<comments>/cybersecurity-blog/release-notes-march-2026/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Tue, 31 Mar 2026 10:24:19 +0000</pubDate>
				<category><![CDATA[Service Updates]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[update]]></category>
		<guid isPermaLink="false">/cybersecurity-blog/?p=19659</guid>

					<description><![CDATA[<p>March was a packed month for&#160;ANY.RUN.&#160;We rolled out major product improvements that help security teams investigate phishing inside encrypted traffic, expand cross-platform analysis with macOS, and bring Windows Server into the&#160;sandbox&#160;workflow. At the same time, our detection team continued to strengthen threat coverage with new&#160;behavior&#160;signatures, Suricata rules, and fresh threat intelligence reports focused on active [&#8230;]</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/release-notes-march-2026/">Release Notes: Cross-Platform Threat Analysis with macOS, SSL Decryption, and 1,300+ New Detections </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>March was a packed month for&nbsp;<a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>.&nbsp;We rolled out major product improvements that help security teams investigate phishing inside encrypted traffic, expand cross-platform analysis with macOS, and bring Windows Server into the&nbsp;sandbox&nbsp;workflow. </p>



<p>At the same time, our detection team continued to strengthen threat coverage with new&nbsp;behavior&nbsp;signatures, Suricata rules, and fresh threat intelligence reports focused on active malware and attack techniques.&nbsp;</p>



<p>Here’s&nbsp;a closer&nbsp;look&nbsp;at&nbsp;what’s&nbsp;new.&nbsp;</p>



<h2 class="wp-block-heading">Product Updates&nbsp;</h2>



<p>This month’s updates are all about helping security teams see more and investigate with less friction. We improved phishing detection inside encrypted traffic, expanded <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">sandbox coverage</a> to macOS, and added Windows Server analysis so teams can work across more of the environments they protect every day.</p>



<h3 class="wp-block-heading">Automatic SSL Decryption for Stronger Phishing Detection&nbsp;</h3>



<p>Encrypted HTTPS traffic remains one of the main reasons phishing is harder to confirm quickly. It hides credential theft, redirect chains, and token-based attacks inside traffic that often appears legitimate, forcing teams to spend more time on validation and increasing the chance of missed compromise.</p>



<p>In March, ANY.RUN introduced <a href="https://any.run/cybersecurity-blog/automatic-ssl-decryption/" target="_blank" rel="noreferrer noopener"><strong>automatic SSL decryption</strong></a> in the <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive Sandbox</a> across all subscription tiers. By extracting encryption keys directly from process memory, the sandbox can now inspect decrypted traffic during analysis and apply Suricata rules, detection signatures, and IOC extraction immediately.</p>



<p>Check real-world example: <a href="https://app.any.run/tasks/73fb8a10-2721-4da4-9f9b-a340a6eac370?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Detecting Salty2FA phishing campaign with SSL decryption</a></p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="/cybersecurity-blog/wp-content/uploads/2026/03/image2-2048x1152-1-1024x576.png" alt="" class="wp-image-19667" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image2-2048x1152-1-1024x576.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2048x1152-1-300x169.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2048x1152-1-768x432.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2048x1152-1-1536x864.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2048x1152-1-370x208.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2048x1152-1-270x152.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2048x1152-1-740x416.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2048x1152-1.png 2048w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Automatic SSL decryption provides a major phishing detection boost in the&nbsp;sandbox</em></figcaption></figure></div>


<p>This significantly expands phishing visibility across every&nbsp;sandbox&nbsp;session. After implementing the technology, ANY.RUN saw a&nbsp;5x increase in SSL-decrypted phishing detection&nbsp;and added&nbsp;60,000 more confirmed malicious URLs to&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI&nbsp;Lookup</a>&nbsp;each month.&nbsp;</p>



<p>For your SOC, this means:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Higher detection rate:</strong>&nbsp;Analysts can now&nbsp;identify&nbsp;phishing activity that would otherwise stay hidden inside encrypted traffic.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Faster MTTD and MTTR:</strong>&nbsp;Teams confirm malicious&nbsp;behavior&nbsp;earlier and respond before phishing causes broader damage.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Reduced Tier 1-to-Tier 2 escalation volume:</strong>&nbsp;Tier 1 can close more cases independently and escalate only the incidents that truly need deeper investigation.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Expanding Your SOC&#8217;s Cross-Platform Analysis with macOS </h3>



<p>As enterprise environments grow more complex, SOC teams are expected to investigate threats across multiple operating systems without slowing down triage. But when analysis is split across separate tools and environments, investigations take longer, alert backlogs grow, and the risk of delayed or missed detection increases.&nbsp;</p>



<p>To help solve this,&nbsp;ANY.RUN expanded its&nbsp;<strong>sandbox&nbsp;OS coverage with&nbsp;</strong><a href="https://any.run/cybersecurity-blog/anyrun-macos-sandbox/" target="_blank" rel="noreferrer noopener"><strong>macOS virtual machine</strong></a>, now available in beta for&nbsp;<a href="https://any.run/plans/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoplans" target="_blank" rel="noreferrer noopener">Enterprise Suite</a>&nbsp;users. This gives teams one environment to investigate threats across&nbsp;<a href="https://any.run/cybersecurity-blog/windows-10-sandbox/" target="_blank" rel="noreferrer noopener">Windows</a>,&nbsp;<a href="https://any.run/cybersecurity-blog/linux-malware-analysis-sandbox/" target="_blank" rel="noreferrer noopener">Linux</a>,&nbsp;<a href="https://any.run/cybersecurity-blog/android-malware-analysis/" target="_blank" rel="noreferrer noopener">Android</a>, and now macOS.&nbsp;&nbsp;</p>



<p><a href="https://app.any.run/tasks/65678bab-2c5f-47b8-b0d4-cb0870b1a3c8?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View&nbsp;analysis of&nbsp;macOS threat</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="570" src="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-11.35.08-1024x570.png" alt="Miolab stealer analyzed inside ANY.RUN sandbox " class="wp-image-19670" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-11.35.08-1024x570.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-11.35.08-300x167.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-11.35.08-768x427.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-11.35.08-1536x854.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-11.35.08-2048x1139.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-11.35.08-370x206.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-11.35.08-270x150.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-11.35.08-740x412.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Miolab stealer&nbsp;analyzed&nbsp;inside ANY.RUN&nbsp;sandbox</em>&nbsp;</figcaption></figure></div>


<p>Bringing <strong>interactive macOS analysis</strong> into the workflow is especially important for threats that stay dormant until a user enters a password, approves a system dialog, or triggers another action. By allowing real user interaction during detonation, the sandbox can expose behaviors that automated analysis often misses, including fake authentication prompts, staged execution chains, file collection, and post-authentication data exfiltration.</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Expand your SOC’s <span class="highlight">
cross-platform threat visibility </span><br><span class="highlight">Reduce breach risk</span> with analysis across 4 major OS
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release-notes-march-2026&#038;utm_term=310326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Request for your team
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>This operational improvement leads to measurable outcomes:&nbsp;&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Faster validation of suspicious files and URLs:</strong>&nbsp;Teams can confirm malicious&nbsp;behavior&nbsp;in minutes through&nbsp;behavior-based analysis during triage.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Shorter investigation cycles:</strong>&nbsp;Analysts can&nbsp;observe&nbsp;full execution&nbsp;behavior&nbsp;in one environment without manually piecing evidence together across multiple tools.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Improved cross-platform detection coverage:</strong>&nbsp;Security teams can investigate platform-specific threats across macOS, Windows, Linux, and Android in a consistent workflow.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Higher productivity during triage:</strong>&nbsp;Less context switching helps analysts process more alerts per shift.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Reduced alert backlog during peak activity:</strong>&nbsp;Faster decisions help SOC teams keep queues under control during phishing waves and malware outbreaks.&nbsp;</li>
</ul>



<h3 class="wp-block-heading">Advancing Server-Side Threat Analysis with Windows Server&nbsp;</h3>



<p>For many enterprise teams, critical infrastructure runs on&nbsp;<strong>Windows Server</strong>, from domain services and file storage to business applications and backups. But malware that targets server environments often behaves differently from threats launched on standard Windows systems, making it harder to assess risk accurately in a desktop-focused setup.&nbsp;</p>



<p>To close that gap,&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener"><strong>ANY.RUN&nbsp;Sandbox</strong></a><strong>&nbsp;</strong>now supports analysis in a Windows Server environment.&nbsp;This gives security teams a way to&nbsp;observe&nbsp;attack&nbsp;behavior&nbsp;in a server OS and investigate techniques tied to infrastructure, including changes to domain accounts, security policies, and the use of administrative tools.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="800" src="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-09.04.09-1024x800.png" alt="Threats analyzed inside a Windows Server environment" class="wp-image-19671" style="width:588px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-09.04.09-1024x800.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-09.04.09-300x234.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-09.04.09-768x600.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-09.04.09-1536x1199.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-09.04.09-370x289.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-09.04.09-270x211.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-09.04.09-385x300.png 385w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-09.04.09-740x578.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-31-at-09.04.09.png 1670w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Threats&nbsp;analyzed&nbsp;inside a Windows Server environment</em></figcaption></figure></div>


<p>This addition helps teams strengthen infrastructure-focused triage and response:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Better visibility into server-specific techniques:</strong>&nbsp;Teams can&nbsp;analyze&nbsp;behavior&nbsp;tied to domains, policies, and administrative utilities in a more relevant environment.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Stronger investigation confidence for infrastructure threats:</strong>&nbsp;Analysts can&nbsp;validate&nbsp;whether a sample affects server-side services or critical business systems before escalating.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>More effective detection and response preparation:</strong>&nbsp;Security teams can collect artifacts, refine detections, and improve incident playbooks for Windows Server scenarios.&nbsp;</li>
</ul>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">
Cut business risk </span>with earlier malware &#038; phishing detection <br>Equip your SOC with <span class="highlight">deeper threat analysis</span>
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release-notes-march-2026&#038;utm_term=310326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate in your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Threat Coverage Updates&nbsp;</h2>



<p>In March, our detection team continued to expand coverage across phishing, credential theft, backdoors, miners, stealers, loaders, and evasive system abuse.&nbsp;</p>



<p>This month’s updates include:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>91 new&nbsp;behavior&nbsp;signatures</strong>&nbsp;</li>



<li><strong>1,293 new Suricata rules</strong>&nbsp;</li>
</ul>



<p>These additions give security teams better visibility into modern attack chains, from OAuth phishing and Telegram-based credential theft to backdoor communication, loader&nbsp;behavior, and suspicious use of built-in system tools.&nbsp;</p>



<h3 class="wp-block-heading">New&nbsp;Behavior&nbsp;Signatures&nbsp;</h3>



<p>In March, we added&nbsp;<strong>91 new&nbsp;behavior&nbsp;signatures</strong>&nbsp;to strengthen detection across malware families, Android threats, stealers, loaders, RATs, ransomware, and suspicious system-level activity.&nbsp;</p>



<p>These updates improve visibility into&nbsp;behaviors&nbsp;often seen in real attacks, including persistence, self-deletion, loader activity, shell delivery, registry tampering, PowerShell abuse, and virtual machine checks used to evade analysis.&nbsp;</p>



<p><strong>Highlighted families and detections include:</strong>&nbsp;</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-1 wp-block-group-is-layout-grid">
<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/dfcf4df2-f5b8-4fc4-9318-0016f88981d4?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Oreshki</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/a90ede8f-1d75-41ae-a288-f658821fb8d7?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Lixvo</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/70547603-d023-4bcc-8d9e-4fe6f54aa270?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Genesis</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/8a9d8a39-38ee-4813-9b88-dcf577dee4d5?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Overlord</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/0b8c2ab8-4740-4d5a-a1cf-3c3882fcb7b8?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Libka</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/912971bd-04f3-4c6c-b96c-6953f22ae1f7?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">A0Backdoor</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/2739f67d-18f2-4b88-b5a8-33751c1e30f4?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Banshee</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/9dd0cd56-fdce-4402-bfb1-839373ea5be3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Vdw0rm</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/4020bc2b-dca7-498a-88c7-9901f36644b3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">TaxiSpy</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/cf4722d5-4105-42a0-a9da-e08c36d27971?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Perseus</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/29166775-2874-42d4-ba3a-e0a6d46a60e7?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Slopoly</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/56b8e219-4840-4c30-aded-9bae849c869c?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Venon</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/0758e8b1-53d7-4728-a661-4db50e04bc9b?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Herodotus</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/71ea1390-918b-4ad5-97ed-fea1cb64a818?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Boryptgrab</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/02084297-b0aa-4a7c-a1ec-ca7bdd640c19?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">NexusRAT</a>&nbsp;</li>
</ul>
</div></div>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="640" src="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.18.19-1024x640.png" alt="District analyzed inside ANY.RUN sandbox" class="wp-image-19675" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.18.19-1024x640.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.18.19-300x188.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.18.19-768x480.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.18.19-1536x960.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.18.19-2048x1280.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.18.19-370x231.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.18.19-270x169.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.18.19-740x463.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>District&nbsp;analyzed&nbsp;inside ANY.RUN sandbox</em></figcaption></figure></div>


<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-2 wp-block-group-is-layout-grid">
<ul class="wp-block-list">
<li>HolyCat&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>SuperCard&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/8749ea16-4efc-4901-a39e-2acaaf1f65e8/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Mamont</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/79551733-b9c2-4995-8c3e-9bef92760909/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">MrDec</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/90631fad-0c8d-4211-81cd-80ba7ddfe525/" target="_blank" rel="noreferrer noopener">Nopname</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/da847acb-f2b6-45b0-b9e2-d042418e0477/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">BlackShrantac</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Noodlopfile&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/a1cb8ca4-a870-47ef-8a65-a1cff379dee0/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">CastleLoader</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>CharlieKirk&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>LockCrypt&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>GibCrypto&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>ZipWhisper&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>PixyNetLoader&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Quantum&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/3687a1da-df45-42f5-8fda-d08029242639/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">BlackReaper</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Queen&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Zov&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>FileScavenger&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Rodecap&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Recuva&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>OCRFix&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/6052ac64-6e3b-4cef-9e10-e254c7202497/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">UnixStealer</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/50d74211-ad49-4b70-926d-de4350713ab0?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">XWorm</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/1e576ce0-c28a-40e2-8e28-148fb95845f0?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">District</a>&nbsp;</li>
</ul>
</div></div>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Reduce MTTD to <span class="highlight">
15 seconds per case </span>in your SOC <br>Detect malware &#038; phishing threats early
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://app.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release-notes-march-2026&#038;utm_term=310326&#038;utm_content=linktoregistration" rel="noopener" target="_blank">
Sign up now
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-3 wp-block-group-is-layout-grid">
<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/e83564ba-25d4-45d0-a0fa-bb3a03b40291?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">SPRON</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/ebeabebf-7d1f-4659-bece-15737eb538fa?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">ATROPINE</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/49947827-3e42-4ee8-95c0-dc9e5f55aa14?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">BamboLoader</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/c11440d1-e60b-4aaa-9cbb-1a8053584df9?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">RUTSSTAGER</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/7f57ace0-4e2d-4aa2-abdf-a3a5fddbb7f7?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">IRONZERO</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/89c28bf3-8737-4475-8e80-470d7c1734e4/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">BeardShell</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/0b8afd4e-30d5-4247-b2a4-92ab6fbf0407?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">SplitDrop</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/a3d8f313-ec06-4ee0-bf92-b6b11f3342bb?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">JIGSAW</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/c943d7b0-5347-407a-b3af-d936ec0e1f92/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">GHOSTFORM</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/0b8afd4e-30d5-4247-b2a4-92ab6fbf0407?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">TWINTALK</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/0b8afd4e-30d5-4247-b2a4-92ab6fbf0407?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">TWINTASK</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/0ab27187-663f-4f18-adbf-47d87ccab5ce/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">PXAStealer</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/aac66ac8-ac32-4f5f-b3dc-a3a720e9ee92?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Phorpiex</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/3b9657cf-24e3-4885-8ba4-b040aa1ee8e9?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Pulser</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/752ccbfe-9d00-4cf9-8dbf-71edeef21693/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">HoppingAnt</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/c069f8d6-132d-4880-8674-d640756f3bb3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Vidar</a>&nbsp;</li>
</ul>
</div></div>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="570" src="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.23.33-1024x570.png" alt="Banshee stealer targeting macOS users detected inside ANY.RUN sandbox " class="wp-image-19676" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.23.33-1024x570.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.23.33-300x167.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.23.33-768x427.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.23.33-1536x855.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.23.33-2048x1140.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.23.33-370x206.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.23.33-270x150.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-21.23.33-740x412.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Banshee stealer targeting macOS users detected inside ANY.RUN&nbsp;sandbox</em>&nbsp;</figcaption></figure></div>


<p><strong>New&nbsp;behavior-based detections also cover:</strong>&nbsp;</p>



<div class="wp-block-group"><div class="wp-block-group__inner-container is-layout-grid wp-container-core-group-is-layout-4 wp-block-group-is-layout-grid">
<ul class="wp-block-list">
<li>PhantomCore&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/54086338-157f-47b3-adb3-fb16e7db85f9/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Hide file extensions via registry</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/144fd53d-fff3-4cd0-a36d-e459e9e7a6f2/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Self-deletion pattern detected</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Delivers shell command via&nbsp;<strong>nslookup</strong>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%227ev3n%20has%20been%20detected%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">7ev3n process activity</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22CRYPREN%20mutex%20has%20been%20found%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">CRYPREN mutex</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22REDEEMER%20mutex%20has%20been%20found%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">REDEEMER&nbsp;mutex</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22PowerShell%20remote%20script%20execution%20via%20IRM%20piped%20to%20IEX%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">PowerShell IRM/IEX command execution</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22Uses%20SLMGR.VBS%20to%20activate%20Windows%20license%20online%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">Use of SLMGR.VBS with /ato</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22Uses%20SLMGR.VBS%20to%20install%20a%20license%20key%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">Use of SLMGR.VBS with /ipk</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22FORBIX%20has%20been%20detected%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">FORBIX registry activity</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22HYDRA%20has%20been%20detected%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">HYDRA-related files</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22STUXNET%20has%20been%20detected%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">STUXNET-related files</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22POWERSHELL%20executes%20a%20script%20with%20a%20hex-encoded%20filename%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">Suspicious hex-named PowerShell execution</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22SERVICEFOR%20has%20been%20detected%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">SERVICEFOR registry activity</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolookup#%7B%22query%22:%22ruleName:%5C%22NSMINER%20has%20been%20detected%5C%22%22,%22dateRange%22:180%7D" target="_blank" rel="noreferrer noopener">NSMINER-related files</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/3b9657cf-24e3-4885-8ba4-b040aa1ee8e9/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Changes monitor brightness via PowerShell</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/044cc204-4784-4746-a575-130d4f3fdf60?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Checks VM-related processes</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/044cc204-4784-4746-a575-130d4f3fdf60?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Checks VM-related registry</a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://app.any.run/tasks/044cc204-4784-4746-a575-130d4f3fdf60?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">NET.EXE used to gather Windows client statistics</a>&nbsp;</li>
</ul>
</div></div>



<p>Together, these additions give security teams broader&nbsp;behavioral&nbsp;coverage across both established malware families and attacker techniques that commonly appear in multi-stage intrusions.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Threats evolve fast across campaigns and infrastructure <br>Now your SOC can track them with <span class="highlight">TI Lookup </span>
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://intelligence.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=release-notes-march-2026&#038;utm_term=310326&#038;utm_content=linktotilookup" rel="noopener" target="_blank">
Try TI Lookup
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">New Suricata Rules&nbsp;</h3>



<p>In March, we added&nbsp;<strong>1,293 new Suricata rules</strong>&nbsp;to strengthen detection of credential theft, phishing activity, and malicious command-and-control traffic.&nbsp;</p>



<p>Key highlights include:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Credential theft via Telegram API&nbsp;(sid: 84001778)</strong>: Tracks adversary&nbsp;attempts&nbsp;to exfiltrate victim&#8217;s email &amp; password via Telegram Bot API&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>MS OAuth Device Code phish / EvilTokens activity (sid: 84001845)</strong>: Identifies usage of emerged attack technique that exploits legitimate OAuth 2.0 device authorization flows to gain control over victims&#8217; Microsoft 365 accounts</li>
</ul>



<ul class="wp-block-list">
<li><strong>DinDoor backdoor HTTP activity (sid: 85006556)</strong>: Detects Iran-linked MuddyWater (TA450) actor&#8217;s new backdoor attempts to establish C2 communication via HTTP</li>
</ul>



<h3 class="wp-block-heading">Threat Intelligence Reports&nbsp;</h3>



<p>In March, our team published new <a href="https://any.run/cybersecurity-blog/threat-intelligence-reports/" target="_blank" rel="noreferrer noopener">Threat Intelligence Reports</a> on emerging malware, banking trojans, ransomware, backdoors, and stealthy delivery techniques. </p>



<p>Available as part of ANY.RUN’s <a href="https://intelligence.any.run/plans?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktotiplans" target="_blank" rel="noreferrer noopener">TI Lookup Premium</a> plan, these reports help security teams better understand active threats and investigate them with stronger context.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="524" src="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-23.16.33-1024x524.png" alt="" class="wp-image-19677" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-23.16.33-1024x524.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-23.16.33-300x154.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-23.16.33-768x393.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-23.16.33-1536x786.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-23.16.33-2048x1049.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-23.16.33-370x189.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-23.16.33-270x138.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-23.16.33-585x300.png 585w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-30-at-23.16.33-740x379.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Threat Intelligence reports available in ANY.RUN</em>&nbsp;</figcaption></figure></div>


<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/reports/2026-03-25-threat-brief-vidar-venon-slopoly" target="_blank" rel="noreferrer noopener"><strong>VIDAR,&nbsp;VENON, and SLOPOLY</strong></a><strong>:</strong>&nbsp;This report covers a polymorphic stealer, a Rust-based banking RAT, and a PowerShell backdoor tied to the Hive0163 ecosystem, with a focus on their&nbsp;behavior, artifacts, and detection opportunities.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/reports/03-19-threat-brief-steaelite-blackreaperrat-jigsaw1" target="_blank" rel="noreferrer noopener"><strong>Steaelite,&nbsp;BlackReaper, and Jigsaw</strong></a><strong>:</strong>&nbsp;This brief&nbsp;looks at three threats combining credential theft, remote access, persistence, and ransomware&nbsp;behavior, including Telegram-based control and file encryption activity.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><a href="https://intelligence.any.run/reports/05-03-threat-brief-phantomproxylite-rutsstager-steaeliterat-nopname" target="_blank" rel="noreferrer noopener"><strong>PhantomProxyLite,&nbsp;Rutsstager,&nbsp;Steaelite&nbsp;RAT, and&nbsp;Nopname</strong></a><strong>:</strong>&nbsp;This report explores&nbsp;tunneling, registry-based staging, data theft, and ransomware, showing how these threats mix stealth techniques with clear forensic traces.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>&nbsp;provides interactive malware analysis and threat intelligence solutions built to support modern security operations.&nbsp;</p>



<p>By combining&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">Interactive&nbsp;Sandbox</a>,&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence&nbsp;Lookup</a>, and&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>, ANY.RUN helps SOC and MSSP teams accelerate threat analysis, investigate incidents with greater clarity, and detect emerging attacks earlier.&nbsp;</p>



<p>Used by more than 15,000 organizations and over 600,000 security professionals worldwide, including 74% of Fortune 100 companies, ANY.RUN is focused on helping teams improve detection and response while meeting the data protection, <a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">compliance</a>, and workflow demands of real-world security operation</p>



<p><a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=release-notes-march-2026&amp;utm_term=310326&amp;utm_content=linktoenterprise#contact-sales" target="_blank" rel="noreferrer noopener"><strong>Integrate ANY.RUN’s solution for Tier 1/2/3 in your organization →</strong></a><strong></strong>&nbsp;</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/release-notes-march-2026/">Release Notes: Cross-Platform Threat Analysis with macOS, SSL Decryption, and 1,300+ New Detections </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/cybersecurity-blog/release-notes-march-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ANY.RUN at RSAC™ 2026: Highlights &amp; Industry Recognition</title>
		<link>/cybersecurity-blog/rsac-2026-highlights/</link>
					<comments>/cybersecurity-blog/rsac-2026-highlights/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 11:03:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[update]]></category>
		<guid isPermaLink="false">/cybersecurity-blog/?p=19642</guid>

					<description><![CDATA[<p>We’ve&#160;just returned from&#160;RSAC™ 2026&#160;in San Francisco, one of the most important cybersecurity events of the year.&#160; As always, the conference brought together security leaders, vendors, and practitioners from around the world. For the&#160;ANY.RUN team, it was a packed few days of meetings with customers and partners, insightful presentations, and strong industry recognition.&#160; ANY.RUN at RSAC [&#8230;]</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/rsac-2026-highlights/">ANY.RUN at RSAC™ 2026: Highlights &amp; Industry Recognition</a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>We’ve&nbsp;just returned from&nbsp;RSAC<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 2026&nbsp;in San Francisco, one of the most important cybersecurity events of the year.&nbsp;</p>



<p>As always, the conference brought together security leaders, vendors, and practitioners from around the world. For the&nbsp;<a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rsac-2026&amp;utm_term=300326&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN team</a>, it was a packed few days of meetings with customers and partners, insightful presentations, and strong industry recognition.&nbsp;</p>



<h2 class="wp-block-heading">ANY.RUN at RSAC 2026&nbsp;</h2>



<p>This year, ANY.RUN was represented at RSAC by our CCO, Alex, who attended the conference to meet with partners and customers, discuss ongoing collaborations, and exchange insights on evolving threat detection challenges.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="562" src="/cybersecurity-blog/wp-content/uploads/2026/03/image-2-1024x562.jpg" alt="" class="wp-image-19644" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image-2-1024x562.jpg 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image-2-300x165.jpg 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image-2-768x421.jpg 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image-2-370x203.jpg 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image-2-270x148.jpg 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image-2-740x406.jpg 740w, /cybersecurity-blog/wp-content/uploads/2026/03/image-2.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">&nbsp;<em>ANY.RUN’s&nbsp;CCO,&nbsp;Alex,&nbsp;at&nbsp;RSAC 2026</em>&nbsp;</figcaption></figure></div>


<p>Beyond scheduled meetings, RSAC also&nbsp;provided&nbsp;an opportunity for deeper conversations in a more informal setting, including a partner dinner where key topics around SOC workflows, threat intelligence, and detection strategies were discussed.&nbsp;</p>



<p>These interactions are an important part of how we continue to align ANY.RUN’s solutions with real-world needs across security teams and MSSPs.&nbsp;</p>



<h2 class="wp-block-heading">Industry Recognition at Global InfoSec Awards 2026&nbsp;</h2>



<p>During RSAC 2026, ANY.RUN was honored at the&nbsp;<a href="https://any.run/cybersecurity-blog/global-infosec-awards-2026/" target="_blank" rel="noreferrer noopener">Global InfoSec Awards 2026</a>, organized by Cyber Defense Magazine.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1280" height="720" src="/cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large.jpeg" alt="" class="wp-image-19560" style="width:650px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large.jpeg 1280w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-300x169.jpeg 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-1024x576.jpeg 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-768x432.jpeg 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-370x208.jpeg 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-270x152.jpeg 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-740x416.jpeg 740w" sizes="(max-width: 1280px) 100vw, 1280px" /><figcaption class="wp-element-caption"><em style="text-align: start; white-space: normal;">We were honored to receive Global InfoSec awards during RSAC 2026</em></figcaption></figure></div>


<p>We received recognition in two categories:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Innovative Malware Analysis for&nbsp;</strong><a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rsac-2026&amp;utm_term=300326&amp;utm_content=linktosandbox" target="_blank" rel="noreferrer noopener"><strong>Interactive Sandbox</strong></a>&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Market Leader in&nbsp;</strong><a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rsac-2026&amp;utm_term=300326&amp;utm_content=linktotilookup" target="_blank" rel="noreferrer noopener"><strong>Threat Intelligence</strong></a>&nbsp;&nbsp;</li>
</ul>



<p>The recognition reflects what our solutions deliver in practice: higher detection rates, lower MTTR, and faster decision-making through interactive analysis and real threat context. It highlights unified workflows that keep investigations within a single process from monitoring to response, along with the ability to scale across both&nbsp;<a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rsac-2026&amp;utm_term=300326&amp;utm_content=linktosocs" target="_blank" rel="noreferrer noopener">enterprise SOCs</a>&nbsp;and&nbsp;<a href="https://any.run/mssp/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rsac-2026&amp;utm_term=300326&amp;utm_content=linktomssp" target="_blank" rel="noreferrer noopener">MSSPs</a>.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">36%</span> higher DR. <span class="highlight">3×</span> stronger SOC performance.<br>Achieve stronger security with ANY.RUN. 
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=rsac-2026&#038;utm_term=300326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate for your team 
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">About ANY.RUN&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=rsac-2026&amp;utm_term=300326&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>&nbsp;provides interactive malware analysis and actionable threat intelligence designed for modern security teams.&nbsp;</p>



<p>Our solutions combine an Interactive Sandbox, Threat Intelligence Lookup, and Threat Intelligence Feeds to help SOC and MSSP teams analyze threats faster, investigate incidents with deeper context, and detect emerging attacks earlier.&nbsp;</p>



<p>Trusted by more than 15,000 organizations and over 600,000 security professionals worldwide, including 74% of Fortune 100 companies, ANY.RUN&nbsp;maintains&nbsp;a strong focus on data protection and compliance, while continuously evolving its solutions to address real-world threat detection and investigation challenges for SOCs and MSSPs.&nbsp;</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/rsac-2026-highlights/">ANY.RUN at RSAC™ 2026: Highlights &amp; Industry Recognition</a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/cybersecurity-blog/rsac-2026-highlights/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud </title>
		<link>/cybersecurity-blog/banks-magecart-campaign/</link>
					<comments>/cybersecurity-blog/banks-magecart-campaign/#respond</comments>
		
		<dc:creator><![CDATA[khr0x and raptur3]]></dc:creator>
		<pubDate>Thu, 26 Mar 2026 10:32:47 +0000</pubDate>
				<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware analysis]]></category>
		<guid isPermaLink="false">/cybersecurity-blog/?p=19577</guid>

					<description><![CDATA[<p>A large-scale magecart operation remained active for over 24 months, leveraging an infrastructure of 100+ domains. While the targeted victims are e-commerce websites, the actual pressure falls on banks and payment systems. As&#160;ANY.RUN’s&#160;analysis&#160;shows, threat actors applied multi-step checkout hijacking, payment&#160;page&#160;mimicry,&#160;and&#160;WebSocket-based&#160;exfiltration of card data.&#160; This report provides both&#160;executive-level insights&#160;and&#160;technical&#160;analysis&#160;of the campaign.&#160; Key Takeaways&#160; Campaign Overview&#160; A [&#8230;]</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/banks-magecart-campaign/">Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A large-scale magecart operation remained active for over 24 months, leveraging an infrastructure of 100+ domains. While the targeted victims are e-commerce websites, the actual pressure falls on <a href="https://any.run/by-industry/finance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktofinancelanding" target="_blank" rel="noreferrer noopener">banks and payment systems</a>.</p>



<p>As&nbsp;<a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>’s&nbsp;analysis&nbsp;shows, threat actors applied multi-step checkout hijacking, payment&nbsp;page&nbsp;mimicry,&nbsp;and&nbsp;WebSocket-based&nbsp;exfiltration of card data.&nbsp;</p>



<p>This report provides both&nbsp;executive-level insights&nbsp;and&nbsp;technical&nbsp;analysis&nbsp;of the campaign.&nbsp;</p>



<h2 class="wp-block-heading">Key Takeaways&nbsp;</h2>



<ul class="wp-block-list">
<li>The campaign&nbsp;demonstrates&nbsp;<strong>long-term persistence </strong>(24+&nbsp;months)&nbsp;supported by highly resilient infrastructure.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Banks</strong> (not merchants) <strong>bear the primary impact</strong>, as stolen card data leads to fraud losses&nbsp;and&nbsp;reputational risk.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Payment system mimicry (notably&nbsp;Redsys)<strong>&nbsp;significantly increases attack success</strong> by embedding fraud into trusted user flows.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Use of&nbsp;<strong>WebSocket exfiltration&nbsp;</strong>reduces visibility in traditional security&nbsp;monitoring tools.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Multi-stage,&nbsp;dynamically delivered payloads&nbsp;allow attackers to <strong>adapt quickly&nbsp;</strong>and&nbsp;evade disruption.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The campaign is&nbsp;global but <strong>regionally tailored</strong>,&nbsp;leveraging&nbsp;localized payment ecosystems to enhance credibility.&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Campaign Overview&nbsp;</h2>



<p>A large-scale&nbsp;magecart&nbsp;operation has been&nbsp;identified,&nbsp;active for at least&nbsp;24&nbsp;months&nbsp;and&nbsp;supported by&nbsp;over 100 domains.&nbsp;In observed cases, threat actors deployed a&nbsp;multi-stage checkout hijacking framework, incorporating:&nbsp;</p>



<ul class="wp-block-list">
<li>Payment step substitution&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>WebSocket-based exfiltration of payment card data&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Payment page mimicry, including infrastructure-level impersonation of legitimate providers (notably Redsys)</li>
</ul>



<ul class="wp-block-list">
<li>Dynamic frontend adaptation of payment interfaces matching different storefronts and scenarios</li>
</ul>



<p>A total of&nbsp;17 WooCommerce websites&nbsp;were infected between February 2024&nbsp;and&nbsp;April 2025&nbsp;and&nbsp;are&nbsp;likely linked&nbsp;to this campaign, reflecting its&nbsp;longevity&nbsp;and&nbsp;operational stability.&nbsp;</p>



<h2 class="wp-block-heading">Industrial&nbsp;and&nbsp;Regional&nbsp;Context&nbsp;Behind Global Impact&nbsp;</h2>



<p>The geographic&nbsp;scope is&nbsp;of the campaign is global. Among the victims are organizations from at least 12 countries,&nbsp;including&nbsp;the&nbsp;United&nbsp;Kingdom&nbsp;and&nbsp;Denmark. However,&nbsp;there’s&nbsp;a notable concentration of&nbsp;such&nbsp;incidents in Spain, France,&nbsp;and&nbsp;United States.&nbsp;</p>



<p>Some cases are confirmed directly via telemetry&nbsp;and&nbsp;network&nbsp;traffic,&nbsp;while&nbsp;others are&nbsp;identified&nbsp;via&nbsp;infrastructural&nbsp;correlation.&nbsp;</p>



<p>From&nbsp;an&nbsp;<a href="https://any.run/cybersecurity-blog/industry-geo-threat-landscape/" target="_blank" rel="noreferrer noopener">industry</a>&nbsp;perspective,&nbsp;mostly retail e-commerce&nbsp;companies&nbsp;were&nbsp;targeted, although&nbsp;in some cases,&nbsp;non-commercial&nbsp;organizations&nbsp;have&nbsp;been affected, too.&nbsp;</p>



<p>However, the&nbsp;primary&nbsp;pressure here falls on&nbsp;<a href="https://any.run/cybersecurity-blog/cyber-threat-intelligence-for-finance/" target="_blank" rel="noreferrer noopener">banks</a>, as cardholders faced&nbsp;financial exposure&nbsp;and&nbsp;their trust in payment systems suffered.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Protect your company with  <span class="highlight">early visibility</span><br>To reduce dwell time, pressure, and losses 
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=banks-magecart-campaign&#038;utm_term=260326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate ANY.RUN in your SOC 
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Why&nbsp;Redsys&nbsp;and&nbsp;Spanish Payment Context Stand&nbsp;Out&nbsp;</h2>



<p>Despite the global impact,&nbsp;the&nbsp;ties&nbsp;to Spain&nbsp;and&nbsp;its payment ecosystem&nbsp;in particular are&nbsp;obvious in&nbsp;this&nbsp;magecart&nbsp;campaign.&nbsp;&nbsp;</p>



<p>Mimicry of&nbsp;RedSys, a payment system used in Spain, lies in the foundation of the attacks. The campaign infrastructure features domains&nbsp;and&nbsp;visual artifacts&nbsp;designed to fit Spanish payment context. In some cases, user payment flows included&nbsp;<a href="https://any.run/cybersecurity-blog/enterprise-phishing-analysis/" target="_blank" rel="noreferrer noopener">legitimate</a>&nbsp;Redsys&nbsp;domain sis.redsys.es for added credibility.&nbsp;</p>



<p>The approach made the malicious activity of&nbsp;the campaign&nbsp;convincing within Spanish payment context.&nbsp;</p>



<h2 class="wp-block-heading">What&nbsp;Makes This Campaign Durable&nbsp;</h2>



<p><strong>Payment Mimicry&nbsp;</strong>&nbsp;</p>



<p>A significant portion&nbsp;of the infrastructure is registered via&nbsp;NICENIC INTERNATIONAL GROUP&nbsp;and&nbsp;disguised as&nbsp;legitimate web services, including&nbsp;analytics platforms, CDN resources, jQuery libraries,&nbsp;andpayment&nbsp;services. If you&nbsp;access them directly,&nbsp;they’ll&nbsp;act as technical&nbsp;placeholders&nbsp;or will simulate&nbsp;legitimate redirects. This complicates attribution.&nbsp;</p>



<p><strong>Multi-Stage Delivery Architecture</strong>&nbsp;</p>



<p>The injected JavaScript&nbsp;contains&nbsp;only a minor loader that&nbsp;connects&nbsp;to external infrastructure, receives configuration data,&nbsp;and&nbsp;loads&nbsp;the next stage. The loader uses the fallback mechanism: it iterates through backup domains until a&nbsp;valid&nbsp;response is&nbsp;received. This allows the campaign to go on even if some&nbsp;components of the infrastructure get blocked.&nbsp;</p>



<p><strong>Dynamic Payload Delivery</strong>&nbsp;</p>



<p>The next stage&nbsp;isn’t&nbsp;openly stored inside&nbsp;an&nbsp;infected file.&nbsp;It’s&nbsp;delivered dynamically via a staging response. Thanks to this, the operators&nbsp;modify&nbsp;delivery domains, payload paths,&nbsp;and&nbsp;control&nbsp;infrastructurewithout infecting the website again.&nbsp;&nbsp;</p>



<p>Different domains&nbsp;aren’t&nbsp;necessarily&nbsp;serve&nbsp;different campaigns. Instead, they have&nbsp;different roles: staging&nbsp;responses,&nbsp;payload delivery,&nbsp;or for&nbsp;WebSocket/C2&nbsp;and&nbsp;command&nbsp;handlers.&nbsp;</p>



<p><strong>Other Factors</strong>&nbsp;</p>



<ul class="wp-block-list">
<li>State persistence in&nbsp;localStorage&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Masquerading as&nbsp;legitimate external dependencies&nbsp;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>WebSocket usage as a channel for control&nbsp;and&nbsp;exfiltration&nbsp;</li>
</ul>



<p>As a result, the&nbsp;compromised&nbsp;website becomes only&nbsp;an&nbsp;initial&nbsp;access point.&nbsp;Subsequent&nbsp;payload delivery&nbsp;and&nbsp;data exfiltration can&nbsp;be flexibly&nbsp;modified&nbsp;inside the external infrastructure.&nbsp;</p>



<h2 class="wp-block-heading">Technical&nbsp;analysis&nbsp;</h2>



<h3 class="wp-block-heading">Initial Loader Delivery&nbsp;and&nbsp;Execution&nbsp;</h3>



<p>Following the compromise of a website, attackers&nbsp;modify&nbsp;one of the site’s embedded JavaScript files with a&nbsp;small, obfuscated&nbsp;loader.&nbsp;It&nbsp;doesn’t&nbsp;feature&nbsp;the main card-stealing logic but acts as&nbsp;an&nbsp;initialdelivery tool. It&nbsp;executes in&nbsp;the victim’s browser&nbsp;and&nbsp;receives parameters for the next stage&nbsp;from&nbsp;external infrastructure.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="876" height="71" src="/cybersecurity-blog/wp-content/uploads/2026/03/image6-1.png" alt="" class="wp-image-19584" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image6-1.png 876w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-1-300x24.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-1-768x62.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-1-370x30.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-1-270x22.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-1-740x60.png 740w" sizes="(max-width: 876px) 100vw, 876px" /><figcaption class="wp-element-caption"><em>Injected&nbsp;JavaScipt&nbsp;</em></figcaption></figure></div>


<p>Next, the&nbsp;obfuscated&nbsp;part of the loader refers to one of the pre-determined&nbsp;domains from the fallback infrastructure list. It returns a JSON configuration featuring the next&nbsp;stage’s&nbsp;address,&nbsp;WebSocket/C2 server address,&nbsp;and&nbsp;an&nbsp;extra HTTP handler for auxiliary communication.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="365" height="167" src="/cybersecurity-blog/wp-content/uploads/2026/03/image7-2.png" alt="" class="wp-image-19585" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image7-2.png 365w, /cybersecurity-blog/wp-content/uploads/2026/03/image7-2-300x137.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image7-2-270x124.png 270w" sizes="(max-width: 365px) 100vw, 365px" /><figcaption class="wp-element-caption"><em>Domain examples&nbsp;</em></figcaption></figure></div>


<p>These values are delivered as encoded arrays of&nbsp;numeric&nbsp;character codes, which are then&nbsp;decrypted&nbsp;in the victim’s browser.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="716" height="228" src="/cybersecurity-blog/wp-content/uploads/2026/03/image8-2.png" alt="" class="wp-image-19586" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image8-2.png 716w, /cybersecurity-blog/wp-content/uploads/2026/03/image8-2-300x96.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image8-2-370x118.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image8-2-270x86.png 270w" sizes="(max-width: 716px) 100vw, 716px" /><figcaption class="wp-element-caption"><em>An&nbsp;example of JSON configuration.&nbsp;ANY.RUN Interactive Sandbox&nbsp;</em></figcaption></figure></div>


<p>In case no response was received or the JSON was invalid, the loader automatically switches to the next domain from the list.&nbsp;<strong>This mechanism ensures continued operation even in the presence of partial infrastructure disruption or blocking.</strong>&nbsp;</p>



<h3 class="wp-block-heading">Stage 1:&nbsp;Malicious Payload&nbsp;Delivery&nbsp;and&nbsp;Execution&nbsp;</h3>



<p>After receiving a&nbsp;valid&nbsp;staging response, the loader takes the URL of the next JavaScript&nbsp;and&nbsp;dynamically adds it to the&nbsp;DOM via a new &lt;script&nbsp;src=&#8230;&gt;&nbsp;element.&nbsp;</p>



<div class="wp-block-media-text is-stacked-on-mobile"><figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="615" height="354" src="/cybersecurity-blog/wp-content/uploads/2026/03/image9-2.png" alt="" class="wp-image-19631 size-full" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image9-2.png 615w, /cybersecurity-blog/wp-content/uploads/2026/03/image9-2-300x173.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image9-2-370x213.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image9-2-270x155.png 270w" sizes="(max-width: 615px) 100vw, 615px" /></figure><div class="wp-block-media-text__content">
<p><em>Code fragment responsible for the execution of the malicious activity&nbsp;</em></p>
</div></div>



<p>At this point, the&nbsp;primary malicious payload&nbsp;is loaded into the page. Notably, this payload may be delivered from different domains, such as:&nbsp;</p>



<p>jquerybootstrap[.]com&nbsp;</p>



<p>newassetspro[.]com&nbsp;</p>



<p>assetsbundle[.]com&nbsp;</p>



<p>bundlefeedback[.]com&nbsp;</p>



<p>and&nbsp;others.&nbsp;</p>



<p>In&nbsp;any case, the delivery stage is the same. The operators <strong>rotate payload sources</strong> to increase the infrastructure’s durability.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Get started with ANY.RUN</span><br>Catch emerging threats in under a minute early visibility
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://app.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=banks-magecart-campaign&#038;utm_term=260326&#038;utm_content=linktoregister#register" rel="noopener" target="_blank">
Get started 
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">Stage 2:&nbsp;Payment Step Activation&nbsp;</h3>



<p>After loading, the main payload begins executing within the context of the store’s webpage&nbsp;and&nbsp;waits for the checkout/payment DOM to appear.&nbsp;</p>



<p>At this stage, it:&nbsp;</p>



<ul class="wp-block-list">
<li>monitors the opening of the payment step;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>interacts with checkout elements;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>replaces or overlays the&nbsp;legitimate payment interface;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>injects its own elements, including&nbsp;iframes&nbsp;and&nbsp;custom buttons;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>hides the real payment confirmation elements.&nbsp;</li>
</ul>



<p>Once checkout is loaded, payment hijacking begins.&nbsp;</p>



<h3 class="wp-block-heading">Observed Code Patterns Indicative of Payment Hijacking&nbsp;</h3>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/03/image1e-1024x1024.png" alt="" class="wp-image-19590" style="width:650px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image1e-1024x1024.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image1e-300x300.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image1e-150x150.png 150w, /cybersecurity-blog/wp-content/uploads/2026/03/image1e-768x768.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image1e-1536x1536.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/image1e-2048x2048.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/image1e-70x70.png 70w, /cybersecurity-blog/wp-content/uploads/2026/03/image1e-370x370.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image1e-270x270.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image1e-740x740.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Delayed activation&nbsp;ensures&nbsp;the user follows through until they reach the required payment step&nbsp;</em></figcaption></figure></div>

<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/03/image1f-1024x1024.png" alt="" class="wp-image-19591" style="width:650px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image1f-1024x1024.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image1f-300x300.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image1f-150x150.png 150w, /cybersecurity-blog/wp-content/uploads/2026/03/image1f-768x768.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image1f-1536x1536.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/image1f-2048x2048.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/image1f-70x70.png 70w, /cybersecurity-blog/wp-content/uploads/2026/03/image1f-370x370.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image1f-270x270.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image1f-740x740.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Attackers conceal the&nbsp;legitimate payment button&nbsp;and&nbsp;replace it with a fake one</em></figcaption></figure></div>

<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/03/image20-1024x1024.png" alt="" class="wp-image-19593" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image20-1024x1024.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image20-300x300.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image20-150x150.png 150w, /cybersecurity-blog/wp-content/uploads/2026/03/image20-768x768.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image20-1536x1536.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/image20-2048x2048.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/image20-70x70.png 70w, /cybersecurity-blog/wp-content/uploads/2026/03/image20-370x370.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image20-270x270.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image20-740x740.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>The script not only runs in the background but fully overlays/replaces the interface&nbsp;</em></figcaption></figure></div>

<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/03/image21-1024x1024.png" alt="" class="wp-image-19594" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image21-1024x1024.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image21-300x300.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image21-150x150.png 150w, /cybersecurity-blog/wp-content/uploads/2026/03/image21-768x768.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image21-1536x1536.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/image21-2048x2048.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/image21-70x70.png 70w, /cybersecurity-blog/wp-content/uploads/2026/03/image21-370x370.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image21-270x270.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image21-740x740.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>The form&nbsp;isn’t&nbsp;static but&nbsp;controlled&nbsp;and&nbsp;manageable&nbsp;</em></figcaption></figure></div>


<p>In some&nbsp;cases,&nbsp;the mimicry is built around a payment scenario that is visually&nbsp;and&nbsp;logically close to a&nbsp;legitimate PSP flow. In cases related to Spain&nbsp;Redsys&nbsp;mimicry is especially notable, but&nbsp;payment overall can&nbsp;a<strong>dapt to storefronts, countries,&nbsp;and&nbsp;local PSPs.</strong>&nbsp;</p>



<h3 class="wp-block-heading">Script&nbsp;Deobfuscation&nbsp;</h3>



<p>The core payload waits for the checkout form to appear&nbsp;and&nbsp;is responsible for&nbsp;the reception, validation,&nbsp;and&nbsp;sending&nbsp;payment data from the fake payment form.&nbsp;</p>



<h3 class="wp-block-heading"><strong>Notable Code Features&nbsp;Inside the Script</strong>&nbsp;</h3>



<div class="wp-block-media-text alignwide is-stacked-on-mobile"><figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="624" height="411" src="/cybersecurity-blog/wp-content/uploads/2026/03/image22.png" alt="" class="wp-image-19595 size-full" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image22.png 624w, /cybersecurity-blog/wp-content/uploads/2026/03/image22-300x198.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image22-370x244.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image22-270x178.png 270w" sizes="(max-width: 624px) 100vw, 624px" /></figure><div class="wp-block-media-text__content">
<p><em>The payload adapts to user&nbsp;environments with frontend localization capabilities&nbsp;and supports multiple languages: English, Spanish, Arabic, French.&nbsp;&nbsp;&nbsp;</em></p>
</div></div>



<div class="wp-block-media-text alignwide is-stacked-on-mobile"><figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="624" height="439" src="/cybersecurity-blog/wp-content/uploads/2026/03/image23.png" alt="" class="wp-image-19597 size-full" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image23.png 624w, /cybersecurity-blog/wp-content/uploads/2026/03/image23-300x211.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image23-370x260.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image23-270x190.png 270w" sizes="(max-width: 624px) 100vw, 624px" /></figure><div class="wp-block-media-text__content">
<p><em>There’s&nbsp;a state machine with the following states:&nbsp;init, return, confirm, alert,&nbsp;getData, allowing for controlled progression through the attack lifecycle.&nbsp;</em></p>
</div></div>



<div class="wp-block-media-text alignwide is-stacked-on-mobile"><figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="536" height="504" src="/cybersecurity-blog/wp-content/uploads/2026/03/image24.png" alt="" class="wp-image-19598 size-full" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image24.png 536w, /cybersecurity-blog/wp-content/uploads/2026/03/image24-300x282.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image24-370x348.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image24-270x254.png 270w" sizes="(max-width: 536px) 100vw, 536px" /></figure><div class="wp-block-media-text__content">
<p><em>Code for handling WebSocket connections to the C2 server for&nbsp;the&nbsp;control&nbsp;of the attack flow.&nbsp;&nbsp;Part 1.</em></p>
</div></div>



<div class="wp-block-media-text alignwide is-stacked-on-mobile"><figure class="wp-block-media-text__media"><img loading="lazy" decoding="async" width="582" height="624" src="/cybersecurity-blog/wp-content/uploads/2026/03/image25-1.png" alt="" class="wp-image-19599 size-full" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image25-1.png 582w, /cybersecurity-blog/wp-content/uploads/2026/03/image25-1-280x300.png 280w, /cybersecurity-blog/wp-content/uploads/2026/03/image25-1-370x397.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image25-1-270x289.png 270w" sizes="(max-width: 582px) 100vw, 582px" /></figure><div class="wp-block-media-text__content">
<p><em>Code for handling WebSocket connections to the C2 server. Part 2</em></p>
</div></div>



<p>An example of the final result of the mimicry can be seen below:</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="624" height="217" src="/cybersecurity-blog/wp-content/uploads/2026/03/image26-3.png" alt="" class="wp-image-19623" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image26-3.png 624w, /cybersecurity-blog/wp-content/uploads/2026/03/image26-3-300x104.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image26-3-370x129.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image26-3-270x94.png 270w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption class="wp-element-caption"><em>Base64-encoded HTML page&nbsp;is responsible for&nbsp;displaying a fake payment interface</em></figcaption></figure></div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="624" height="449" src="/cybersecurity-blog/wp-content/uploads/2026/03/image27-1.png" alt="" class="wp-image-19624" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image27-1.png 624w, /cybersecurity-blog/wp-content/uploads/2026/03/image27-1-300x216.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image27-1-370x266.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image27-1-270x194.png 270w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption class="wp-element-caption"><em>&nbsp;PayPlug&nbsp;SAS payment window imitation</em></figcaption></figure></div>


<p>There’s&nbsp;a heavily obfuscated JavaScript inside the HTML page. It uses techniques like that to avoid detection:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Anti-tampering</strong>:&nbsp;code integrity is verified via function serialization, as well as bitwise &amp; arithmetical operations.&nbsp;</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="624" height="314" src="/cybersecurity-blog/wp-content/uploads/2026/03/image28.png" alt="" class="wp-image-19606" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image28.png 624w, /cybersecurity-blog/wp-content/uploads/2026/03/image28-300x151.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image28-370x186.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image28-270x136.png 270w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption class="wp-element-caption"><em>Code fragment confirming&nbsp;anti-tampering</em>&nbsp;</figcaption></figure></div>


<ul class="wp-block-list">
<li><strong>Virtualization</strong>: Custom VM’s opcodes,&nbsp;symbolic&nbsp;execution, code strings executed via eval call.&nbsp;</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="624" height="175" src="/cybersecurity-blog/wp-content/uploads/2026/03/image29.png" alt="" class="wp-image-19607" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image29.png 624w, /cybersecurity-blog/wp-content/uploads/2026/03/image29-300x84.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image29-370x104.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image29-270x76.png 270w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption class="wp-element-caption">A fragment of the raw load&nbsp;</figcaption></figure></div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="241" height="485" src="/cybersecurity-blog/wp-content/uploads/2026/03/image-8.png" alt="" class="wp-image-19579" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image-8.png 241w, /cybersecurity-blog/wp-content/uploads/2026/03/image-8-149x300.png 149w" sizes="(max-width: 241px) 100vw, 241px" /><figcaption class="wp-element-caption">VM’s opcode description fragment&nbsp;&nbsp;</figcaption></figure></div>


<p>The strings that are stored in&nbsp;an&nbsp;obfuscated form are decrypted using&nbsp;the VM:&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="624" height="94" src="/cybersecurity-blog/wp-content/uploads/2026/03/image2b.png" alt="" class="wp-image-19608" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image2b.png 624w, /cybersecurity-blog/wp-content/uploads/2026/03/image2b-300x45.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image2b-370x56.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image2b-270x41.png 270w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption class="wp-element-caption"><em>Raw obfuscated strings&nbsp;&nbsp;</em></figcaption></figure></div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="479" height="624" src="/cybersecurity-blog/wp-content/uploads/2026/03/image2c.png" alt="" class="wp-image-19609" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image2c.png 479w, /cybersecurity-blog/wp-content/uploads/2026/03/image2c-230x300.png 230w, /cybersecurity-blog/wp-content/uploads/2026/03/image2c-370x482.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image2c-270x352.png 270w" sizes="(max-width: 479px) 100vw, 479px" /><figcaption class="wp-element-caption"><em>Deobfuscated&nbsp;strings&nbsp;&nbsp;</em></figcaption></figure></div>


<p>The payload&nbsp;is responsible for&nbsp;the formatting&nbsp;and&nbsp;validation of Visa/Mastercard payment data that are entered into the fake form, as well as UI state modification,&nbsp;and&nbsp;event or data delivery via&nbsp;postMessagemethod:</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="624" height="424" src="/cybersecurity-blog/wp-content/uploads/2026/03/image2d.png" alt="" class="wp-image-19610" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image2d.png 624w, /cybersecurity-blog/wp-content/uploads/2026/03/image2d-300x204.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image2d-370x251.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image2d-270x183.png 270w" sizes="(max-width: 624px) 100vw, 624px" /><figcaption class="wp-element-caption"><em>PostMessage method for data delivery</em>&nbsp;</figcaption></figure></div>


<h3 class="wp-block-heading">Stage 3: Connecting to Control Infrastructure&nbsp;</h3>



<p>After activation, the malicious payload&nbsp;establishes&nbsp;a connection to the control infrastructure, e.g., via WebSocket.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-1024x1024.png" alt="" class="wp-image-19611" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-1024x1024.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-300x300.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-150x150.png 150w, /cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-768x768.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-1536x1536.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-2048x2048.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-70x70.png 70w, /cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-370x370.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-270x270.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image2e-1-740x740.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">W<em>ebSocket exfiltration code</em>&nbsp;</figcaption></figure></div>


<p>This channel is used for:&nbsp;</p>



<ul class="wp-block-list">
<li>transmitting service events;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>sending BIN (Bank Identification Number) data;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>transmitting full payment card details;&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>receiving&nbsp;additional&nbsp;commands to control the replaced payment flow.&nbsp;</li>
</ul>



<p>In one of the&nbsp;analyzed cases, WebSocket was used as the primary channel for card data exfiltration, while the C2 server was disguised as a&nbsp;Redsys&nbsp;domain (redsysgate[.]com).&nbsp;</p>



<p>During the skimmer’s operation, it retrieves malicious&nbsp;JavaScripts&nbsp;from URLs&nbsp;that look&nbsp;like so:&nbsp;<br>hxxps://&lt;c2_domain&gt;/&lt;base64_text&gt;.js?_=&lt;digits&gt;&nbsp;</p>



<p>Then, WebSocket connections are used for control&nbsp;and&nbsp;data transmission at:&nbsp;<br>wss://&lt;c2_domain&gt;/?token=&lt;base64_data&gt;&nbsp;</p>



<p>When the user enters their data,&nbsp;an&nbsp;event is sent&nbsp;containing&nbsp;the exfiltrated information. In response, the server provides instructions on what to do next&nbsp;and&nbsp;what content to display, such as the logo of the payment system associated with the entered card (Visa/MasterCard).&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="921" height="156" src="/cybersecurity-blog/wp-content/uploads/2026/03/image1d.png" alt="" class="wp-image-19612" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image1d.png 921w, /cybersecurity-blog/wp-content/uploads/2026/03/image1d-300x51.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image1d-768x130.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image1d-370x63.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image1d-270x46.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image1d-740x125.png 740w" sizes="(max-width: 921px) 100vw, 921px" /><figcaption class="wp-element-caption"><em>Card data (random numbers used&nbsp;an&nbsp;example) in&nbsp;a code fragment&nbsp;</em>&nbsp;</figcaption></figure></div>


<p>This is important for the understanding of the campaign: attackers are not simply stealing card&nbsp;data,&nbsp;they <strong>embed exfiltration</strong> into a&nbsp;seemingly&nbsp;legitimate&nbsp;payment context.&nbsp;</p>



<h3 class="wp-block-heading">Stage 4:&nbsp;Interception&nbsp;and&nbsp;Transmission of Payment Data&nbsp;</h3>



<p>When a user enters their card details into the spoofed payment interface, the payload takes them to the attackers’ external infrastructure.&nbsp;</p>



<p>The following data was&nbsp;being transmitted in network traffic:&nbsp;</p>



<ul class="wp-block-list">
<li>BIN&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>full card number&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>expiration&nbsp;date&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>CVV&nbsp;</li>
</ul>



<p>The transmission does not occur via a standard&nbsp;form&nbsp;POST request, but instead through a separate WebSocket channel, making detection via conventional HTTP logs more difficult.&nbsp;</p>



<p>Importantly, within the same cluster,&nbsp;<strong>the visual scenario of the attack may vary</strong>. In some cases,&nbsp;Redsys-themed mimicry is&nbsp;observed; in others,&nbsp;PayPlug-like or generic card form scenarios are used.&nbsp;</p>



<p>This does not necessarily&nbsp;indicate&nbsp;different campaigns: within a single malware family, the same loader, staging infrastructure,&nbsp;and&nbsp;exfiltration mechanism may be reused while applying different front-end disguises.&nbsp;</p>



<h3 class="wp-block-heading">Additional Vector: Distribution of&nbsp;Android APK via the Same Inject&nbsp;</h3>



<p>In addition to manipulating the payment step&nbsp;and&nbsp;stealing card data, the same malicious payload was also used as a platform to push the installation of&nbsp;an&nbsp;<a href="https://any.run/cybersecurity-blog/android-malware-analysis/" target="_blank" rel="noreferrer noopener">Android</a>&nbsp;application in APK format.&nbsp;</p>



<p>The script checked the user’s environment&nbsp;and, if certain conditions were met, displayed a separate mobile scenario offering the user to download&nbsp;an&nbsp;app. This included promises of discounts or bonuses, along with instructions on how to enable installation from “Unknown Sources.”&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Reduce <span class="highlight">breach risks</span> with ANY.RUN<br>Android, macOS, Windows, and Linux analysis support
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=banks-magecart-campaign&#038;utm_term=260326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Request for your SOC 
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>Based on the contents of the payloads, this scenario was localized into at least several languages, including English, Spanish, Arabic,&nbsp;and&nbsp;French. This&nbsp;indicates&nbsp;that the campaign was targeting a broad international audience&nbsp;and&nbsp;relied on a prepared, rather than&nbsp;ad hoc, infrastructure.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-1024x1024.png" alt="" class="wp-image-19614" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-1024x1024.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-300x300.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-150x150.png 150w, /cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-768x768.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-1536x1536.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-2048x2048.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-70x70.png 70w, /cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-370x370.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-270x270.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image2f-1-740x740.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Code fragment for Android-specific flow</em>&nbsp;</figcaption></figure></div>


<p>This scenario had several localization options, including English, Spanish, Arabian,&nbsp;and&nbsp;French,&nbsp;indicating&nbsp;the campaign’s global focus&nbsp;targeting particular, not&nbsp;random infrastructures.&nbsp;</p>



<h2 class="wp-block-heading">Conclusion&nbsp;</h2>



<p>This&nbsp;magecart&nbsp;campaign reflects a shift from opportunistic skimming toward&nbsp;structured, infrastructure-driven payment attacks. By combining&nbsp;checkout hijacking, high-fidelity payment mimicry,&nbsp;and&nbsp;real-time exfiltration, attackers embed malicious activity directly into&nbsp;legitimate transaction flows. This not only increases effectiveness but also complicates detection&nbsp;and&nbsp;response.&nbsp;</p>



<p>Deep visibility into active attacks and continuous <a href="https://any.run/cybersecurity-blog/threat-monitoring-ti-feeds/" target="_blank" rel="noreferrer noopener">threat monitoring</a> are required for efficient detection and prevention of such breachers.</p>



<h2 class="wp-block-heading">About&nbsp;ANY.RUN&nbsp;</h2>



<p><a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>&nbsp;delivers interactive malware&nbsp;analysis&nbsp;and&nbsp;actionable threat intelligence, enabling security teams to investigate threats more efficiently, gain clearer visibility into attacker behavior,&nbsp;and&nbsp;respond with greater confidence.&nbsp;</p>



<p>We focus on:&nbsp;</p>



<ul class="wp-block-list">
<li>Maintaining&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certification</a>&nbsp;and&nbsp;a strong commitment to safeguarding customer data&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Continuously enhancing our&nbsp;Interactive Sandbox,&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Lookup</a>,&nbsp;and&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence&nbsp;Feeds</a>&nbsp;to&nbsp;support&nbsp;monitoring, triage,&nbsp;and&nbsp;incident response workflows&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Enabling SOC&nbsp;and&nbsp;<a href="https://any.run/mssp/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktomssp" target="_blank" rel="noreferrer noopener">MSSP</a>&nbsp;teams to accelerate&nbsp;analysis, improve investigative context,&nbsp;and&nbsp;detect emerging threats at&nbsp;early stages&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Analysis&nbsp;and&nbsp;Investigation Data&nbsp;</h2>



<h3 class="wp-block-heading">Link&nbsp;to&nbsp;TI Lookup query&nbsp;</h3>



<p><a href="https://intelligence.any.run/analysis/lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktoenterprise#{%22query%22:%22url:%5C%22https://*/*=.js?_=%5C%22%22,%22dateRange%22:180}" target="_blank" rel="noreferrer noopener">Browse TI Lookup for related threats</a> </p>



<h3 class="wp-block-heading">Links to sandbox&nbsp;analyses&nbsp;</h3>



<p><strong>Case 1:&nbsp;</strong>Confirmed&nbsp;checkout&nbsp;hijacking&nbsp;and&nbsp;WebSocket exfiltration of BIN, PAN, expiry date,&nbsp;and&nbsp;CVV.&nbsp;</p>



<p><a href="https://app.any.run/tasks/7e66942b-82f5-4dc7-9be3-b73ac0600fb1/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View&nbsp;analysis</a>&nbsp;</p>



<p><strong>Case 2:&nbsp;</strong>The same loader cluster&nbsp;and&nbsp;staging infrastructure but without confirmed card exfiltration (possibly due to&nbsp;redirection to a&nbsp;legitimate external payment flow)&nbsp;</p>



<p><a href="https://app.any.run/tasks/bdc77604-95af-45e5-9c83-392db57199e7/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View&nbsp;analysis</a><strong></strong>&nbsp;<br><strong>Case 3:&nbsp;</strong>Confirmed use of the same loader cluster&nbsp;and&nbsp;staging infrastructure.&nbsp;</p>



<p><a href="https://app.any.run/tasks/32a9a843-450c-442d-85ad-9c5000d6950a/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=banks-magecart-campaign&amp;utm_term=260326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View&nbsp;analysis</a>&nbsp;</p>



<h3 class="wp-block-heading">Indicators&nbsp;of&nbsp;Compromise&nbsp;(IOCs)</h3>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="768" height="1024" src="/cybersecurity-blog/wp-content/uploads/2026/03/image30-768x1024.png" alt="" class="wp-image-19615" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image30-768x1024.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image30-225x300.png 225w, /cybersecurity-blog/wp-content/uploads/2026/03/image30-1152x1536.png 1152w, /cybersecurity-blog/wp-content/uploads/2026/03/image30-1536x2048.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/image30-370x493.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image30-270x360.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image30-740x987.png 740w" sizes="(max-width: 768px) 100vw, 768px" /></figure>



<p>Payload URL:&nbsp;hxxps[:]//&lt;c2_domain&gt;/&lt;base64_text&gt;.js?_=&lt;digits&gt;&nbsp;&nbsp;</p>



<p>C2 WebSocket URL:&nbsp;wss[:]//&lt;c2_domain&gt;/?token=&lt;base64_data&gt;&nbsp;&nbsp;</p>



<p>bundle-feedback[.]com&nbsp;&nbsp;</p>



<p>doubleclickcache[.]com&nbsp;&nbsp;</p>



<p>analyticsgctm[.]com&nbsp;&nbsp;</p>



<p>hotjarcdn[.]com&nbsp;&nbsp;</p>



<p>firefoxcaptcha[.]com&nbsp;&nbsp;</p>



<p>solutionjquery[.]com&nbsp;&nbsp;</p>



<p>jquerybootstrap[.]com&nbsp;</p>



<p>assetsbundle[.]com&nbsp;</p>



<p>bundle-referrer[.]com&nbsp;</p>



<p>categorywishlist[.]com&nbsp;</p>



<p>cachesecure[.]com&nbsp;&nbsp;</p>



<p>securedata-ns[.]com&nbsp;&nbsp;</p>



<p>analysiscache[.]com&nbsp;&nbsp;</p>



<p>newassetspro[.]com&nbsp;&nbsp;</p>



<p>explorerpros[.]com&nbsp;&nbsp;</p>



<p>redsysgate[.]com&nbsp;</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/banks-magecart-campaign/">Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/cybersecurity-blog/banks-magecart-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ANY.RUN Recognized for Innovations and Market Leadership at Global InfoSec Awards 2026  </title>
		<link>/cybersecurity-blog/global-infosec-awards-2026/</link>
					<comments>/cybersecurity-blog/global-infosec-awards-2026/#respond</comments>
		
		<dc:creator><![CDATA[ANY.RUN]]></dc:creator>
		<pubDate>Thu, 26 Mar 2026 06:28:07 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware analysis]]></category>
		<guid isPermaLink="false">/cybersecurity-blog/?p=19534</guid>

					<description><![CDATA[<p>ANY.RUN has been recognized at Global InfoSec Awards 2026 by Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. The award ceremony took place during RSAC™ 2026 conference. We&#8217;re&#160;especially&#160;proud and grateful that our impact for the industry has been&#160;acknowledged&#160;in two categories&#160;at once:&#160; This dual recognition reflects the approach to cybersecurity we&#160;prioritize:&#160;supporting&#160;the full SOC [&#8230;]</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/global-infosec-awards-2026/">ANY.RUN Recognized for Innovations and Market Leadership at Global InfoSec Awards 2026  </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026&amp;utm_term=240326&amp;utm_content=linktolanding">ANY.RUN</a> has been recognized at Global InfoSec Awards 2026 by Cyber Defense Magazine (CDM), the industry’s leading electronic information security magazine. The award ceremony took place during RSAC<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> 2026 conference.</p>



<p>We&#8217;re&nbsp;especially&nbsp;proud and grateful that our impact for the industry has been&nbsp;acknowledged&nbsp;in two categories&nbsp;at once:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Innovative Malware Analysis for Sandbox</strong> </li>
</ul>



<ul class="wp-block-list">
<li><strong>Market Leader Threat Intelligence </strong> </li>
</ul>



<p>This dual recognition reflects the approach to cybersecurity we&nbsp;prioritize:&nbsp;supporting&nbsp;the full SOC workflow&nbsp;by combining advanced&nbsp;<a href="https://any.run/cybersecurity-blog/automatic-ssl-decryption/" target="_blank" rel="noreferrer noopener">malware&nbsp;and phishing&nbsp;analysis</a>&nbsp;with integrated&nbsp;<a href="https://any.run/cybersecurity-blog/reduce-soc-mttr-with-ti/" target="_blank" rel="noreferrer noopener">threat intelligence.</a>&nbsp;</p>



<h2 class="wp-block-heading"><strong>What Made This Possible</strong>&nbsp;</h2>



<p>As highlighted by the award founders at CDM, ANY.RUN matched the values they looked for in participants:  </p>



<figure class="wp-block-pullquote"><blockquote><p>“ANY.RUN embodies three major features we judges look for to become winners: understanding tomorrow’s threats, today, providing a cost-effective solution and innovating in unexpected ways that can help mitigate cyber risk and get one step ahead of the next breach.”</p><cite>Gary S. Miliefsky, Publisher of Cyber Defense Magazine. </cite></blockquote></figure>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1280" height="720" src="/cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large.jpeg" alt="" class="wp-image-19560" style="width:650px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large.jpeg 1280w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-300x169.jpeg 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-1024x576.jpeg 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-768x432.jpeg 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-370x208.jpeg 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-270x152.jpeg 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Capture00278-Large-740x416.jpeg 740w" sizes="(max-width: 1280px) 100vw, 1280px" /><figcaption class="wp-element-caption"><em style="text-align: start; white-space: normal;">ANY.RUN&#8217;s CCO received the award at the Global InfoSec Awards, RSAC conference </em></figcaption></figure></div>


<p>We believe that ANY.RUN’s <a href="https://any.run/cybersecurity-blog/g2-top-security-software-provider/" target="_blank" rel="noreferrer noopener">repeated presence</a> high in industry rankings reflects its ability to address <a href="https://any.run/cybersecurity-blog/soc-business-success-cases-anyrun/" target="_blank" rel="noreferrer noopener">operational challenges</a> across the investigation cycle. Our solutions support enterprise security teams as they successfully: </p>



<ul class="wp-block-list">
<li><strong>Unify SOC Workflow:</strong> ANY.RUN offers a single ecosystem that streamlines <a href="https://any.run/cybersecurity-blog/threat-monitoring-ti-feeds/" target="_blank" rel="noreferrer noopener">monitoring</a>, <a href="https://any.run/cybersecurity-blog/fortune-500-enterprise-success-story/" target="_blank" rel="noreferrer noopener">triage</a>, and incident response without tool switching. </li>
</ul>



<ul class="wp-block-list">
<li><strong>Accelerate Decision-Making: </strong>Interactive malware analysis combined with contextual threat intelligence delivers immediate insights, no external double-checking needed. </li>
</ul>



<ul class="wp-block-list">
<li><strong>Scale Operations for SOCs and MSSPs: </strong><a href="https://any.run/cybersecurity-blog/alert-enrichment-soc-performance/" target="_blank" rel="noreferrer noopener">Standardized workflows</a> and integrated intelligence empower teams of any size. </li>
</ul>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">36%</span> higher DR. <span class="highlight">3×</span> stronger SOC performance.<br>Achieve more with ANY.RUN. 
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=global_infosec_awards_2026&#038;utm_term=240326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate for your team 
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading"><strong>Community&nbsp;Trust in Numbers</strong>&nbsp;</h2>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="349" src="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-26-at-09.25.17-1024x349.png" alt="" class="wp-image-19538" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-26-at-09.25.17-1024x349.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-26-at-09.25.17-300x102.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-26-at-09.25.17-768x262.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-26-at-09.25.17-1536x524.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-26-at-09.25.17-370x126.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-26-at-09.25.17-270x92.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-26-at-09.25.17-740x252.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-26-at-09.25.17.png 2012w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ANY.RUN is used by SOC teams at companies and organizations worldwide</em> </figcaption></figure></div>


<p>ANY.RUN is used broadly by organizations with high security requirements, including the world’s largest enterprises:&nbsp;</p>



<ul class="wp-block-list">
<li>We support <strong>15,000+</strong> SOCs and <strong>600,000+</strong> analysts in accelerating investigations, reducing risk, and improving operational outcomes across industries. </li>
</ul>



<ul class="wp-block-list">
<li><strong>74%</strong> of <strong>Fortune 100 </strong>companies rely on ANY.RUN for malware analysis and threat investigation workflows.   </li>
</ul>



<p>We&#8217;re&nbsp;deeply thankful for&nbsp;customers, partners, and community for their continued trust.&nbsp;We appreciate&nbsp;every contribution and&nbsp;piece of&nbsp;feedback&nbsp;and&nbsp;process them&nbsp;to&nbsp;maintain&nbsp;high&nbsp;standards&nbsp;we set for&nbsp;our&nbsp;solutions.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Unify your SOC</span> with ANY.RUN.<br>Integrate for faster, smarter operations.
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=global_infosec_awards_2026&#038;utm_term=240326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate ANY.RUN 
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading"><strong>More on Global InfoSec Awards 2026&nbsp;</strong>&nbsp;</h2>



<p><strong>Global InfoSec Awards 2026 </strong>is organized by Cyber Defense Magazine, a premier source of cyber security news and information for InfoSec professions in business and government. </p>



<p>With a&nbsp;mission&nbsp;is to share&nbsp;cutting-edge&nbsp;knowledge, real-world stories and awards on the best ideas, products, and services in the information technology industry,&nbsp;they deliver monthly magazines, as well as special editions&nbsp;for the&nbsp;RSAC Conferences.&nbsp;&nbsp;&nbsp;&nbsp;</p>



<p>The award’s judges are CISSP, FMDHS, CEH, certified security professionals who voted based on their independent review of the company&nbsp;submitted&nbsp;materials on the website&nbsp;of each&nbsp;submission including but not limited to data sheets, white papers, product&nbsp;literature&nbsp;and other market variables.&nbsp;</p>



<h2 class="wp-block-heading"><strong>About ANY.RUN</strong>&nbsp;</h2>



<p>ANY.RUN provides&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026&amp;utm_term=240326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">interactive malware analysis</a>&nbsp;and&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026&amp;utm_term=240326&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">actionable threat intelligence</a>&nbsp;that&nbsp;enable&nbsp;security teams worldwide to investigate threats faster, understand attacker behavior more clearly, and respond with greater confidence.&nbsp;</p>



<p>We&nbsp;prioritize:&nbsp;</p>



<ul class="wp-block-list">
<li>Maintaining <a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026&amp;utm_term=240326&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certification</a> and commitment to protect customer data. </li>
</ul>



<ul class="wp-block-list">
<li>Constantly improving Interactive Sandbox, Threat Intelligence Lookup, and <a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026&amp;utm_term=240326&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a> for support across monitoring, triage, and response SOC processes. </li>
</ul>



<ul class="wp-block-list">
<li>Helping SOC and <a href="https://any.run/mssp/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=global_infosec_awards_2026x&amp;utm_term=240326&amp;utm_content=linktomssp" target="_blank" rel="noreferrer noopener">MSSP teams</a> accelerate analysis, gain deeper context during investigations, and identify emerging threats earlier. </li>
</ul>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/global-infosec-awards-2026/">ANY.RUN Recognized for Innovations and Market Leadership at Global InfoSec Awards 2026  </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/cybersecurity-blog/global-infosec-awards-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide </title>
		<link>/cybersecurity-blog/kamasers-technical-analysis/</link>
					<comments>/cybersecurity-blog/kamasers-technical-analysis/#respond</comments>
		
		<dc:creator><![CDATA[Achmad Adhikara, 4OURUP and GridGuardGhoul]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 10:20:25 +0000</pubDate>
				<category><![CDATA[Malware Analysis]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware analysis]]></category>
		<guid isPermaLink="false">/cybersecurity-blog/?p=19450</guid>

					<description><![CDATA[<p>DDoS attacks are no longer only an infrastructure problem. They can quickly turn into a business issue, affecting uptime, customer experience, and operational stability. Kamasers is a strong example of this new reality, with broad attack capabilities and resilient command-and-control mechanisms that allow it to remain active under pressure. Let’s explore the Kamasers botnet through [&#8230;]</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/kamasers-technical-analysis/">Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>DDoS attacks are no longer only an infrastructure problem. They can quickly turn into a <strong>business issue</strong>, affecting uptime, customer experience, and operational stability. Kamasers is a strong example of this new reality, with broad attack capabilities and resilient command-and-control mechanisms that allow it to remain active under pressure.</p>



<p>Let’s explore the Kamasers botnet through both <strong>technical and <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">behavioral analysis</a></strong>, looking at the commands it receives, the geographic distribution of its attacks, and the functions implemented in the malware sample. Together, these elements help reveal how Kamasers operates and why it poses a serious threat to organizations worldwide</p>



<h2 class="wp-block-heading">Key Takeaways&nbsp;</h2>



<ul class="wp-block-list">
<li>Kamasers&nbsp;is a sophisticated&nbsp;<strong>DDoS botnet</strong>&nbsp;that supports both&nbsp;application-layer and transport-layer attacks, including HTTP, TLS, UDP, TCP, and&nbsp;GraphQL-based flooding.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The malware can also act as a <strong>loader</strong>, downloading and executing additional payloads, which raises the risk of <strong>further compromise, data theft, and ransomware deployment</strong>.</li>
</ul>



<ul class="wp-block-list">
<li>Its&nbsp;<strong>C2 infrastructure is resilient</strong>, using a&nbsp;Dead Drop Resolver (DDR)&nbsp;through legitimate public services such as&nbsp;GitHub Gist, Telegram, Dropbox, Bitbucket, and even&nbsp;Etherscan&nbsp;to retrieve&nbsp;active C2 addresses.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Analysis showed that&nbsp;<strong>Railnet&nbsp;ASN</strong>&nbsp;repeatedly appeared in malicious activity tied to multiple malware families, making it a notable infrastructure element in the broader threat landscape.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Kamasers&nbsp;was&nbsp;observed&nbsp;being distributed through&nbsp;<strong>GCleaner</strong>&nbsp;and&nbsp;<strong>Amadey</strong>, showing that it fits into established malware delivery chains.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>The botnet’s activity is <strong>international</strong>, with strong submission visibility in <strong>Germany and the United States</strong>, while targeting extends across sectors including <strong>education, telecom, and technology</strong>.</li>
</ul>



<h2 class="wp-block-heading">The Business Risk Behind&nbsp;Kamasers&nbsp;</h2>



<p>Kamasers&nbsp;is a flexible attack platform that can turn compromised enterprise systems into operational liabilities, external attack infrastructure, and potential entry points for deeper compromise:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Corporate infrastructure can be turned against others:</strong>&nbsp;Infected enterprise systems may be used to launch DDoS attacks on third parties, creating reputational, contractual, and even legal risk for the organization.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>A broader incident can follow quickly:</strong>&nbsp;Because&nbsp;Kamasers&nbsp;can function as a loader, a single infection may lead to&nbsp;additional&nbsp;payload delivery, raising the risk of data theft, ransomware, and deeper intrusion.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Visibility gaps become harder to defend:</strong>&nbsp;The malware uses legitimate public services to retrieve C2 information, making malicious communication more difficult to detect and increasing the chance of delayed response.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Response costs rise fast:</strong>&nbsp;Investigating infected hosts,&nbsp;validating&nbsp;external impact, restoring systems, and handling&nbsp;possible IP&nbsp;blacklisting can create significant operational and financial strain.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li><strong>Business trust can be affected early:</strong>&nbsp;If company&nbsp;infrastructure is linked to malicious traffic, customers, partners, and providers may react before the full incident is even understood.&nbsp;</li>
</ul>



<p>Kamasers&nbsp;highlights a serious enterprise risk:&nbsp;attackers can use resilient C2 discovery, flexible attack methods, and follow-on payload delivery to turn a single compromise into an incident with operational, financial, compliance, and reputational consequences.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Gain <span class="highlight">earlier visibility
</span>into disruptive threats <br><span class="highlight">Reduce the risk</span> of downtime, pressure, and loss
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=kamasers-technical-analysis&#038;utm_term=250326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Power up your SOC
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Kamasers&nbsp;Threat&nbsp;Overview&nbsp;</h2>



<p>Kamasers&nbsp;is a malware botnet family designed to carry out DDoS attacks using both application-layer and transport-layer vectors. It supports HTTP GET/POST floods, API-targeted attacks, defense evasion techniques, TLS handshake exhaustion, connection-holding methods, as well as UDP and TCP floods. Infected nodes receive commands from the command-and-control infrastructure and generate&nbsp;the corresponding&nbsp;traffic. In addition,&nbsp;Kamasers&nbsp;can also function as a loader, downloading and executing files from the network.&nbsp;</p>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>&nbsp;previously observed activity associated with&nbsp;<a href="https://x.com/anyrun_app/status/2001261257966412087?s=20" target="_blank" rel="noreferrer noopener"><strong>Udados</strong></a>, which is&nbsp;most likely an&nbsp;evolution or updated version of&nbsp;Kamasers. As such,&nbsp;Udados&nbsp;can be considered part of the&nbsp;Kamasers&nbsp;family.&nbsp;</p>



<p>You can find public&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">sandbox&nbsp;analysis</a>&nbsp;sessions related to the&nbsp;Kamasers&nbsp;family&nbsp;with the following Threat Intelligence&nbsp;Lookup&nbsp;query:&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktolookup#{%22query%22:%22threatName:%5C%22kamasers%5C%22%22,%22dateRange%22:30}" target="_blank" rel="noreferrer noopener">threatName:&#8221;kamasers&#8221;</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="446" src="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-1024x446.png" alt="ANY.RUN’s sandbox sessions related to the Kamasers attacks" class="wp-image-19465" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-1024x446.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-300x131.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-768x334.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-1536x669.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-2048x892.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-370x161.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-270x118.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-740x322.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ANY.RUN’s&nbsp;sandbox&nbsp;sessions related to the&nbsp;Kamasers&nbsp;attacks displayed inside TI&nbsp;Lookup</em></figcaption></figure></div>


<p>If a corporate host becomes part of a botnet and is used to carry out DDoS attacks, the organization may face financial risks related to incident response, system recovery, network costs, and potential contractual penalties, as well as regulatory scrutiny if inadequate security measures are identified, especially in cases involving data compromise.&nbsp;</p>



<p>An&nbsp;additional&nbsp;risk stems from the malware’s ability to act as a loader, downloading and executing third-party payloads. This increases the likelihood of further intrusion, data exfiltration, ransomware deployment, and the resulting operational and reputational damage.&nbsp;</p>



<h2 class="wp-block-heading">C2 and Infrastructure&nbsp;&nbsp;</h2>



<p>As part of the analysis, it was&nbsp;observed&nbsp;that the bot received the !httpbypass&nbsp;control command, which&nbsp;initiates&nbsp;an HTTP flood attack against a specified URL with defined intensity and duration parameters.&nbsp;After completing the attack, the bot reported its status and returned to standby mode.&nbsp;</p>



<p><a href="https://app.any.run/tasks/232034c5-de22-4eb4-a3ab-62e58d041205?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View analysis session</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="901" src="/cybersecurity-blog/wp-content/uploads/2026/03/image2-2-1024x901.png" alt="Communication between the infected host and the C2 server" class="wp-image-19467" style="width:516px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image2-2-1024x901.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2-300x264.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2-768x676.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2-370x326.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2-270x238.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2-740x651.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/image2-2.png 1432w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Communication between the infected host and the C2 server</em>&nbsp;</figcaption></figure></div>


<p>&nbsp;In the&nbsp;sandbox&nbsp;analysis&nbsp;session,&nbsp;we can see how&nbsp;a&nbsp;DDoS attack targets&nbsp;a domain:&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="236" src="/cybersecurity-blog/wp-content/uploads/2026/03/image3-1-1024x236.png" alt="DDoS attack targeting a domain, exposed inside ANY.RUN sandbox " class="wp-image-19468" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image3-1-1024x236.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image3-1-300x69.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image3-1-768x177.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image3-1-1536x355.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/image3-1-370x85.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image3-1-270x62.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image3-1-740x171.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/image3-1.png 1732w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>DDoS attack targeting a domain, exposed inside&nbsp;ANY.RUN&nbsp;sandbox</em>&nbsp;</figcaption></figure></div>


<p>In a number of&nbsp;analysis&nbsp;sessions, the command-and-control server was used not only to coordinate DDoS activity, but also to deliver additional payloads.&nbsp;Specifically, the bot received&nbsp;the&nbsp;<em>!download</em>command, after which it downloaded and executed a file from an external domain, then confirmed successful&nbsp;session&nbsp;completion to the C2 server:&nbsp;</p>



<p><a href="https://app.any.run/tasks/2127c60a-1cfa-4c40-aa97-b6a68491a1d9?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View analysis session</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="875" src="/cybersecurity-blog/wp-content/uploads/2026/03/image4-1024x875.png" alt="Example of a C2 command used to download a malicious file" class="wp-image-19469" style="width:528px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image4-1024x875.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image4-300x256.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image4-768x656.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image4-370x316.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image4-270x231.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image4-740x632.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/image4.png 1444w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Example of a C2 command used to download a malicious file</em></figcaption></figure></div>


<p>In one observed case, the bot received the<em>&nbsp;!descargar</em>&nbsp;command,&nbsp;the Spanish-language equivalent&nbsp;of&nbsp;<em>!download,</em>&nbsp;to retrieve an executable file from an external domain.&nbsp;</p>



<p><a href="https://app.any.run/tasks/80effde1-3534-4cf8-8f85-fdd12e3fb163?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View analysis session with&nbsp;C2 command in Spanish</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="497" src="/cybersecurity-blog/wp-content/uploads/2026/03/image5-3-1024x497.png" alt="C2 command in Spanish used to download a malicious file" class="wp-image-19470" style="width:618px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image5-3-1024x497.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image5-3-300x146.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image5-3-768x373.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image5-3-370x180.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image5-3-270x131.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image5-3-740x359.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/image5-3.png 1426w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>C2 command in Spanish used to download a malicious file&nbsp;observed&nbsp;inside&nbsp;ANY.RUN&nbsp;sandbox</em></figcaption></figure></div>


<p>In some cases, the&nbsp;Kamasers&nbsp;botnet was&nbsp;observed&nbsp;using public blockchain infrastructure as an auxiliary mechanism for obtaining the C2 address. Specifically, infected hosts queried the&nbsp;<strong>Etherscan&nbsp;API</strong>(api.etherscan.io) to retrieve data&nbsp;containing&nbsp;the URL of the command-and-control server:&nbsp;</p>



<p><a href="https://app.any.run/tasks/0c910c38-531d-4df4-86b9-19902487edc3?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">View session querying the&nbsp;Etherscan&nbsp;API</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="332" src="/cybersecurity-blog/wp-content/uploads/2026/03/image6-1024x332.png" alt="Querying the Etherscan API (api.etherscan.io) to retrieve data" class="wp-image-19471" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image6-1024x332.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-300x97.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-768x249.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-1536x498.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-2048x664.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-370x120.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-270x87.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image6-740x240.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Querying the&nbsp;Etherscan&nbsp;API&nbsp;(api.etherscan.io) to retrieve data</em></figcaption></figure></div>


<p>After obtaining the URL, the bot connects to the C2 server and sends information about its ID, command execution status, bot version, privileges on the infected host, C2 discovery source, and system information:&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="603" src="/cybersecurity-blog/wp-content/uploads/2026/03/image7-1-1024x603.png" alt="Victim request to the C2 server " class="wp-image-19472" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image7-1-1024x603.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image7-1-300x177.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image7-1-768x453.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image7-1-370x218.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image7-1-270x159.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image7-1-740x436.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/image7-1.png 1422w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Victim request to the C2 server</em>&nbsp;</figcaption></figure></div>


<p>In&nbsp;a number of&nbsp;cases,&nbsp;Kamasers&nbsp;uses public services, including&nbsp;<strong>GitHub</strong>, as an auxiliary source of configuration:&nbsp;</p>



<p><a href="https://app.any.run/tasks/1d4d2a6f-38de-4e5d-bf86-a1a66857aff1?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener">Check&nbsp;how Kamasers uses public services</a>&nbsp;&nbsp;</p>



<p>Behavioral analysis of Kamasers showed that the botnet frequently establishes connections to IP addresses associated with <strong>Railnet LLC’s ASN</strong>.</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">Catch emerging threats in 
<span class="highlight">under 60 seconds
</span> <br> <span class="highlight">Reduce time to verdict </span> with clear behavioral evidence
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://app.any.run/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=kamasers-technical-analysis&#038;utm_term=250326&#038;utm_content=linktoregistration" rel="noopener" target="_blank">
Register now
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p><strong>Railnet</strong>&nbsp;is regularly mentioned in public reporting as a legitimate front for the hosting&nbsp;provider <strong>Virtualine</strong>. This provider is known for the absence of KYC procedures, and some research has noted that the associated infrastructure is used to host malicious services and&nbsp;facilitate&nbsp;attacks.&nbsp;</p>



<p>Railnet&nbsp;infrastructure has previously been&nbsp;observed&nbsp;in campaigns targeting both government and private-sector organizations across several European countries, including Switzerland, Germany, Ukraine, Poland, and France.&nbsp;</p>



<p>There are also documented cases of&nbsp;<strong>Railnet</strong>&nbsp;infrastructure being used to distribute other malware families, including&nbsp;<strong>Latrodectus</strong>, which&nbsp;a number of&nbsp;reports link to activity associated with groups such as&nbsp;<strong>TA577</strong>.&nbsp;</p>



<p>At the time of analysis,&nbsp;<strong>ANY.RUN</strong>&nbsp;data showed that&nbsp;<strong>Railnet’s&nbsp;ASN</strong>&nbsp;consistently appeared in reports tied to a wide range of malicious activity and was being used by multiple malware families. These were not isolated incidents, but a recurring pattern: the same ASN was repeatedly involved across different campaigns, making it a convenient infrastructure hub for threat actors.&nbsp;</p>



<p>The current picture of&nbsp;<strong>Railnet</strong>&nbsp;activity can be quickly verified using&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener"><strong>ANY.RUN’s&nbsp;Threat Intelligence&nbsp;Lookup</strong></a>. Searching by ASN makes it possible to assess how extensively it is involved in malicious chains, which malware families interact with it, and how the nature of that activity changes over time:&nbsp;</p>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktolookup#{%22query%22:%22destinationIpAsn:%5C%22railnet%5C%22%22,%22dateRange%22:180}" target="_blank" rel="noreferrer noopener">destinationIpAsn:&#8221;railnet&#8221;</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="391" src="/cybersecurity-blog/wp-content/uploads/2026/03/railnet_1-1024x391.png" alt="" class="wp-image-19492" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/railnet_1-1024x391.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/railnet_1-300x114.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/railnet_1-768x293.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/railnet_1-1536x586.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/railnet_1-370x141.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/railnet_1-270x103.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/railnet_1-740x282.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/railnet_1.png 1824w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Query for RAILNET ASN in&nbsp;ANY.RUN’s TI&nbsp;Lookup</em>&nbsp;</figcaption></figure></div>


<p>In the analyzed sandbox sessions, Kamasers was distributed via <strong>GCleaner</strong> and <strong>Amadey</strong>, a delivery pattern that has also been observed in other DDoS campaigns.</p>



<h2 class="wp-block-heading">Attack Geography and Targeting&nbsp;</h2>



<p>Among the observed&nbsp;<strong>DDoS</strong>&nbsp;targets were companies in the&nbsp;<strong>LATAM</strong>&nbsp;region. However, according to&nbsp;<strong>ANY.RUN’s&nbsp;threat&nbsp;intelligence&nbsp;</strong>data, the targeting profile is broader: the education sector is affected most often, along with telecommunications and technology organizations.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="555" src="/cybersecurity-blog/wp-content/uploads/2026/03/kamasers_2-1024x555.png" alt="" class="wp-image-19493" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/kamasers_2-1024x555.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/kamasers_2-300x163.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/kamasers_2-768x416.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/kamasers_2-1536x832.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/kamasers_2-370x200.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/kamasers_2-270x146.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/kamasers_2-740x401.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/kamasers_2.png 1822w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Query in&nbsp;ANY.RUN&nbsp;TI to search for the&nbsp;Kamasers&nbsp;malware family</em>&nbsp;</figcaption></figure></div>


<p>By geographic distribution of observed submissions, the largest share comes from&nbsp;<strong>Germany</strong>&nbsp;and the&nbsp;<strong>United States</strong>, with separate cases also recorded in&nbsp;<strong>Poland</strong>&nbsp;and other countries. During the analysis, control commands in&nbsp;<strong>Spanish</strong>&nbsp;were also&nbsp;observed. This may indirectly suggest that the botnet may have originated from, or evolved within, a Spanish-speaking operator environment, although its actual activity is clearly international in scope.&nbsp;</p>



<p>It is also important to consider that the botnet uses the infrastructure of infected hosts to carry out attacks. If corporate systems are compromised, the organization may not only become a potential target itself, but also inadvertently serve as a source of attacks against third parties. This creates reputational risks, the possibility of IP address blacklisting, and&nbsp;additional&nbsp;financial costs related to investigation and infrastructure recovery.&nbsp;</p>



<h2 class="wp-block-heading">Technical&nbsp;Breakdown of&nbsp;Kamasers&nbsp;&nbsp;</h2>



<p>To better understand the Kamasers botnet architecture, a detailed sample analysis was conducted. The starting point was the sample from this <a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener"><strong>ANY.RUN sandbox</strong></a><strong> </strong>session:</p>



<p><a href="https://app.any.run/tasks/04a02053-2d1a-44db-bbcb-ef03d66f941f?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktoservice" target="_blank" rel="noreferrer noopener"><strong>Check analysis session</strong></a><strong></strong>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="576" src="/cybersecurity-blog/wp-content/uploads/2026/03/sandbox_analysis_kamasers-1024x576.png" alt="" class="wp-image-19494" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/sandbox_analysis_kamasers-1024x576.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/sandbox_analysis_kamasers-300x169.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/sandbox_analysis_kamasers-768x432.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/sandbox_analysis_kamasers-1536x864.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/sandbox_analysis_kamasers-370x208.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/sandbox_analysis_kamasers-270x152.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/sandbox_analysis_kamasers-740x416.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/sandbox_analysis_kamasers.png 1842w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ANY.RUN’s analysis session used as a starting point for technical investigation</em>&nbsp;</figcaption></figure></div>


<p>This was followed by reverse engineering of the binary. The analysis focused primarily on how the malware receives and processes commands from the C2 server, as well as the attack capabilities implemented in the sample.&nbsp;</p>



<p>After&nbsp;launch, the malware begins retrieving commands through a&nbsp;<strong>Dead Drop Resolver</strong>&nbsp;mechanism. It uses public services such as&nbsp;<strong>GitHub Gist, Telegram, Dropbox, and Bitbucket</strong>&nbsp;as intermediary sources. From these sources, the bot extracts the address of the real C2 server and then&nbsp;establishes&nbsp;a connection to it.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="901" height="411" src="/cybersecurity-blog/wp-content/uploads/2026/03/imageb-2.png" alt="The bot validates the format of the command sent by the C2 server" class="wp-image-19475" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/imageb-2.png 901w, /cybersecurity-blog/wp-content/uploads/2026/03/imageb-2-300x137.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/imageb-2-768x350.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/imageb-2-370x169.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/imageb-2-270x123.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/imageb-2-740x338.png 740w" sizes="(max-width: 901px) 100vw, 901px" /><figcaption class="wp-element-caption"><em>The bot&nbsp;validates&nbsp;the format of the command sent by the C2 server</em></figcaption></figure></div>


<p>Command processing takes place in several stages. First, the bot verifies that the command format is valid. All valid commands must begin with the “!” character. If this prefix is missing, the command is rejected and not executed.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="901" height="604" src="/cybersecurity-blog/wp-content/uploads/2026/03/imagec-2.png" alt="Code for the handler caching mechanism " class="wp-image-19476" style="width:516px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/imagec-2.png 901w, /cybersecurity-blog/wp-content/uploads/2026/03/imagec-2-300x201.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/imagec-2-768x515.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/imagec-2-370x248.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/imagec-2-270x181.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/imagec-2-740x496.png 740w" sizes="(max-width: 901px) 100vw, 901px" /><figcaption class="wp-element-caption"><em>Code for the handler caching mechanism</em>&nbsp;</figcaption></figure></div>


<p>After&nbsp;validating&nbsp;the prefix, the bot matches the command against an internal handler table. The analysis showed that&nbsp;Kamasers&nbsp;uses&nbsp;a&nbsp;<strong>handler caching mechanism</strong>. If the previously used handler matches the current command index, the bot takes a fast path without performing another&nbsp;lookup. Otherwise, it triggers the dynamic resolution routine.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="901" height="565" src="/cybersecurity-blog/wp-content/uploads/2026/03/imaged-1.png" alt="Pseudocode of the flowchart showing command receipt and handler caching" class="wp-image-19477" style="width:584px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/imaged-1.png 901w, /cybersecurity-blog/wp-content/uploads/2026/03/imaged-1-300x188.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/imaged-1-768x482.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/imaged-1-370x232.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/imaged-1-270x169.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/imaged-1-740x464.png 740w" sizes="(max-width: 901px) 100vw, 901px" /><figcaption class="wp-element-caption"><em>Pseudocode of the flowchart showing command receipt and handler caching</em></figcaption></figure></div>


<p>This mechanism can be briefly described as shown in the pseudocode above.&nbsp;</p>



<p>One of the most illustrative commands is !udppro. It implements a high-speed UDP flood with support for source IP spoofing. Code analysis shows the standard sequence for creating a UDP socket via the&nbsp;<strong>WinSock API</strong>&nbsp;using the AF_INET, SOCK_DGRAM, and IPPROTO_UDP parameters.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="901" height="222" src="/cybersecurity-blog/wp-content/uploads/2026/03/imagee-1.png" alt="Disassembled code for the “!udppro” command " class="wp-image-19478" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/imagee-1.png 901w, /cybersecurity-blog/wp-content/uploads/2026/03/imagee-1-300x74.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/imagee-1-768x189.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/imagee-1-370x91.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/imagee-1-270x67.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/imagee-1-740x182.png 740w" sizes="(max-width: 901px) 100vw, 901px" /><figcaption class="wp-element-caption"><em>Disassembled code for the “!udppro” command</em>&nbsp;</figcaption></figure></div>


<p>After initializing the socket, the malware configures the&nbsp;packet&nbsp;transmission parameters. Support for&nbsp;<strong>IP spoofing</strong>&nbsp;enables&nbsp;<strong>reflection</strong>&nbsp;and&nbsp;<strong>amplification</strong>&nbsp;attacks through public&nbsp;<strong>NTP</strong>&nbsp;and&nbsp;<strong>DNS</strong>&nbsp;servers. In such scenarios, the victim receives responses that are significantly larger than the original requests, leading to a sharp increase in load.&nbsp;&nbsp;</p>



<p>The&nbsp;<em>!download&nbsp;</em>command is also present, implementing a&nbsp;<strong>Download &amp; Execute</strong>&nbsp;mechanism. The bot retrieves an executable file from the specified URL, checks for the MZ signature,&nbsp;allocates&nbsp;memory, maps the sections, and transfers execution to the entry point. If successful, it sends a task completion message; if an error occurs, it generates a failure notification.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="901" height="387" src="/cybersecurity-blog/wp-content/uploads/2026/03/imagef-1.png" alt="Bot status messages related to the download process " class="wp-image-19479" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/imagef-1.png 901w, /cybersecurity-blog/wp-content/uploads/2026/03/imagef-1-300x129.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/imagef-1-768x330.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/imagef-1-370x159.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/imagef-1-270x116.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/imagef-1-740x318.png 740w" sizes="(max-width: 901px) 100vw, 901px" /><figcaption class="wp-element-caption"><em>Bot status messages related to the download process</em>&nbsp;</figcaption></figure></div>


<h3 class="wp-block-heading">Implementation of Dead Drop Resolver&nbsp;Channels</h3>



<p>Kamasers&nbsp;uses four&nbsp;<strong>Dead Drop Resolver</strong>&nbsp;channels:&nbsp;<strong>GitHub Gist</strong>, a&nbsp;<strong>Telegram bot</strong>, a file hosted on&nbsp;<strong>Dropbox</strong>, and a&nbsp;<strong>Bitbucket</strong>&nbsp;repository. Importantly, links to these services are not stored in the sample in plain form. Instead, they are constructed and unpacked dynamically at runtime, which is why such strings do not appear during static analysis of the binary.&nbsp;</p>



<p>The&nbsp;<strong>Dead Drop Resolver (DDR)</strong>&nbsp;mechanism serves as an intermediary layer between the bot and the primary C2 server. After&nbsp;launch, the malware sequentially sends HTTP GET requests to each of the public resources. The content hosted there&nbsp;contains&nbsp;the current address of the command-and-control server. Once a response is received, the bot extracts the C2 address and&nbsp;establishes&nbsp;a direct connection to continue receiving commands.&nbsp;</p>



<p>If the first source returns a valid address, no further requests are made.&nbsp;If the connection fails or the response is invalid, the bot automatically falls back to the next channel:&nbsp;<strong>Telegram</strong>, then&nbsp;<strong>Dropbox</strong>, and finally&nbsp;<strong>Bitbucket</strong>.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="901" height="198" src="/cybersecurity-blog/wp-content/uploads/2026/03/image10.png" alt="DDR links in the Kamasers codebase " class="wp-image-19480" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image10.png 901w, /cybersecurity-blog/wp-content/uploads/2026/03/image10-300x66.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image10-768x169.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image10-370x81.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image10-270x59.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image10-740x163.png 740w" sizes="(max-width: 901px) 100vw, 901px" /><figcaption class="wp-element-caption"><em>DDR links in the&nbsp;Kamasers&nbsp;codebase</em>&nbsp;</figcaption></figure></div>


<p>All of&nbsp;these resources&nbsp;ultimately point&nbsp;to the same C2 infrastructure:&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="901" height="325" src="/cybersecurity-blog/wp-content/uploads/2026/03/image11.png" alt="GitHub Gist content used by Kamasers as DDR " class="wp-image-19481" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image11.png 901w, /cybersecurity-blog/wp-content/uploads/2026/03/image11-300x108.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image11-768x277.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image11-370x133.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image11-270x97.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image11-740x267.png 740w" sizes="(max-width: 901px) 100vw, 901px" /><figcaption class="wp-element-caption"><em>GitHub Gist content used by&nbsp;Kamasers&nbsp;as DDR</em>&nbsp;</figcaption></figure></div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="901" height="159" src="/cybersecurity-blog/wp-content/uploads/2026/03/image12-1.png" alt="Bitbucket content used by Kamasers as DDR " class="wp-image-19482" style="width:440px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image12-1.png 901w, /cybersecurity-blog/wp-content/uploads/2026/03/image12-1-300x53.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image12-1-768x136.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image12-1-370x65.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image12-1-270x48.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image12-1-740x131.png 740w" sizes="(max-width: 901px) 100vw, 901px" /><figcaption class="wp-element-caption"><em>Bitbucket content used by&nbsp;Kamasers&nbsp;as DDR</em>&nbsp;</figcaption></figure></div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="901" height="141" src="/cybersecurity-blog/wp-content/uploads/2026/03/image13.png" alt="Fallback domains used if the DDR links are unavailable" class="wp-image-19483" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image13.png 901w, /cybersecurity-blog/wp-content/uploads/2026/03/image13-300x47.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image13-768x120.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image13-370x58.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image13-270x42.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image13-740x116.png 740w" sizes="(max-width: 901px) 100vw, 901px" /><figcaption class="wp-element-caption"><em>Fallback domains used if the DDR links are unavailable</em></figcaption></figure></div>


<p>If none of the&nbsp;<strong>DDR channels</strong>&nbsp;responds, the malware falls back to a built-in list of backup domains.&nbsp;</p>



<h2 class="wp-block-heading">Catching&nbsp;Kamasers&nbsp;Early: A Practical Detection Approach&nbsp;</h2>



<p>Kamasers&nbsp;shows how a single malware infection can quickly turn into a broader business problem. Beyond DDoS activity, the botnet can also download and execute&nbsp;additional&nbsp;payloads, increasing the risk of deeper compromise.&nbsp;</p>



<p>For security teams, the challenge is not only spotting the malware&nbsp;itself but&nbsp;also understanding whether an infected host is being used for external attacks, communicating with resilient C2 infrastructure, or pulling in follow-on payloads.&nbsp;</p>



<p>Early detection depends on moving quickly from suspicious network activity to confirmed malicious behavior.&nbsp;</p>



<h3 class="wp-block-heading">1. Monitoring: Spot Malicious Infrastructure and Unusual Network Behavior Early&nbsp;</h3>



<p>Kamasers&nbsp;relies on external infrastructure to receive commands, retrieve C2 addresses, and in some cases download&nbsp;additional&nbsp;payloads. It also uses public services such as GitHub Gist, Telegram, Dropbox, Bitbucket, and even&nbsp;Etherscan&nbsp;as part of its Dead Drop Resolver logic.&nbsp;</p>



<p>Monitoring for&nbsp;suspicious outbound connections, newly observed infrastructure, and repeated communication with known malicious hosting can help teams detect activity before the infection leads to larger operational impact.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="466" src="/cybersecurity-blog/wp-content/uploads/2026/03/image17-1024x466.png" alt="Actionable IOCs delivered by TI Feeds to your existing stack " class="wp-image-19484" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/image17-1024x466.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/image17-300x136.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/image17-768x349.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/image17-370x168.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/image17-270x123.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/image17-740x337.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/image17.png 1425w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Actionable IOCs delivered by TI&nbsp;Feeds&nbsp;to your existing stack</em>&nbsp;</figcaption></figure></div>


<p>ANY.RUN’s&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>&nbsp;help&nbsp;surface suspicious indicators early, giving SOC teams faster visibility into malicious domains, IPs, and infrastructure patterns linked to emerging threats.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">99% unique
</span>threat data for your SOC <br>Catch attacks <span class="highlight">early</span> to protect your business &nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=kamasers-technical-analysis&#038;utm_term=250326&#038;utm_content=linktotifeedslanding#contact-sales" rel="noopener" target="_blank">
Integrate TI Feeds
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">2. Triage: Confirm Botnet Activity with Behavior-Based Analysis&nbsp;</h3>



<p>With threats like&nbsp;Kamasers, static detection alone may not show the full risk. A suspicious file may appear inconclusive until its real behavior is&nbsp;observed&nbsp;during execution.&nbsp;</p>



<p>Running the sample inside the&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">ANY.RUN&nbsp;interactive&nbsp;sandbox</a>&nbsp;makes it possible to confirm the full execution flow, including:&nbsp;</p>



<ul class="wp-block-list">
<li>retrieval of C2 data through Dead Drop Resolver channels&nbsp;</li>



<li>connection to the active command-and-control server&nbsp;</li>



<li>receipt and execution of DDoS commands&nbsp;</li>



<li>download-and-execute behavior through commands&nbsp;like&nbsp;!download&nbsp;or&nbsp;!descargar&nbsp;</li>



<li>status reporting back to the C2 infrastructure&nbsp;</li>
</ul>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="724" src="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-25-at-09.19.09-1024x724.png" alt="" class="wp-image-19485" style="width:600px;height:auto" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-25-at-09.19.09-1024x724.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-25-at-09.19.09-300x212.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-25-at-09.19.09-768x543.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-25-at-09.19.09-1536x1086.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-25-at-09.19.09-370x261.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-25-at-09.19.09-270x191.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-25-at-09.19.09-740x523.png 740w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-25-at-09.19.09.png 1548w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>Relevant IOCs automatically gathered in one tab inside&nbsp;ANY.RUN&nbsp;sandbox</em>&nbsp;</figcaption></figure></div>


<p>This helps teams quickly&nbsp;determine&nbsp;whether the malware is only&nbsp;participating&nbsp;in DDoS activity or whether it also creates risk of further payload delivery and deeper compromise.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">74% of Fortune 100 companies 
</span>rely on ANY.RUN <br>for earlier detection and <span class="highlight">faster SOC</span> response 
&nbsp;   
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=kamasers-technical-analysis&#038;utm_term=250326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Power your SOC now
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h3 class="wp-block-heading">3. Threat Hunting: Pivot from One Sample to Related Infrastructure&nbsp;</h3>



<p>Once&nbsp;Kamasers&nbsp;is confirmed, the next step is&nbsp;understanding&nbsp;how far the activity may extend.&nbsp;</p>



<p>Using&nbsp;ANY.RUN’s&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence&nbsp;Lookup</a>, teams can pivot from the&nbsp;initial&nbsp;sample to uncover related infrastructure, connected sessions, and recurring patterns across the broader campaign.&nbsp;</p>



<p>This makes it possible to:&nbsp;</p>



<ul class="wp-block-list">
<li>identify&nbsp;other samples tied to the&nbsp;Kamasers&nbsp;family&nbsp;</li>



<li>trace infrastructure linked to the botnet’s C2 activity&nbsp;</li>



<li>investigate repeated use of ASN-linked hosting such as&nbsp;Railnet</li>



<li>expand detection based on shared behavior and network indicators&nbsp;</li>
</ul>



<p><a href="https://intelligence.any.run/analysis/lookup?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktolookup#{%22query%22:%22threatName:%5C%22kamasers%5C%22%22,%22dateRange%22:30}" target="_blank" rel="noreferrer noopener">threatName:&#8221;kamasers&#8221;</a>&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="446" src="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-1024x446.png" alt="" class="wp-image-19465" srcset="/cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-1024x446.png 1024w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-300x131.png 300w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-768x334.png 768w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-1536x669.png 1536w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-2048x892.png 2048w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-370x161.png 370w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-270x118.png 270w, /cybersecurity-blog/wp-content/uploads/2026/03/Screenshot-2026-03-24-at-19.16.58-740x322.png 740w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><em>ANY.RUN’s&nbsp;sandbox&nbsp;sessions related to the&nbsp;Kamasers&nbsp;attacks displayed inside TI&nbsp;Lookup</em>&nbsp;</figcaption></figure></div>


<p>By pivoting from one confirmed sample, security teams can turn a single investigation into broader visibility across related botnet activity.&nbsp;</p>



<h2 class="wp-block-heading">Conclusion&nbsp;</h2>



<p>Kamasers is a sophisticated&nbsp;<strong>DDoS botnet</strong>&nbsp;with a well-designed architecture. Its use of a&nbsp;<strong>Dead Drop Resolver</strong>&nbsp;through legitimate services makes its C2 infrastructure highly resilient to&nbsp;takedown&nbsp;efforts. The presence of&nbsp;<strong>16 different attack methods</strong>, including modern vectors such as&nbsp;<strong>GraphQL</strong>&nbsp;and&nbsp;<strong>HTTP bypass</strong>, along with advanced implementations of classic techniques, makes&nbsp;<strong>Kamasers</strong>&nbsp;a highly versatile tool for carrying out DDoS attacks.&nbsp;</p>



<p>For business leaders,&nbsp;Kamasers&nbsp;shows that resilient, multi-vector botnets can threaten not only infrastructure, but also uptime, customer experience, and revenue-critical operations.&nbsp;</p>



<p><a href="https://any.run/enterprise/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktoenterprise#contact-sales" target="_blank" rel="noreferrer noopener">Power faster, clearer investigations with&nbsp;ANY.RUN&nbsp;➜</a>&nbsp;</p>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;</h2>



<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>, a leading provider of&nbsp;<a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">interactive malware analysis</a>&nbsp;and threat intelligence solutions, fits naturally into modern SOC workflows and supports investigations from&nbsp;initial&nbsp;alert to final containment.&nbsp;&nbsp;</p>



<p>It allows teams to safely execute suspicious files and URLs,&nbsp;observe&nbsp;real behavior in an interactive environment, enrich indicators with immediate context through&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">TI Lookup</a>, and continuously&nbsp;monitor&nbsp;emerging infrastructure&nbsp;using&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>. Together, these capabilities help&nbsp;reduce uncertainty, accelerate triage, and limit unnecessary escalations across the SOC.&nbsp;&nbsp;</p>



<p>ANY.RUN also meets enterprise security and compliance expectations. The company is&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=kamasers-technical-analysis&amp;utm_term=250326&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certified,</a>&nbsp;reinforcing its commitment to protecting customer data and&nbsp;maintaining&nbsp;strong security controls.&nbsp;&nbsp;</p>



<h2 class="wp-block-heading">Complete List of&nbsp;Kamasers&nbsp;Commands&nbsp;</h2>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-287"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="2"
           data-rows="17"
           data-wpID="287"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:50%;                    padding:8px;
                    "
                    >
                                        Command                     </th>
                                                <th class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:50%;                    padding:8px;
                    "
                    >
                                        Purpose                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:8px;
                    "
                    >
                                        !stop                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:8px;
                    "
                    >
                                        Stops the current operation. Closes sockets, terminates attack threads, and clears buffers.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:8px;
                    "
                    >
                                        !download                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:8px;
                    "
                    >
                                        <p>Downloads and executes a file. Retrieves a PE file over HTTP, verifies it, and launches it. Also detects whether the file has been removed by antivirus software.</p>                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:8px;
                    "
                    >
                                        !visiturl                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:8px;
                    "
                    >
                                        <div data-type-content="wpdt-html-content">Sends a basic HTTP GET request to the specified URL to generate traffic or check availability.</div>                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A5"
                    data-col-index="0"
                    data-row-index="4"
                    style="                    padding:8px;
                    "
                    >
                                        !httpget                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B5"
                    data-col-index="1"
                    data-row-index="4"
                    style="                    padding:8px;
                    "
                    >
                                        <div data-type-content="wpdt-html-content">Basic HTTP GET flood implementation. Spawns several dozen threads with minimal randomization.</div>                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A6"
                    data-col-index="0"
                    data-row-index="5"
                    style="                    padding:8px;
                    "
                    >
                                        !httpgetpro                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B6"
                    data-col-index="1"
                    data-row-index="5"
                    style="                    padding:8px;
                    "
                    >
                                        <div data-type-content="wpdt-html-content">Advanced HTTP GET flood. Spawns hundreds of threads, randomizes the User-Agent, Referer, URL paths, and parameters. Uses keep-alive connections.</div>                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A7"
                    data-col-index="0"
                    data-row-index="6"
                    style="                    padding:8px;
                    "
                    >
                                        !httppost                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B7"
                    data-col-index="1"
                    data-row-index="6"
                    style="                    padding:8px;
                    "
                    >
                                        <div data-type-content="wpdt-html-content">HTTP POST flood. Sends POST requests with randomized headers and payloads, creating load on server-side data processing.</div>                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A8"
                    data-col-index="0"
                    data-row-index="7"
                    style="                    padding:8px;
                    "
                    >
                                        !tlsflood                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B8"
                    data-col-index="1"
                    data-row-index="7"
                    style="                    padding:8px;
                    "
                    >
                                        TLS handshake flood. Initiates SSL/TLS handshakes without completing them, creating load on the server’s cryptographic operations.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A9"
                    data-col-index="0"
                    data-row-index="8"
                    style="                    padding:8px;
                    "
                    >
                                        !httpbypass                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B9"
                    data-col-index="1"
                    data-row-index="8"
                    style="                    padding:8px;
                    "
                    >
                                        <div data-type-content="wpdt-html-content">HTTP attack with defense evasion. Uses WAF/CDN bypass techniques such as header manipulation, payload encoding, and request fragmentation.</div>                    </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A10"
                    data-col-index="0"
                    data-row-index="9"
                    style="                    padding:8px;
                    "
                    >
                                        !graphql                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B10"
                    data-col-index="1"
                    data-row-index="9"
                    style="                    padding:8px;
                    "
                    >
                                        GraphQL API flood. Sends deeply nested GraphQL queries that create exponential load on the server parser.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A11"
                    data-col-index="0"
                    data-row-index="10"
                    style="                    padding:8px;
                    "
                    >
                                        !httphulk                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B11"
                    data-col-index="1"
                    data-row-index="10"
                    style="                    padding:8px;
                    "
                    >
                                        HULK attack (HTTP Unbearable Load King). Applies maximumrandomization to all HTTP request parameters to bypass caching and rate limiting.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A12"
                    data-col-index="0"
                    data-row-index="11"
                    style="                    padding:8px;
                    "
                    >
                                        !fastflood                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B12"
                    data-col-index="1"
                    data-row-index="11"
                    style="                    padding:8px;
                    "
                    >
                                        Optimized high-speed flood with minimal overhead, designed to saturate available bandwidth.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A13"
                    data-col-index="0"
                    data-row-index="12"
                    style="                    padding:8px;
                    "
                    >
                                        !proloris                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B13"
                    data-col-index="1"
                    data-row-index="12"
                    style="                    padding:8px;
                    "
                    >
                                        Professional implementation of Slowloris. Slowly sends partial HTTP headers to exhaust the server’s connection pool.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A14"
                    data-col-index="0"
                    data-row-index="13"
                    style="                    padding:8px;
                    "
                    >
                                        !slowread                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B14"
                    data-col-index="1"
                    data-row-index="13"
                    style="                    padding:8px;
                    "
                    >
                                        Slow Read attack. Requests a large file and reads it very slowly to tie up server resources.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A15"
                    data-col-index="0"
                    data-row-index="14"
                    style="                    padding:8px;
                    "
                    >
                                        !udppro                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B15"
                    data-col-index="1"
                    data-row-index="14"
                    style="                    padding:8px;
                    "
                    >
                                        Professional UDP flood with support for IP spoofing and NTP/DNS amplification.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A16"
                    data-col-index="0"
                    data-row-index="15"
                    style="                    padding:8px;
                    "
                    >
                                        !tcppro                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B16"
                    data-col-index="1"
                    data-row-index="15"
                    style="                    padding:8px;
                    "
                    >
                                        Advanced TCP flood. Combines SYN flood, ACK flood, and connection reset techniques to exhaust the TCP state table.                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell wpdt-align-justify wpdt-bold"
                                            data-cell-id="A17"
                    data-col-index="0"
                    data-row-index="16"
                    style="                    padding:8px;
                    "
                    >
                                        !tcphold                     </td>
                                                <td class="wpdt-cell wpdt-align-justify"
                                            data-cell-id="B17"
                    data-col-index="1"
                    data-row-index="16"
                    style="                    padding:8px;
                    "
                    >
                                        TCP connection holding. Establishes the maximum number of connections while maintaining minimal keep-alive traffic to exhaust server limits.                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-287'>
table#wpdtSimpleTable-287{ table-layout: fixed !important; }
table#wpdtSimpleTable-287 td, table.wpdtSimpleTable287 th { white-space: normal !important; }
</style>




<h2 class="wp-block-heading">Indicators&nbsp;of&nbsp;Compromise&nbsp;(IOCs)&nbsp;&nbsp;&nbsp;</h2>



<ul class="wp-block-list">
<li>F6c6e16a392be4dbf9a3cf1085b4ffc005b0931fc8eeb5fedf1c7561b2e5ad6b</li>



<li>Dd305f7f1131898c736c97f43c6729bf57d3980fc269400d23412a282ee71a9a</li>



<li>hxxp://45[.]151[.]91[.]187/pa[.]php</li>



<li>hxxp://91[.]92[.]240[.]50/pit/wp[.]php</li>



<li>071a1960fbd7114ca87d9da138908722d7f1c02af90ea2db1963915fbe234c52</li>



<li>hxxp://178[.]16[.]54[.]87/uda/ph[.]php</li>
</ul>



<h3 class="wp-block-heading"><strong>C2 Infrastructure (DDR):</strong> </h3>



<ul class="wp-block-list">
<li>gist[.]github[.]com/pitybugak/5d16b75e8bd071e15b04cc9c06dcfafa[.]js</li>



<li>api[.]telegram[.]org/bot8215158687:AAFgSmsaxfsJozcHIIYPv-HytZ3eCEaUrKg</li>



<li>dl[.]dropboxusercontent[.]com/s/jqvpmc0kwg6ffi1mineh2/fj[.]txt</li>



<li>Bitbucket[.]org/serky/repyx/raw/main/fq[.]txt</li>
</ul>



<h3 class="wp-block-heading"><strong>Fallback&nbsp;domains:</strong>&nbsp;</h3>



<ul class="wp-block-list">
<li>pitybux[.]com</li>



<li>ryxuz[.]com</li>



<li>toksm[.]com</li>



<li>Boskuh[.]com</li>
</ul>



<h3 class="wp-block-heading">Yara&nbsp;rules:&nbsp;</h3>



<p>rule&nbsp;Kamasers&nbsp;{&nbsp;</p>



<p><strong>&nbsp;&nbsp;&nbsp; meta:&nbsp;</strong></p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;description&nbsp;= &#8220;Detects&nbsp;Kamasers&nbsp;DDoS botnet&#8221;&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;author&nbsp;= &#8220;ANY.RUN&#8221;&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;date&nbsp;= &#8220;2026-02-11&#8221;&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;threat&nbsp;= &#8220;Kamasers&#8221;&nbsp;</p>



<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;strings:&nbsp;</strong></p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd1 = &#8220;!stop&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd2 = &#8220;!download&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd3 = &#8220;!visiturl&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd4 = &#8220;!httpget&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd5 = &#8220;!httpgetpro&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd6 = &#8220;!httppost&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd7 = &#8220;!tlsflood&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd8 = &#8220;!httpbypass&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd9 = &#8220;!graphql&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd10 = &#8220;!httphulk&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd11 = &#8220;!fastflood&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd12 = &#8220;!proloris&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd13 = &#8220;!slowread&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd14 = &#8220;!udppro&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd15 = &#8220;!tcppro&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $cmd16 = &#8220;!tcphold&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg1 = &#8220;Task&nbsp;completed:&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg2 = &#8220;Task&nbsp;completed:&nbsp;GraphQL&nbsp;Flood&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg3 = &#8220;Task&nbsp;completed: HULK&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg4 = &#8220;Task&nbsp;completed: UDPPRO&nbsp;Flood&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg5 = &#8220;Task&nbsp;completed: TCPPRO&nbsp;Flood&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg6 = &#8220;Task&nbsp;completed: TCP HOLD&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg7 = &#8220;Task&nbsp;completed:&nbsp;Download&nbsp;&amp;&nbsp;Execute&nbsp;from&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg8 = &#8220;Task&nbsp;completed:&nbsp;Visit&nbsp;URL&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg9 = &#8220;Starting&nbsp;GraphQL&nbsp;Flood&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg10 = &#8220;Starting&nbsp;HULK&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg11 = &#8220;Starting&nbsp;UDP PRO&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg12 = &#8220;Starting&nbsp;TCP PRO&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg13 = &#8220;Starting&nbsp;TCP HOLD&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg14 = &#8220;Starting&nbsp;Visit&nbsp;URL&nbsp;task&nbsp;on&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg15 = &#8220;Runtime&nbsp;error&nbsp;in D&amp;E&nbsp;task:&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg16 = &#8220;Unknown&nbsp;exception&nbsp;in&nbsp;DownloadAndExecuteTask&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg17 = &#8220;Awaiting&nbsp;task&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg18 = &#8220;Downloading&nbsp;file&nbsp;from:&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg19 = &#8220;Downloaded&nbsp;file&nbsp;disappeared&nbsp;(AV/EDR?)&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg20 = &#8220;Download&nbsp;failed&nbsp;with&nbsp;HRESULT:&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg21 = &#8220;HTTP GET&nbsp;Flood&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg22 = &#8220;HTTP GET PRO&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg23 = &#8220;HTTP POST&nbsp;Flood&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; $msg24 = &#8220;HULK_POST&#8221;&nbsp;ascii&nbsp;fullword&nbsp;</p>



<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;condition:&nbsp;</strong></p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; uint16(0) == 0x5A4D&nbsp;and&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (10&nbsp;of&nbsp;($cmd*))&nbsp;and&nbsp;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (8&nbsp;of&nbsp;($msg*))&nbsp;</p>



<p>}&nbsp;</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/kamasers-technical-analysis/">Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/cybersecurity-blog/kamasers-technical-analysis/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Canada-Based Organization Health Shared Services Accelerates SOC Investigations with ANY.RUN </title>
		<link>/cybersecurity-blog/healthcare-success-story/</link>
					<comments>/cybersecurity-blog/healthcare-success-story/#respond</comments>
		
		<dc:creator><![CDATA[k.miroshkina]]></dc:creator>
		<pubDate>Tue, 24 Mar 2026 10:15:41 +0000</pubDate>
				<category><![CDATA[Customer Success Story]]></category>
		<category><![CDATA[ANYRUN]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[malware analysis]]></category>
		<guid isPermaLink="false">/cybersecurity-blog/?p=19422</guid>

					<description><![CDATA[<p>ANY.RUN&#160;spoke with the Interim CISO&#160;and&#160;Director of Cyber Operations at&#160;Health Shared Services,&#160;who provided&#160;insights into&#160;how their team&#160;addressed&#160;alert fatigue, improved&#160;MTTD and MTTR, and strengthened&#160;their investigation workflow with ANY.RUN.&#160; In this new addition to our&#160;success story series,&#160;we&#160;explore&#160;how the&#160;healthcare&#160;organization’s&#160;SOC team&#160;improved detection, triage, and response efficiency while&#160;maintaining&#160;the existing operational processes.&#160; Organization Overview&#160; Health Shared&#160;Services&#160;is a&#160;healthcare&#160;support organization&#160;based in&#160;Alberta, Canada.&#160;&#160;Its&#160;SOC team&#160;consists of 16 [&#8230;]</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/healthcare-success-story/">Canada-Based Organization Health Shared Services Accelerates SOC Investigations with ANY.RUN </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><a href="https://any.run/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=healthcare-success-story&amp;utm_term=240326&amp;utm_content=linktolanding" target="_blank" rel="noreferrer noopener">ANY.RUN</a>&nbsp;spoke with the Interim CISO&nbsp;and&nbsp;Director of Cyber Operations at&nbsp;<strong>Health Shared Services</strong>,&nbsp;who provided&nbsp;insights into&nbsp;how their team&nbsp;addressed&nbsp;<a href="https://any.run/cybersecurity-blog/soc-staff-shortage-burnout/" target="_blank" rel="noreferrer noopener">alert fatigue</a>, improved&nbsp;MTTD and MTTR, and strengthened&nbsp;their investigation workflow with ANY.RUN.&nbsp;</p>



<p>In this new addition to our&nbsp;<a href="https://any.run/cybersecurity-blog/soc-business-success-cases-anyrun/#" target="_blank" rel="noreferrer noopener">success story series</a>,&nbsp;we&nbsp;explore&nbsp;how the&nbsp;<a href="https://any.run/by-industry/healthcare/" target="_blank" rel="noreferrer noopener">healthcare</a>&nbsp;organization’s&nbsp;SOC team&nbsp;improved detection, triage, and response efficiency while&nbsp;maintaining&nbsp;the existing operational processes.&nbsp;</p>



<h2 class="wp-block-heading">Organization Overview&nbsp;</h2>



<p><strong>Health Shared&nbsp;Services&nbsp;</strong>is a&nbsp;healthcare&nbsp;support organization&nbsp;based in&nbsp;Alberta, Canada.&nbsp;&nbsp;Its&nbsp;SOC team&nbsp;consists of 16 analysts&nbsp;with approximately 130,000 endpoints and 160,000 employees to secure.&nbsp;</p>



<h2 class="wp-block-heading">Key&nbsp;Challenge:&nbsp;Limited Threat Visibility During Investigations&nbsp;</h2>



<p>For&nbsp;SOCs&nbsp;supporting large&nbsp;organizations,&nbsp;it’s&nbsp;critical to recognize&nbsp;the time&nbsp;to&nbsp;scale&nbsp;to&nbsp;keep pace with growing infrastructure&nbsp;and&nbsp;current threat landscape.&nbsp;&nbsp;</p>



<p>At Health Shared Services, the security team eventually traced several operational issues back to a single underlying limitation: their&nbsp;previous&nbsp;solution did not provide enough visibility into what suspicious files and URLs&nbsp;actually did&nbsp;after execution.&nbsp;</p>



<p>Analysts often lacked the behavioral context needed to quickly understand whether a threat was real and how it could&nbsp;impact&nbsp;their environment.&nbsp;</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong><em>“Missing critical pieces of information for executed samples reduced our time to investigate, which was frustrating and preventable.”</em></strong>&nbsp;</p>
</blockquote>



<p>Without detailed behavioral insights, faced several consequences:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Extended incident resolution time: </strong>Limited threat context, e.g., lack of logs and information on executed payloads in their previous solutions, increased MTTR, leaving the infrastructure more exposed to potential threats. </li>
</ul>



<ul class="wp-block-list">
<li><strong>Limited time for proper investigation: </strong>Missing critical pieces of information on analyzed samples also led to rushed decisions, leaving little room for deeper insights. </li>
</ul>



<ul class="wp-block-list">
<li><strong>Team morale challenges: </strong>Visibility gaps that could have been addressed with a more context-rich solution led to frustration and fatigue among SOC team members. </li>
</ul>



<p>That’s&nbsp;why when Health Shared Services’&nbsp;previous&nbsp;security&nbsp;solution expired, the&nbsp;team’s&nbsp;leader&nbsp;took the opportunity to reassess their&nbsp;approach and&nbsp;look for a solution that could support their work&nbsp;better.&nbsp;</p>



<h2 class="wp-block-heading">Why&nbsp;Health Shared Services&nbsp;Chose&nbsp;ANY.RUN&nbsp;</h2>



<p>When searching for a new security solution, the organization’s Interim CISO considered several key factors: </p>



<ul class="wp-block-list">
<li><strong>Community reputation</strong> </li>
</ul>



<ul class="wp-block-list">
<li><strong>Cost efficiency</strong> </li>
</ul>



<ul class="wp-block-list">
<li><strong>Investigative capabilities</strong> </li>
</ul>



<p>According to the security leader, ANY.RUN’s Interactive Sandbox&nbsp;stood out in each of these areas.&nbsp;</p>



<p>The solution&nbsp;is acknowledged and&nbsp;frequently&nbsp;recommended among cybersecurity experts,&nbsp;remains&nbsp;a&nbsp;reasonably priced&nbsp;option&nbsp;for enterprise teams, and&nbsp;provides&nbsp;unique capabilities not commonly offered by other solutions.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
<span class="highlight">Deeper visibility</span> drives <span class="highlight">faster investigations.</span> <br>
Build a better SOC with ANY.RUN.
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=healthcare-success-story&#038;utm_term=240326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate ANY.RUN in your SOC  
</a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<p>Decision-makers at the healthcare organization&nbsp;also viewed&nbsp;ANY.RUN’s sandbox&nbsp;as more than a&nbsp;solution&nbsp;that simply&nbsp;facilitates&nbsp;malware analysis, but&nbsp;a driver for better metrics across SOC processes:&nbsp;</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong><em>“ANY.RUN provided not only the fundamentals needed to complete our investigations but also improved our mean time to resolve incidents.”</em></strong>&nbsp;</p>
</blockquote>



<h2 class="wp-block-heading">How Health Shared&nbsp;Services&nbsp;Implemented ANY.RUN’s Sandbox&nbsp;</h2>



<p>The organization’s Interim CISO shared that&nbsp;when implementing ANY.RUN’s solution,&nbsp;the team&nbsp;didn’t&nbsp;need to redesign their core processes.&nbsp;Instead,&nbsp;the SOC refined&nbsp;their investigation cycle and&nbsp;reached&nbsp;better&nbsp;results without significant workflow changes.&nbsp;</p>



<p>They saw&nbsp;improvements across several operational areas&nbsp;since adopting ANY.RUN:&nbsp;</p>



<ul class="wp-block-list">
<li><strong>Better detection: </strong>detailed threat data empowers analysts to process incidents with higher accuracy. </li>
</ul>



<ul class="wp-block-list">
<li><strong>Stronger triage: </strong>low false-positive rate (FPR) makes it easier and faster to process alerts. </li>
</ul>



<ul class="wp-block-list">
<li><strong>Faster response: </strong>efficient reporting and behavioral artifacts support more confident decisions. </li>
</ul>



<p>The Interim CISO noted that the&nbsp;solution&nbsp;also improved the team’s ability to communicate investigation findings to leadership:&nbsp;</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong><em>“It enhanced our team’s time to complete investigations and aided us in providing specific details for executive questions.”</em></strong>&nbsp;</p>
</blockquote>



<h2 class="wp-block-heading">Performance Impact&nbsp;&nbsp;</h2>



<p>By executing suspicious files in ANY.RUN and reviewing behavioral artifacts, analysts were able to gather the context that had previously been missing during investigations.&nbsp;</p>



<p>From a leadership standpoint, the most important improvement has been the impact on SOC performance metrics and investigation confidence. For analysts, this looks like the ability to understand threats faster and deeper.&nbsp;&nbsp;</p>



<h3 class="wp-block-heading"><strong>Key benefits observed by the SOC team</strong> </h3>



<div class="wpdt-c row wpDataTableContainerSimpleTable wpDataTables wpDataTablesWrapper
"
    >
        <table id="wpdtSimpleTable-285"
           style="border-collapse:collapse;
                   border-spacing:0px;"
           class="wpdtSimpleTable wpDataTable"
           data-column="3"
           data-rows="4"
           data-wpID="285"
           data-responsive="0"
           data-has-header="1">

                    <thead>        <tr class="wpdt-cell-row " >
                                <th class="wpdt-cell wpdt-bold"
                                            data-cell-id="A1"
                    data-col-index="0"
                    data-row-index="0"
                    style=" width:33.333333333333%;                    padding:10px;
                    "
                    >
                                        Metric-based impact                     </th>
                                                <th class="wpdt-cell wpdt-bold"
                                            data-cell-id="B1"
                    data-col-index="1"
                    data-row-index="0"
                    style=" width:33.333333333333%;                    padding:10px;
                    "
                    >
                                        Operational benefits                     </th>
                                                <th class="wpdt-cell wpdt-bold"
                                            data-cell-id="C1"
                    data-col-index="2"
                    data-row-index="0"
                    style=" width:33.333333333333%;                    padding:10px;
                    "
                    >
                                        Human-centric values                     </th>
                                        </tr>
                    <tbody>        <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A2"
                    data-col-index="0"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Lower MTTD and MTTR                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="B2"
                    data-col-index="1"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                         High-confidence decision-making                      </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="C2"
                    data-col-index="2"
                    data-row-index="1"
                    style="                    padding:10px;
                    "
                    >
                                        Reduced alert fatigue                     </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A3"
                    data-col-index="0"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Higher alert closure rate                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="B3"
                    data-col-index="1"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                        Faster investigations                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="C3"
                    data-col-index="2"
                    data-row-index="2"
                    style="                    padding:10px;
                    "
                    >
                                         Intuitive and user-friendly interface                       </td>
                                        </tr>
                            <tr class="wpdt-cell-row " >
                                <td class="wpdt-cell "
                                            data-cell-id="A4"
                    data-col-index="0"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                        Maintained SLA compliance                     </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="B4"
                    data-col-index="1"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                         Transparent and structured reporting                      </td>
                                                <td class="wpdt-cell "
                                            data-cell-id="C4"
                    data-col-index="2"
                    data-row-index="3"
                    style="                    padding:10px;
                    "
                    >
                                         Clear insights for analysts and leadership                     </td>
                                        </tr>
                    </table>
</div><style id='wpdt-custom-style-285'>
table#wpdtSimpleTable-285{ table-layout: fixed !important; }
table#wpdtSimpleTable-285 td, table.wpdtSimpleTable285 th { white-space: normal !important; }
</style>




<p>Through these outcomes, the team was able to strengthen their ability to&nbsp;respond&nbsp;to security incidents effectively, covering all key challenges they had to face, from alert fatigue to high MTTR.&nbsp;&nbsp;</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>&#8220;<strong><em>ANY.RUN has bettered our SOC’s key metrics like MTTD and MTTR by providing a mature solution to sandboxing that is both well received by executives and the analysts.</em></strong>&#8221; </p>
</blockquote>



<p>The organization continues to use ANY.RUN and plans to integrate our solutions with&nbsp;their&nbsp;<a href="https://any.run/cybersecurity-blog/integrating-sandbox-into-soar-workflows/" target="_blank" rel="noreferrer noopener">SOAR platform</a>&nbsp;in the future.&nbsp;</p>



<!-- Regular Banner START -->
<div class="regular-banner">
<!-- Text Content -->
<p class="regular-banner__text">
Strong SOC starts with confident decisions.<br>
Improve your investigation cycle <span class="highlight">across processes</span> today.
</p>
<!-- CTA Link -->
<a class="regular-banner__link" id="article-banner-regular" href="https://any.run/enterprise/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=healthcare-success-story&#038;utm_term=240326&#038;utm_content=linktoenterprise#contact-sales" rel="noopener" target="_blank">
Integrate into your SOC </a>
</div>
<!-- Regular Banner END -->
<!-- Regular Banner Styles START -->

<style>
.regular-banner {
display: flex;
text-align: center;
flex-direction: column;
align-items: center;
gap: 1.5rem;
width: 100%;
padding: 2rem;
margin: 1.5rem 0;
border-radius: 0.5rem;
font-family: 'Catamaran Bold';
margin-inline: auto;
background: rgba(32, 168, 241, 0.1);
border: 1px solid rgba(75, 174, 227, 0.32);
}

.regular-banner__text {
font-size: 1.5rem;
margin: 0;
}

.highlight {
color: #ea2526;
}

.regular-banner__link {
padding: 0.5rem 1.5rem;
font-weight: 500;
text-decoration: none;
border-radius: 0.5rem;
color: #FFFFFF;
background-color: #1491D4;
text-align: center;
transition: all 0.2s ease-in;
}

.regular-banner__link:hover {
background-color: #68CBFF;
color: white;
}
</style>
<!-- Regular Banner Styles END -->



<h2 class="wp-block-heading">Conclusion&nbsp;</h2>



<p>For Health Shared Services, adopting ANY.RUN strengthened their existing SOC operations without requiring major workflow changes.&nbsp;</p>



<p>This case highlights how large enterprises across industries&nbsp;benefit&nbsp;from deep threat context, real-time behavioral insights, and efficient reporting ANY.RUN offers.&nbsp;&nbsp;</p>



<h2 class="wp-block-heading">About ANY.RUN&nbsp;</h2>



<p>ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, integrates seamlessly into modern SOC operations. It supports investigations from triage to incident response, improving metrics like DR and&nbsp;<a href="https://any.run/cybersecurity-blog/soc-leaders-playbook-faster-mttr/" target="_blank" rel="noreferrer noopener">MTTR</a>.&nbsp;</p>



<p><a href="https://any.run/features/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=healthcare-success-story&amp;utm_term=240326&amp;utm_content=linktosandboxlanding" target="_blank" rel="noreferrer noopener">ANY.RUN’s Interactive Sandbox</a>&nbsp;aids in deep threat behavior observation, while threat intelligence solutions&nbsp;<a href="https://any.run/threat-intelligence-lookup/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=healthcare-success-story&amp;utm_term=240326&amp;utm_content=linktotilookuplanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Lookup</a>&nbsp;and&nbsp;<a href="https://any.run/threat-intelligence-feeds/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=healthcare-success-story&amp;utm_term=240326&amp;utm_content=linktotifeedslanding" target="_blank" rel="noreferrer noopener">Threat Intelligence Feeds</a>&nbsp;empower analysts with rich community-sources context.&nbsp;</p>



<p>Over 600,000 SOC analysts across 15,000+ teams rely on ANY.RUN&#8217;s solutions.&nbsp;<a href="https://any.run/compliance/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=healthcare-success-story&amp;utm_term=240326&amp;utm_content=linktocompliance" target="_blank" rel="noreferrer noopener">SOC 2 Type II certification</a>&nbsp;allows&nbsp;us to protect customer data and&nbsp;maintain&nbsp;strong security controls.&nbsp;&nbsp;</p>
<p>The post <a rel="nofollow" href="/cybersecurity-blog/healthcare-success-story/">Canada-Based Organization Health Shared Services Accelerates SOC Investigations with ANY.RUN </a> appeared first on <a rel="nofollow" href="/cybersecurity-blog">ANY.RUN&#039;s Cybersecurity Blog</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>/cybersecurity-blog/healthcare-success-story/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>