TI Lookup allows you to search across threat data extracted from the latest malware and phishing samples analyzed by over 500,000 professionals and 15,000 companies around the globe in ANY.RUN’s Interactive Sandbox. This makes it particularly important for companies to use proper tools for proactive security like ANY.RUN’s Threat Intelligence Lookup and Interactive Sandbox. The IOCs, IOBs, and IOAs brought to you by Threat Intelligence Lookup can be used to configure firewalls, NIDS/NIPS systems, EDR/antivirus tools, SIEM rules and alerts. Based on TI data, you can update YARA rules to detect similar .elf files, set up threat hunting rules (e.g., logging SSH connection attempts from blacklisted IPs), and track lateral movement if an attacker is already inside your network. A huge searchable repository of IOCs, IOAs, and IOBs that you can explore contains enough fresh data on Windows and Linux malware and campaigns. We shall combine country name, threat type (botnet), and the Ubuntu OS version in a TI Lookup search query. This process typically involves automated tools or scripts that scan ranges of IP addresses to detect open SSH ports (usually port 22) and attempt to gain unauthorized access.
This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 15 Apr 2025 17:20:12 +0000