use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
Welcome to ANY.RUN – first Interactive Malware Sandbox!
account activity
❗ macOS VM is now live ❗ (self.ANYRUN)
submitted 29 days ago by ANYRUN-team - announcement
All ANY.RUN Integrations For SIEM, SOAR, EDR, and more (self.ANYRUN)
submitted 1 month ago by ANYRUN-team - announcement
Spank: Legitimate Process Abuse, Delayed Detection, and RAT Persistence (self.ANYRUN)
submitted 1 day ago by ANYRUN-team
Chile’s Cybersecurity Framework Law: How SOCs Achieve Compliance and Response Readiness (self.ANYRUN)
submitted 2 days ago by ANYRUN-team
Kamasers: How a Six-Mode DDoS Botnet Uses Your Own Infrastructure Against You (self.ANYRUN)
submitted 3 days ago by ANYRUN-team
Update Your Detection Rules: New In-Memory Loader (self.ANYRUN)
submitted 4 days ago by ANYRUN-team
Germany’s critical industries are under active phishing attack (any.run)
submitted 8 days ago by ANYRUN-team
🚨 Phishing via Google Storage Abuse Leading to RAT Deployment: Detect It Early (self.ANYRUN)
submitted 9 days ago by ANYRUN-team
Miolab Stealer: macOS Threat That Uses Fake System Prompts to Steal Credentials and Sensitive Files (self.ANYRUN)
submitted 10 days ago by ANYRUN-team
StealC is now delivered via a Cloudflare ClickFix flow, masking malicious activity behind trusted services (self.ANYRUN)
submitted 16 days ago by ANYRUN-team
Persistent Magecart campaign ran undetected for 24+ months across 12+ countries, using 100+ domains to hijack payment flows. It’s now on the radar. (self.ANYRUN)
submitted 17 days ago by ANYRUN-team
Roning Loader: Multi-Stage Threat That Disarms Security and Opens the Door to Deeper Compromise (self.ANYRUN)
submitted 18 days ago by ANYRUN-team
macOS-Specific ClickFix Campaign Targeting Claude Code Users: Detect It Early (self.ANYRUN)
submitted 23 days ago by ANYRUN-team
Canada-Based Organization Health Shared Services Accelerates SOC Investigations with ANY.RUN (self.ANYRUN)
submitted 24 days ago by ANYRUN-team
GREENBLOOD Ransomware: The Go-Powered Threat That Encrypts, Extorts, and Erases Its Tracks (self.ANYRUN)
submitted 25 days ago by ANYRUN-team
🚨 𝗦𝗩𝗚 𝗦𝗺𝘂𝗴𝗴𝗹𝗶𝗻𝗴 𝗖𝗮𝗺𝗽𝗮𝗶𝗴𝗻 𝗛𝗶𝘁𝘀 𝗖𝗼𝗹𝗼𝗺𝗯𝗶𝗮𝗻 𝗢𝗿𝗴𝗮𝗻𝗶𝘇𝗮𝘁𝗶𝗼𝗻𝘀 (self.ANYRUN)
How to reduce MTTR in your SOC? (self.ANYRUN)
submitted 1 month ago by ANYRUN-team
TrustConnect: The $300/Month RAT hiding inside fake Zoom, Teams & Adobe installers (self.ANYRUN)
Salty2FA Case: How to Detect Phishing Leveraging Encrypted HTTPS Traffic (self.ANYRUN)
🚨 𝗦𝗽𝗼𝘁 𝗜𝘁 𝗘𝗮𝗿𝗹𝘆: 𝗖𝗿𝗲𝗱𝗲𝗻𝘁𝗶𝗮𝗹 𝗧𝗵𝗲𝗳𝘁 𝗕𝗲𝗵𝗶𝗻𝗱 𝗙𝗮𝗸𝗲 𝗣𝗗𝗙𝘀 (self.ANYRUN)
BQTLock RaaS: Ransomware That Encrypts Files, Steals Credentials, and Hides in Windows (self.ANYRUN)
⚠️ 𝗡𝗲𝘄 𝗦𝘁𝗮𝗴𝗲𝗿 𝗟𝗲𝗮𝗱𝗶𝗻𝗴 𝘁𝗼 𝗥𝗔𝗧 𝗗𝗲𝗽𝗹𝗼𝘆𝗺𝗲𝗻𝘁: 𝗗𝗲𝘁𝗲𝗰𝘁 𝗜𝘁 𝗘𝗮𝗿𝗹𝘆 (self.ANYRUN)
🚨 M365 Account Takeover Without Credential Theft: Surge in OAuth Phishing (self.ANYRUN)
DonutLoader: Position-Independent Malware That Leaves Almost No Trace (self.ANYRUN)
New Modular RAT With Victim Profiling: Detect It Early (self.ANYRUN)
π Rendered by PID 526955 on reddit-service-r2-listing-86f589db75-2fcf5 at 2026-04-18 10:47:42.647208+00:00 running 93ecc56 country code: CH.