ANY.RUN

4.9K posts

ANY.RUN banner
ANY.RUN

ANY.RUN

@anyrun_app

Empowering businesses with proactive security solutions: Interactive Sandbox, TI Lookup and Feeds. Sign up: https://t.co/8hIX0Qh5ME

Katılım Şubat 2017
193 Takip Edilen32.2K Takipçiler
Sabitlenmiş Tweet
ANY.RUN
ANY.RUN@anyrun_app·
❗ macOS VM is now live ❗ 25K+ U.S. businesses already run on macOS. Yet #macOS threats remain a blind spot for many SOC teams. 👇 Close this gap now with a broader cross-platform threat visibility for faster and confident response! any.run/cybersecurity-…
English
1
7
18
1.6K
ANY.RUN
ANY.RUN@anyrun_app·
🏦 Protect critical infrastructure and customer trust. #ANYRUN supports triage, continuous monitoring, and threat hunting while keeping sensitive data under strict control. ✅ Identify up to 58% more threats, reduce Tier 1 workload, and cut MTTR: any.run/by-industry/fi…
ANY.RUN tweet media
English
0
1
2
562
ANY.RUN
ANY.RUN@anyrun_app·
⚠️ Slow detection, delayed response, and limited context keep SOCs reactive. #ANYRUN TI Feeds bring fresh IOCs from real attacks into SIEM/XDR, helping spot threats earlier and move to proactive defense. 👨‍💻 See how TI Feeds work in real SOC workflows: any.run/threat-intelli…
ANY.RUN tweet media
English
0
0
2
618
ANY.RUN
ANY.RUN@anyrun_app·
@bomccss Thanks for sharing the analysis!
English
0
0
0
51
bom
bom@bomccss·
日本語のメール本文中リンクからマルウェア感染を狙ったメールが確認されています。 ■日時 2026/03/17,18 ■件名 <役員名> ■リンク hxxps[:]//wwwasdfsafsafas-1393918816.cos.ap-hongkong.myqcloud[.]com/データレポート.rar hxxps[:]//limewire[.]com/d/RiDK5#rOUyOEpx1n
misaki@tdatwja

組織の代表を騙る日本語マルウェアメールの接到を確認しています。 件名: <役員名> リンク: ①wwwasdfsafsafas-1393918816.cos.ap-hongkong.myqcloud[.]com  ②limewire[.]com/d/RiDK5 ファイル: データレポート.rar -> exe MD5: 72a8eb805e026accc0a5805847db978f Sample: virustotal.com/gui/file/facf7…

日本語
1
4
9
1.6K
ANY.RUN
ANY.RUN@anyrun_app·
⌛Your #SOC doesn’t lose to attackers. It loses to time. #MTTR is where incidents either fade quietly… or spiral into something bigger. ❗️See how threat intelligence helps analysts move from doubt to decision any.run/cybersecurity-…
English
0
0
3
711
ANY.RUN
ANY.RUN@anyrun_app·
❗️ SOCs & MSSPs waste time enriching alerts by hand, slowing response. Connect #ANYRUN Sandbox with your Microsoft Sentinel workspace to detect and contain attacks earlier with actionable threat insights ⚡️ Set it up in minutes: any.run/cybersecurity-…
ANY.RUN tweet media
English
0
1
2
1K
ANY.RUN
ANY.RUN@anyrun_app·
From #Lazarus infiltration to AI #phishing, trust abuse is reshaping enterprise threats. What should you prepare for in 2026? Key insights for security leaders from our live expert panel recap 👇 any.run/cybersecurity-…
English
0
2
3
752
JAMESWT
JAMESWT@JAMESWT_WT·
New #Click-Fix Variant / webdav / workflow Some Related Samples +extra 👇 bazaar.abuse.ch/browse/tag/185… AnyRun Zip app.any.run/tasks/9af568c0… Triage Zip tria.ge/260221-2ety2ae… Msi tria.ge/260201-sfg67ae… cc @1ZRR4H @ShadowOpCode @k3dg3
JAMESWT tweet mediaJAMESWT tweet media
The Hacker News@TheHackersNews

⚠️ A new ClickFix variant abuses Win+R to mount a remote WebDAV drive and run malware. It launches a trojanized WorkFlowy Electron app that beacons to C2 every 2 seconds. @Atos says it bypassed Microsoft Defender and surfaced only through threat hunting. 🔗 Inside: WebDAV trick + ASAR injection → thehackernews.com/2026/03/invest…

English
3
3
29
6K
ANY.RUN
ANY.RUN@anyrun_app·
When alerts lack context, triage slows down and MTTR grows ⏳ #ANYRUN’s integration with MISP lets teams validate alerts with behavior-based evidence, while TI Feeds enrich сases with IOCs from live attacks Hit SLA targets and keep operations efficient 👇 any.run/cybersecurity-…
English
0
0
3
882
ANY.RUN
ANY.RUN@anyrun_app·
👿 TrustConnect is a $300/month #RAT-as-a-Service hiding inside fake Zoom, Teams & Adobe installers. Signed with a fraudulent EV cert, streaming your screen via WebSocket, rebuilding under a new brand hours after takedown. 👉 Tech details & business impact: any.run/malware-trends…
ANY.RUN tweet media
English
1
7
12
2K
Autumn Good
Autumn Good@autumn_good_35·
『Early activity points to distribution through compromised or impersonated accounts, with education and telecommunications among the affected sectors.』 MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection any.run/cybersecurity-…
English
1
0
1
374
ANY.RUN
ANY.RUN@anyrun_app·
What an amazing time at RootedCON 2026 🇪🇸 It was great to connect with the cybersecurity community and share how #ANYRUN helps teams make faster decisions. 👉 See the full recap and new capabilities for greater SOC efficiency: any.run/cybersecurity-…
ANY.RUN tweet media
English
0
0
4
834
ANY.RUN
ANY.RUN@anyrun_app·
⚡️ Reduce MTTD to 15 seconds per case in your SOC. Sign up now to detect complex malware & phishing threats early: #register" target="_blank" rel="nofollow noopener">app.any.run/?utm_source=tw…
English
0
0
0
552
ANY.RUN
ANY.RUN@anyrun_app·
🎯 We added and updated 32 Suricata rules based on real attacker behavior observed in the wild. Explore the examples and strengthen your detection. #ANYRUNSuricataChangelog 03/09–03/15/2026 Here are 10 examples 👇 84001725 | PHISHING [ANY.RUN] Generic Phishing related URL (/mussuto/index.html). Example analysis session: app.any.run/tasks/47579e3a… 84001727 | PHISHING [ANY.RUN] Generic Phishing related URL (/indx/hold.js). Example analysis session: app.any.run/tasks/8f9ae28b… 84001772 | PHISHING [ANY.RUN] Generic Phishing related URL (/m365/index). Example analysis session: app.any.run/tasks/f9bfef57… 84001775 | PHISHING [ANY.RUN] Generic Phishkit activity observed related JS (obf-octal-replace). Example analysis session: app.any.run/tasks/2dc0ff39… 84001776 | PHISHING [ANY.RUN] Generic Phishkit related URL (/GoogleDrive.html). Example analysis session: app.any.run/tasks/f8b814e1… 84001778 | PHISHING [ANY.RUN] Credential theft via Telegram API HTTP POST request (email + pass). Example analysis session: app.any.run/tasks/8510193e… 84001781 | PHISHING [ANY.RUN] Facebook-themed phishing campaign related URL (/api/fb). Example analysis session: app.any.run/tasks/7a6d8e2a… 84001782 | PHISHING [ANY.RUN] Facebook-themed phishing campaign related URL (/two_step_verification/). Example analysis session: app.any.run/tasks/7a6d8e2a… 85006509 | LOADER [ANY.RUN] Win32/Generic User-agent observed (Downloader). Example analysis session: app.any.run/tasks/fe479c96… 85006510 | LOADER [ANY.RUN] Win32/Generic related HTTP GET request (/getinstall64). Example analysis session: app.any.run/tasks/fe479c96… Explore the complete ruleset: linkedin.com/pulse/anyrunsu…
ANY.RUN tweet media
English
1
1
4
1.5K
ANY.RUN
ANY.RUN@anyrun_app·
Both play a role, but the main issue is probably the lack of proper outbound traffic control at the endpoint level. With some domain-based whitelisting approaches, this kind of technique works particularly well when the attacker uses a legitimate service like Telegram. The traffic appears legitimate and blends in with normal network activity, making it much harder to distinguish from regular usage.
English
0
0
0
45
Warden | SMB Ransomware Prevention
@anyrun_app Using the Telegram Bot API for exfiltration is such an effective way to blend in with legitimate traffic. Do you think the primary failure here is the lack of endpoint-level egress filtering, or are we just seeing the limits of domain-based whitelisting for C2 detection?
English
1
0
1
42
ANY.RUN
ANY.RUN@anyrun_app·
🚨 𝗦𝗽𝗼𝘁 𝗜𝘁 𝗘𝗮𝗿𝗹𝘆: 𝗖𝗿𝗲𝗱𝗲𝗻𝘁𝗶𝗮𝗹 𝗧𝗵𝗲𝗳𝘁 𝗕𝗲𝗵𝗶𝗻𝗱 𝗙𝗮𝗸𝗲 𝗣𝗗𝗙𝘀 Attackers disguise #phishing HTM/HTML email attachments as PDF files. In the observed case, pdf.htm displays a fake login page and sends entered credentials in JSON via HTTP POST to the Telegram Bot API, enabling account takeover and access to internal systems. Some samples use obfuscated scripts, making the exfiltration logic harder to spot ❗️ ⚡️ #ANYRUN Sandbox exposed phishing behavior in under 60 seconds, revealing the outbound network activity, loaded scripts, and file contents, helping analysts accelerate triage and reduce unnecessary escalations. 🎣 See the analysis session and collect #IOCs to speed up detection and cut MTTR: app.any.run/tasks/3a6af151… 🔍 Find similar cases and pivot from IOCs using this TI Lookup search query: intelligence.any.run/analysis/looku… 👨‍💻 Learn how #ANYRUN Sandbox helps SOC teams detect complex threats faster: any.run/features/?utm_… #ExploreWithANYRUN
ANY.RUN tweet media
English
2
21
50
4K
ANY.RUN
ANY.RUN@anyrun_app·
👨‍💻 Humans are cybersecurity’s weakest and strongest link. Context-rich threat intelligence helps reduce analyst overload and SOC staffing pressure while improving MTTD & MTTR and lowering costs. See how leading SOC teams tackle analyst burnout 👇 any.run/cybersecurity-…
English
1
1
7
1.6K