ANY.RUN (@anyrun_app) 's Twitter Profile
ANY.RUN

@anyrun_app

Empowering businesses with proactive security solutions: Interactive Sandbox,
TI Lookup and Feeds. Sign up for free: app.any.run/?utm_source=x#…

ID: 833639043862786048

linkhttps://any.run/?utm_source=x&utm_campaign=bio calendar_today20-02-2017 11:26:51

3,3K Tweet

28,28K Followers

190 Following

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🏥 More clients meant more pressure for this healthcare MSSP: slow MTTR, manual checks, and constant escalations. #ANYRUN helped them shift to proactive defense, but don’t just take our word for it. See the full success story told by the SOC leader: any.run/cybersecurity-…

🏥 More clients meant more pressure for this healthcare MSSP: slow MTTR, manual checks, and constant escalations. #ANYRUN helped them shift to proactive defense, but don’t just take our word for it.

See the full success story told by the SOC leader: any.run/cybersecurity-…
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

⚠️ #XWorm in PNG files, #JSGuLdr’s three-stage loader, Linux #ransomware, Android RATs; November was packed with multi-layered attacks. See the full analysis of the month’s major threats and key detection takeaways for SOC teams 👇 any.run/cybersecurity-…

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🚨 Expose Evasion Tricks in Linux Malware Many #Linux botnets and cryptominers hide by replacing system utilities like ps, ls, or netstat. This allows attackers to control what the system reports and conceal malicious activity. ⚠️ Two core techniques make infected systems look

🚨 Expose Evasion Tricks in Linux Malware
Many #Linux botnets and cryptominers hide by replacing system utilities like ps, ls, or netstat. This allows attackers to control what the system reports and conceal malicious activity.
⚠️ Two core techniques make infected systems look
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

⚠️ #JSGuLdr is a multi-stage JavaScript-to-PowerShell loader delivering #PhantomStealer. It uses obfuscation, COM execution, and in-memory loading to minimize on-disk exposure See the analysis of this month’s threats and detection takeaways for SOC teams: any.run/cybersecurity-…

⚠️ #JSGuLdr is a multi-stage JavaScript-to-PowerShell loader delivering #PhantomStealer. It uses obfuscation, COM execution, and in-memory loading to minimize on-disk exposure

See the analysis of this month’s threats and detection takeaways for SOC teams: any.run/cybersecurity-…
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

Top 10 last week's threats by uploads 🌐 ⬇️ #Xworm 854 (1042) ⬆️ #Asyncrat 398 (381) ⬇️ #Quasar 329 (413) ⬆️ #Vidar 327 (316) ⬇️ #Lumma 322 (370) ⬆️ #Gravityrat 302 (255) ⬆️ #Stealc 299 (251) ⬆️ #Mircop 288 (247) ⬇️ #Remcos 214 (248) ⬆️ #Guloader 172 (168) Explore malware in

Top 10 last week's threats by uploads 🌐 
⬇️ #Xworm 854 (1042)
⬆️ #Asyncrat 398 (381)
⬇️ #Quasar 329 (413)
⬆️ #Vidar 327 (316)
⬇️ #Lumma 322 (370)
⬆️ #Gravityrat 302 (255)
⬆️ #Stealc 299 (251)
⬆️ #Mircop 288 (247)
⬇️ #Remcos 214 (248)
⬆️ #Guloader 172 (168)
Explore malware in
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🚨 November’s Threat Coverage Digest is out. New malware & phishing, behavior signatures, YARA updates, and 2,184 Suricata rules. Only actionable insights for your SOC ⬇️ any.run/cybersecurity-…

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🚨 Cephalus #ransomware is hitting companies with high-value data RDP abuse. DLL sideloading. Backup & shadow copy destruction. It acts via legitimate executables, leaving little to recover. 👨‍💻 Full breakdown and defense tips: any.run/malware-trends…

🚨 Cephalus #ransomware is hitting companies with high-value data
 
RDP abuse. DLL sideloading. Backup & shadow copy destruction. 
It acts via legitimate executables, leaving little to recover.
 
👨‍💻 Full breakdown and defense tips: any.run/malware-trends…
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

Phishing activity in the past 7 days 🐟 Track latest #phishing threats in TI Lookup: intelligence.any.run/analysis/looku… #TopPhishingThreats

Phishing activity in the past 7 days 🐟
Track latest #phishing threats in TI Lookup:
intelligence.any.run/analysis/looku…

#TopPhishingThreats
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

⚠️ Heads-up, we just caught something big: Salty2FA and Tycoon2FA are teaming up into one phishing machine. New PhaaS is borrowing from both and evolving fast, so SOCs should start watching it closely. Full write-up + detection tips are coming in a couple of hours.

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🚨 New threat alert: #Salty2FA & #Tycoon2FA are now targeting enterprises in a joint #phishing operation. We've found a hybrid #PhaaS that steals corporate logins at scale. Get all the details and actionable IOCs to not miss the attack ⬇️ any.run/cybersecurity-…

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

88% of threats are visible in 60 seconds with #ANYRUN ⚡️ Empower your SOC with faster detection, wider threat coverage, and quicker response. Learn how to achieve 3x team performance: any.run/enterprise/?ut…

88% of threats are visible in 60 seconds with #ANYRUN ⚡️
Empower your SOC with faster detection, wider threat coverage, and quicker response.

Learn how to achieve 3x team performance: any.run/enterprise/?ut…
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🚨 A new PhaaS “chimera” is making phishing attribution harder. #Salty2FA and #Tycoon2FA, once separate phishing kits, now appear inside the same campaigns and even the same payloads. 👾 See analysis of a hybrid payload: app.any.run/tasks/ccf7d689… ➡️ Read the full breakdown of

🚨 A new PhaaS “chimera” is making phishing attribution harder. #Salty2FA and #Tycoon2FA, once separate phishing kits, now appear inside the same campaigns and even the same payloads.

👾 See analysis of a hybrid payload: app.any.run/tasks/ccf7d689…

➡️ Read the full breakdown of
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🎣 73% of attacks start with #phishing. Is your MSSP equipped to stop them at scale? See how #ANYRUN helps cut investigation time, accelerate incident response, and strengthen client protection: any.run/cybersecurity-…

🎣 73% of attacks start with #phishing. Is your MSSP equipped to stop them at scale?

See how #ANYRUN helps cut investigation time, accelerate incident response, and strengthen client protection:

any.run/cybersecurity-…
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🕵️ Stay tuned for an inside look into #Lazarus Group #APT's IT workers scheme. Investigation with videos drops in a few hours.

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

⚠️ Manual #phishing analysis slows teams down: detonate the link, track redirects, extract IOCs by hand. #ANYRUN's Sandbox follows redirects in real time, captures requests, and delivers indicators the moment activity appears. 👾 See how a recent Figma-based phishing chain became

⚠️ Manual #phishing analysis slows teams down: detonate the link, track redirects, extract IOCs by hand. #ANYRUN's Sandbox follows redirects in real time, captures requests, and delivers indicators the moment activity appears.
👾 See how a recent Figma-based phishing chain became
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

Top 10 last week's threats by uploads 🌐 ⬆️ #Xworm 870 (854) ⬆️ #Asyncrat 415 (398) ⬆️ #Quasar 395 (329) ⬇️ #Vidar 318 (327) ⬇️ #Lumma 286 (322) ⬆️ #Remcos 273 (212) ⬇️ #Stealc 266 (296) ⬇️ #Gravityrat 241 (302) ⬆️ #Guloader 179 (172) ⬆️ #Smokeloader 155 (144) Explore malware in

Top 10 last week's threats by uploads 🌐 
⬆️ #Xworm 870 (854)
⬆️ #Asyncrat 415 (398)
⬆️ #Quasar 395 (329)
⬇️ #Vidar 318 (327)
⬇️ #Lumma 286 (322)
⬆️ #Remcos 273 (212)
⬇️ #Stealc 266 (296)
⬇️ #Gravityrat 241 (302)
⬆️ #Guloader 179 (172)
⬆️ #Smokeloader 155 (144)
Explore malware in
ANY.RUN (@anyrun_app) 's Twitter Profile Photo

❓How many real threats hide behind the noise your SOC faces every day? Alert fatigue drains focus. With this practical solution plan, SOC teams achieve 3x better efficiency and 15 sec MTTD. Learn how you can implement it for your security team👇 any.run/cybersecurity-…

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🚨 #PXAStealer continues to evolve Hitting government, education, and private users, it steals sensitive data via DLL sideloading and decoy legitimate files 👨‍💻 See overview of its methods and anti-analysis techniques: any.run/malware-trends…

🚨 #PXAStealer continues to evolve

Hitting government, education, and private users, it steals sensitive data via DLL sideloading and decoy legitimate files

👨‍💻 See overview of its methods and anti-analysis techniques: any.run/malware-trends…