Threat Coverage Digest: New Malware, Fresh Behavior Insights, and 5K+ Detection Rules
好的,我需要帮用户总结这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我快速浏览一下文章,发现主要讲的是ANY.RUN公司在11月做了很多安全方面的改进。 文章提到了他们发布了新的威胁情报报告,覆盖了各种恶意软件和攻击活动,特别是针对意大利组织的钓鱼攻击。此外,他们还增加了行为签名、YARA规则和Suricata规则,以提高检测能力。 接下来,我需要把这些信息浓缩到100字以内。重点包括:新的威胁情报报告、钓鱼攻击、行为签名、YARA规则和Suricata规则的增加。同时,要提到这些改进帮助分析师更快地检测威胁。 最后,确保语言简洁明了,直接描述内容,不使用任何开头的套话。这样用户就能清楚地了解文章的主要内容了。 </think> ANY.RUN在11月发布了新的威胁情报报告,覆盖了多种恶意软件和攻击活动,并新增了52个行为签名、9个YARA规则和2,184个Suricata规则,以提升检测能力。此外,还针对意大利组织的钓鱼攻击发布了详细报告,并提供相关TI Lookup查询工具。 2025-12-1 10:47:0 Author: any.run(查看原文) 阅读量:1 收藏

November was a packed month for detection coverage. We rolled out new behavioral insights, broadened our visibility across multiple threat families, and strengthened rulesets at every layer. On top of that, our analysts uncovered and documented a new phishing wave targeting Italian organizations through malicious PDF attachments, now fully mapped in a dedicated TI report. 

Let’s walk through the full set of improvements we delivered this month. 

Threat Intelligence Reports 

In November, we published several new TI Reports covering threats that are currently targeting companies around the world. The four of them are open to everyone: 

  • PDFChampions, Efimer, BTMOBMalvertising-based browser hijacker, Tor-hosted cryptocurrency stealer, and Android MaaS trojan abusing Accessibility to drain banking, fintech, and wallet applications. 
  • Monkey, Phoenix, NonEuclidAI-generated Linux ransomware, espionage-focused backdoor, and dual-use RAT–ransomware illustrating convergence of state-aligned techniques and financially motivated crimeware. 
  • Valkyrie, Sfuzuan, SorvepotelWindows stealer MaaS, adaptable backdoor, and WhatsApp-propagating campaign weaponizing social trust and messaging channels for large-scale infection. 

We also wrote an extensive report exclusively for the TI Lookup Premium subscribers. It goes in-depth on a phishing campaign aimed specifically at Italian organizations across transportation, tourism, telecom, IT, and government sectors. The activity relies on PDF attachments disguised as official documents, each redirecting victims to counterfeit Microsoft login pages built to harvest corporate credentials. 

Recent TI report covering phishing of Italian organizations 

The report outlines: 

  • A consistent lure pattern using Italian-language prompts inviting recipients to “review” or “sign” a document 
  • PDF filenames following a shared template: Allegato_Ufficiale_<variable>.pdf 
  • Brand impersonation, including well-known Italian companies, to raise credibility 
  • Redirect chains leveraging both compromised domains and attacker-controlled infrastructure (e.g., phebeschool.orgmircosotfonilne.ruvorn.revolucionww.com
  • Browser fingerprinting behavior tied to data collection on victim systems 
  • Email templates localized in Italian, with urgent subject lines pushing immediate action 

We also included ready-to-use TI Lookup queries so analysts can surface related samples quickly, track the filename cluster, and follow the network infrastructure across recent public analysis sessions. 

Behavior Signatures 

In November, we expanded the malicious behavior coverage of ANY.RUN’s Interactive Sandbox with 52 new signatures across ransomware families, loaders, post-exploitation tools, and suspicious PowerShell activity. These additions help analysts surface malicious behavior earlier, reduce repeated checks, and speed up root-cause discovery. 

Here are the latest signatures added: 

JSGuLdr is a new threat currently targeting enterprises 
ANY.RUN’s Interactive Sandbox easily exposes CVE-2025-6216 attacks 

YARA Rules 

We added 9 YARA rules in November to improve early detection of ransomware, RAT families, and network-proxy tooling. These rules help analysts flag suspicious samples even before execution, making triage faster and more reliable. 

Suricata Rules 

In November, we added 2,184 new Suricata rules, strengthening network-level detection for RAT traffic, stealer activity, and modern phishing techniques. These additions expand coverage for TLS fingerprinting and browser-based deception tactics. 

A Suricata rule used for detecting GravityRAT in ANY.RUN’s Sandbox 
  • GravityRAT JA3 (sid:84000202): Identifies GravityRAT network activity by previously unlisted JA3 TLS fingerprint. 
  • SalatStealer JA3 (sid:84000205): Identifies SalatStealer network activity by previously unlisted JA3 TLS fingerprint. 

About ANY.RUN 

ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, is used by more than 500,000 analysts across 15,000 organizations worldwide. The service helps teams investigate threats in real time, follow full execution chains, and surface critical behavior within seconds. 

Analysts can detonate samples, interact with them as they run, and immediately pivot into network traces, file system changes, registry activity, and memory artifacts. With continuously updated detection coverage, including new behavioralsignatures, YARA rules, Suricata rules, and TI insights, teams get faster answers and clearer visibility with less manual effort. 

Whether you’re running day-to-day investigations, handling escalations, or tracking emerging campaigns, ANY.RUN gives SOC teams, DFIR analysts, MSSPs, and researchers a practical way to reduce uncertainty and make decisions with confidence. 

Start your 14-day trial of ANY.RUN today →         


文章来源: https://any.run/cybersecurity-blog/threat-coverage-digest-november-2025/
如有侵权请联系:admin#unsafe.sh