Malware Patrol

Threat Intelligence

Turn intelligence into action – Detect, analyze, and respond faster

Overview

Gain a comprehensive view of the external cyber landscape with Malware Patrol’s Cyber Threat Intelligence (CTI) solutions. Our intelligence is derived from a diverse and extensive collection of sources that provide real-time visibility into active and emerging cyber risks. We cover a broad spectrum of malicious activities, including malware, ransomware, phishing, cryptominers, newly registered domains, and command-and-control servers to equip your organization with the insights needed to proactively detect and mitigate potential attacks.

Our continuous monitoring of the global threat landscape enables us to deliver timely, actionable CTI that empowers your organization’s defenses. By choosing Malware Patrol, you are not just getting data – you are gaining a powerful ally in your cybersecurity efforts.

Benefits

Highly Actionable

Our threat intelligence solutions boast an exceptionally low false positive rate. We ensure the accuracy of our data through rigorous daily validation, including DNS resolution and URL visits, to make sure only active indicators are in the feeds.

Context

Our data is enriched with critical context, including MITRE ATT&CK mappings, to help organizations understand the actors and intent behind cyber activity, prioritize risks, and strengthen their defense strategies in a more targeted manner.

f

Seamless Integration

Effortlessly integrate Malware Patrol’s CTI with your existing security stack, including SIEMs, TIPs, and NGFWs. Automated data ingestion ensures that your team has Malware Patrol’s actionable intelligence exactly where and when it’s needed.

Historical Correlations

We correlate threats with our two decades’ worth of historical data. This provides unparalleled insight into long-term cyber trends, enabling the identification of patterns, attribution of malicious activity, and enhanced forecasting of emerging risks.

Data Options

Explore our threat intelligence data packages, designed for a range of security needs—from blocking malicious activity via firewalls to threat hunting and enrichment. Choose from our curated packages, purchase à la carte feeds, or access expanded datasets for research and analysis through our Enterprise offering.

Download our product sheet for data feed details. –>

 

GateKeeper

Real-time blocking of active malicious domains using a DNS RPZ firewall.

Radar

Domain-level insights into both active and emerging threats.

Guardian

Active and emerging threats along with ongoing attacks contextualized with metadata.

b

Data Feeds

Malicious Domains

Emergent Threats Domains, Malicious Domains

Emergent Threats Domains, Intrusion Insights, Malicious Domains, Malware Hashes

IOC Type

Domain

Domain

Domain, Hash, IP, Metadata

n

Format

BIND 9 XFR

CSV, BIND RPZ (XFR or downloadable)

CSV, JSON

Time Range

60 days

180 days

All active

Threats Covered

C2s, Cryptominers, DGAs, Malware, Phishing, Ransomware

C2s, Cryptominers, DGAs, Emerging Threats, Malware, Phishing, Ransomware

Automated Attacks, Botnets, C2s, Cryptominers, DGAs, Emerging Threats, Malware, Phishing, Ransomware

Sentinel

High-fidelity data to enhance threat detection, enforcement, and network protection using NGFW.

ThreatLens

Counter sophisticated cyber threats utilizing all indicator types and valuable context.

Enterprise

A la carte, full access, or customized to your specifications. Also includes data feeds not available in standard packages. Learn more.

b

Data Feeds

Emergent Threats Domains, Intrusion Insights, Malicious Domains, Malicious Hashes, Malicious IPs, Malicious URLs, Tor Exit Nodes

DoH Servers, Emergent Threats Domains, Intrusion Insights, Malicious Domains, Malicious Hashes, Malicious IPs, Malicious URLs

ThreatLens feeds + DGAs, Malware Samples, Newly Registered Domains, Phishing Screenshots & Raw HTML, Unsanitized URLs

IOC Type

Domain, Hash, IP, URL, Metadata

Domain, Hash, IP, URL, Metadata

Domain, Hash, HTML, IP, Samples, Screenshots, URL, Metadata

n

Format

Cisco, FortiGate, MikroTik, Palo Alto NGFW

CSV, JSON, FortiSIEM, MISP

CSV, JSON and custom formats

Time Range

180 days

All active

All active

Threats Covered

Automated Attacks, Botnets, C2s, Cryptominers, DGAs, Emerging Threats, Malware, Phishing, Ransomware

Automated Attacks, Botnets, C2s, Cryptominers, DGAs, Emerging Threats, Malware, Phishing, Ransomware

Automated Attacks, Botnets, C2s, Cryptominers, DGAs, Emerging Threats, Malware, Phishing, Ransomware

All feeds are available for individual purchase – visit our Enterprise page for more information.

Take advantage of our free data evaluation.

Features

Our flexible solutions provide continuous updates, expert support, and seamless access to high-quality threat data—ensuring you stay ahead of cyber risks.

  • Free Data Evaluation: Test our intelligence with a complimentary evaluation.
  • Hourly Feed Updates: Stay ahead of emerging risks with real-time updates.
  • Unlimited Downloads: Access your data without limitations.
  • Dedicated Account Manager: Get personalized support with a direct point of contact.
  • US-Based Tech Support: Receive fast assistance for integrations & troubleshooting.
  • Annual & Multi-Year Subscriptions: Choose a flexible plan for long-term security.

Use Cases

Detect & Respond

Detection and response solutions focus on identifying and mitigating threats that have bypassed initial defenses. Comprehensive and actionable threat intelligence enables security teams to detect and investigate incidents faster, confidently automate responses to mitigate risks, and ensure swift recovery from potential breaches.

  • IDS: Detect and alert on suspicious activity in networks or systems to support incident response. (Snort, Suricata)
  • EDR: Monitor and analyze system activity to detect threats and provide response capabilities.
  • XDR: Integrate data across multiple security layers (endpoint, network, cloud) for holistic threat detection and response.

Block & Prevent Attacks

Using real-time intelligence on malicious domains, IPs, URLs, and file hashes, security solutions can automatically block known threats before they can cause harm. This intelligence-driven approach strengthens defenses by reducing attack surface exposure and stopping threats at scale before they reach critical systems.

  • Firewall: Prevent infections by using dynamic blocklists of known malicious IPs, domains, and URLs to deny access to malicious sites. Palo Alto NGFW, FortiGate NGFW, MikroTik, Cisco FirePOWER)
  • IPS: Monitor network traffic in real-time and actively blocks known threats and vulnerabilities. (Suricata)
  • Email security gateway: Identify and mitigate phishing, malware, and other email-based attacks before they reach users’ inboxes. (SpamAssassin)
  • AV / Anti-malware solution: Detect and remove malware, including viruses, trojans, and ransomware, through file and email scanning using signature-based detection. (ClamAV)

Threat Hunting

Threat hunting is a proactive approach to cybersecurity that involves searching for threats that may have evaded automated defenses like firewalls, antivirus software, or intrusion detection systems. Threat intelligence plays a crucial role in this process by providing security teams with contextual information about known and ongoing attack methods, tools, and tactics used by adversaries. This information allows security professionals to focus their efforts on specific attack vectors, anticipate potential moves, and search for evidence of their activities. By integrating external threat feeds with internal security data, organizations can gain a clearer picture of the threat landscape and uncover risks that might otherwise go undetected.

IOC Enrichment & Correlation

Threat intelligence provides critical context – threat classifications, MITRE ATT&CK mappings, timestamps, and historical activity, among others – to raw indicators. Enriching, aggregating, and correlating data from multiple vendors, internal telemetry, OSINT, and intelligence-sharing networks, helps security teams identify patterns, relationships, and attack campaigns more effectively.

  • TIP: Aggregate and analyze threat data to enrich IOCs with contextual information. (MISP, Anomali, ThreatQ)
  • SOAR: Automate IOC enrichment and correlation workflows across multiple tools.