
ANY.RUN
@anyrun_app
Followers
30K
Following
5K
Media
1K
Statuses
4K
Empowering businesses with proactive security solutions: Interactive Sandbox, TI Lookup and Feeds. Sign up for free: https://t.co/8hIX0Qh5ME
Joined February 2017
🚨 #Salty2FA is a new #phishkit from #Storm1575 that has been evading detection since June. 🎯 Targets finance, energy, and telecom companies in the US & EU.🪝 Steals creds and bypasses multiple 2FA methods. Read analysis of its attack chain 👇.
any.run
Dive deeper into malware analysis of a PhaaS framework discovered by ANY.RUN's experts: Salty2FA, targeting industries in the USA and EU.
2
17
43
💡 Found a suspicious artifact? Don’t keep it to yourself!.TI Lookup is now free — enrich your #IOCs, share intel, and help strengthen the community. To get started, try this query to explore Tycoon threats detected in the US: .
0
0
5
🐟 Phishing activity in the past 7 days. Track latest #phishing threats in TI Lookup, now available for free:
0
6
11
🚨 DragonForce is a ruthless #ransomware built to paralyze organizations. It wipes backups, disables recovery, spreads across networks, and encrypts everything with no way back. Victims are left facing multimillion-dollar ransom demands 💰 .See analysis & gather #IOCs:
1
8
19
⚠️ #Ducex is an advanced #Android packer found in Triada #trojan samples. It employs serious obfuscation through function encryption using a modified RC4 algorithm with added shuffling. Explore our technical analysis to see how it works 👇.
any.run
Read a technical analysis of the Ducex packer used by Android malware like Triada for obfuscation and analysis evasion.
1
7
17
🔥 Enrich #IOCs with actionable threat context at no cost. TI Lookup's free plan lets you go from an isolated indicator to a complete attack view in seconds. See how you can speed up investigations with real-world examples 👇.
any.run
See how free version of ANY.RUN’s Threat Intelligence Lookup helps enrich IOCs with context from live attack data.
0
4
8
🚨 How to Spot #Ransomware Activity Early with TI Lookup .Malware can leave your SOC blind unless you proactively hunt its behavior. Ransomware is a good example. ⚠️ Typically it only encrypts files without removing backups or logs. When it starts executing commands to hide
0
20
73
👨💻 From deeper visibility into threat behavior to faster triage and incident response, #ANYRUN helps SOCs save time and effort throughout daily security workflows. Your team can benefit too. Get started:
0
5
17
#ANYRUN & Microsoft Sentinel 🚀 . With the built-in STIX/TAXII connector, security teams receive fresh, filtered, and rich threat data from global attacks. Learn how to expand incident monitoring, boost detection rate, and slash MTTR:
2
2
5
🐟 Phishing activity in the past 7 days. Track latest #phishing threats in TI Lookup, now available for free:
0
12
26
🚨 BlackMatter is a stealthy #ransomware that hit 50+ organizations in just 4 months. From agriculture to manufacturing, it has already disrupted several critical supply chains. Ransom demands reach $30M in some cases 💰. ️See analysis & gather #IOCs:
1
23
57
Who’s really taxing you—Congress or unelected bureaucrats? 🧐. In FCC v. Consumers’ Research, SCOTUS said Congress gave the FCC “enough” limits to run a multi-billion-dollar fund. The dissent? They called it a tax—a core legislative power—and said Congress has to do a lot more.
2
7
42
Top 10 last week's threats by uploads 🌐.⬇️ #Lumma 590 (650).⬆️ #Xworm 437 (360).⬆️ #Agenttesla 436 (404).⬆️ #Snake 412 (154).⬆️ #Sfuzuan 375 (365).⬆️ #Remcos 231 (211).⬆️ #Dcrat 192 (131).⬇️ #Asyncrat 186 (252).⬆️ #Rhadamanthys 169 (160).⬇️ #Smoke 160 (193).Track them all:
0
11
22
🚀 Huge shout-out to our long-time friend & guest author @MauroEldritch! .At #DEFCON33’s @MalwareVillage, he delivered a brilliant breakdown of sophisticated malware operations. Missed it? His reports are a goldmine for threat hunters looking to uncover adversary TTPs and
2
15
45
🚨 #Salty2FA: A Previously Undetected Phishing Kit Targeting High-Risk Industries. ⚠️ We’ve identified an active #phishing campaign, ongoing since June, engineered to bypass nearly all known 2FA methods and linked to the #Storm1575 threat actor. We named it for its distinctive
2
34
107