๐Ÿ“ˆ Threat intelligence value is defined by its daily use. Integrated into workflows, it improves decision speed, consistency, and SOC visibility.

โšก๏ธ #ANYRUN Threat Intelligence supports this by delivering context where decisions are made. Learn more: https://any.run/cybersecurity-blog/expanded-free-ti-plan/?utm_source=mastodon&utm_medium=post&utm_campaign=expanded_ti_plan&utm_term=070526&utm_content=linktoblog

๐Ÿšจ #BlobPhish credential-phishing campaign targets Microsoft 365, major U.S. financial institutions, and webmail services.
โš ๏ธ Compromised accounts enable BEC, data exfiltration, and lateral movement, creating direct financial and operational risk.

This campaign generates phishing pages directly inside the browser using blob objects instead of loading them over the network. The payload exists entirely in memory, which breaks network visibility and makes traditional detection unreliable.

โšก๏ธ #ANYRUN Sandbox helps SOC teams observe this behavior, exposing in-memory phishing and enabling faster detection and response. See how the attack unfolds and collect IOCs: https://app.any.run/tasks/191b74fc-fb9f-455a-9492-ca872871d0e1/?utm_source=mastodon&utm_medium=post&utm_campaign=blobphish_case&utm_term=060526&utm_content=linktoservice

๐Ÿ“Œ Explore full technical breakdown to understand detection gaps, validate your coverage, and strengthen phishing defenses: https://any.run/cybersecurity-blog/evasive-blob-phishing-detection/?utm_source=mastodon&utm_medium=post&utm_campaign=blobphish_case&utm_term=060526&utm_content=linktoblog

Mature SOCs using Microsoft Sentinel are adding #ANYRUN to their stack. It gives analysts time to make decisions. And also:
โšก Auto-enrichment and prioritization
๐Ÿ“‰ MTTR down by up to 21 min
๐Ÿ”ฅ Early detection & faster response

Time to add it to your SOC: https://any.run/cybersecurity-blog/malware-sandbox-ms-sentinel-connector/?utm_source=mastodon&utm_medium=post&utm_campaign=sandbox_sentinel&utm_term=060526&utm_content=linktoblog

The MSSP market is booming. When growth kills margins, intelligence-driven scaling is the fix โœ…

#ANYRUN gives MSSPs a unified operational layer, which means less manual work, consistent workflows, and more context across every client.

๐Ÿ“ˆ Learn how to scale past bottlenecks: https://any.run/cybersecurity-blog/mssp-pains-solved-by-ti/?utm_source=mastodon&utm_medium=post&utm_campaign=mssp_pains_solved_by_ti&utm_term=050526&utm_content=linktoblog

๐Ÿš€ Fuel core SOC workflows with #ANYRUN April updates

20 premium TI Lookup and YARA Search requests now available for your team, AI-assisted search, and 1,770 new detections to support triage, hunting, and response.

๐ŸŽฏ Cut uncertainty and act faster
https://any.run/cybersecurity-blog/release-notes-april-2026/?utm_source=mastodon&utm_medium=post&utm_campaign=release_notes_april_2026&utm_term=300426&utm_content=linktoblog

Release Notes: 20 Premium TI Requests & New Detections

ANY.RUN April updates: expanded Threat Intelligence access, AI-assisted search, new detection coverage, and fresh TI Reports.

ANY.RUN's Cybersecurity Blog

๐Ÿšจ ๐—”๐—Ÿ๐—˜๐—ฅ๐—ง: ๐—จ๐—ฆ-๐—ง๐—ฎ๐—ฟ๐—ด๐—ฒ๐˜๐—ฒ๐—ฑ #๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐—–๐—ฎ๐—บ๐—ฝ๐—ฎ๐—ถ๐—ด๐—ป ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜๐—ถ๐—ป๐—ด ๐—ฅ๐—ฒ๐—บ๐—ผ๐˜๐—ฒ ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—•๐—น๐—ถ๐—ป๐—ฑ ๐—ฆ๐—ฝ๐—ผ๐˜๐˜€
A large-scale campaign is targeting U.S. organizations with fake event invitations. Attackers combine credential theft with OTP interception and RMM deployment, enabling direct remote access.

โš ๏ธ Activity is concentrated in the U.S., with ๐—ต๐—ถ๐—ด๐—ต ๐—ฟ๐—ถ๐˜€๐—ธ ๐—ฎ๐—ฐ๐—ฟ๐—ผ๐˜€๐˜€ ๐—ฏ๐—ฎ๐—ป๐—ธ๐—ถ๐—ป๐—ด, ๐—ด๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ป๐—บ๐—ฒ๐—ป๐˜, ๐˜๐—ฒ๐—ฐ๐—ต, ๐—ฎ๐—ป๐—ฑ ๐—ต๐—ฒ๐—ฎ๐—น๐˜๐—ต๐—ฐ๐—ฎ๐—ฟ๐—ฒ, indicating broad exposure across business-critical sectors.

โ—๏ธ Some phishing pages show signs of AI-assisted generation, while embedded code reveals reuse of common phishing kits, allowing attackers to scale and rapidly create new lures.

The risk goes beyond phishing. ๐—ฅ๐—ฒ๐—บ๐—ผ๐˜๐—ฒ ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐—ฐ๐—ผ๐—ฟ๐—ฝ๐—ผ๐—ฟ๐—ฎ๐˜๐—ฒ ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜ ๐—ถ๐˜€ ๐—ฒ๐˜€๐˜๐—ฎ๐—ฏ๐—น๐—ถ๐˜€๐—ต๐—ฒ๐—ฑ ๐˜๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต ๐—น๐—ฒ๐—ด๐—ถ๐˜๐—ถ๐—บ๐—ฎ๐˜๐—ฒ ๐˜๐—ผ๐—ผ๐—น๐˜€ like ScreenConnect, ITarian, and Datto RMM, while infrastructure and domains are designed to look trustworthy, delaying detection and increasing attacker dwell time.

๐Ÿ”— The flow starts with a CAPTCHA page, followed by a fake โ€œevent invitationโ€ and then splits into two paths: credential harvesting via phishing login pages or RMM installation.
๐Ÿ‘พ In this case, the download starts automatically, establishing access early in the execution chain, before user awareness. See how the full flow unfolds, from initial redirect to remote access delivery: https://app.any.run/tasks/4c2687da-1426-43c3-8e16-868f90fb9361/?utm_source=mastodon&utm_medium=post&utm_campaign=phishing_RMM_campaign&utm_term=290426&utm_content=linktoservice

โšก๏ธ With #ANYRUN Sandbox and Threat Intelligence, analysts can safely reconstruct the full attack chain and identify related patterns across campaigns. This enables earlier confirmation of phishing activity, reduces MTTD, and helps contain incidents before impact.

โ—๏ธ Early-stage signals make this campaign detectable. These appear before credentials are entered and are visible in #ANYRUN Sandbox at the start of the execution chain, enabling faster and more confident response decisions.

Despite infrastructure changes, the campaign relies on repeatable patterns: consistent URL structure across phishing domains, fixed resource paths like /Image/*.png, and sequential requests such as /favicon.ico โžก๏ธ /blocked.html โžก๏ธ phishing content.

๐Ÿ“Œ Full technical breakdown of this campaign and all attack flow variants coming soon. Stay tuned!

๐Ÿ‘จโ€๐Ÿ’ป Explore these patterns, uncover related activity, and pivot from IOCs in TI Lookup: https://intelligence.any.run/analysis/lookup?utm_source=mastodon&utm_medium=post&utm_campaign=phishing_rmm_campaign&utm_content=linktotilookup&utm_term=290426#%7B%2522query%2522:%2522url:%255C%2522/blocked.html%255C%2522%2520AND%2520url:%255C%2522/favicon.ico%255C%2522%2520and%2520url:%255C%2522/Image/*.png%255C%2522%2522,%2522dateRange%2522:180%7D%20

๐Ÿš€ Equip your SOC with stronger phishing detection and contain incidents faster: https://any.run/enterprise/?utm_source=mastodon&utm_medium=post&utm_campaign=phishing_RMM_campaign&utm_term=290426&utm_content=linktoblog

#cybersecurity #infosec

๐Ÿฅ Healthcare is a prime ransomware target due to legacy systems and sensitive data. Faster, clearer threat analysis keeps operations running.

โšก๏ธ Dive into the real story of how healthcare support organization accelerated SOC processes with #ANYRUN: https://any.run/cybersecurity-blog/healthcare-success-story/?utm_source=mastodon&utm_medium=post&utm_campaign=healthcare_success_story&utm_term=290426&utm_content=linktoblog

๐Ÿšจ #๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด-๐˜๐—ผ-๐—ฅ๐— ๐—  ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ๐˜€: ๐—ง๐—ต๐—ฒ ๐—ฅ๐—ฒ๐—บ๐—ผ๐˜๐—ฒ ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐—•๐—น๐—ถ๐—ป๐—ฑ ๐—ฆ๐—ฝ๐—ผ๐˜ ๐—–๐—œ๐—ฆ๐—ข๐˜€ ๐—–๐—ฎ๐—ปโ€™๐˜ ๐—œ๐—ด๐—ป๐—ผ๐—ฟ๐—ฒ
Attackers are exploiting a security gap in U.S. businesses. Fake Microsoft, Adobe, and OneDrive pages deliver RMM software instead of payloads, giving attackers direct access to the environment.

โš ๏ธ Because these tools are widely used across enterprises, attackers can establish access before activity is flagged as malicious. Combined with trusted or compromised infrastructure, this delays detection and increases attacker dwell time.

โšก๏ธ #ANYRUN allows teams to safely validate suspicious remote access activity faster, trace the access path, and provide leadership with clearer evidence for containment and follow-up decisions.

๐Ÿ‘จโ€๐Ÿ’ป See the analysis session showing how attackers gain remote access through a fake Microsoft Store page delivering an RMM installer disguised as Adobe software: https://app.any.run/tasks/e072ae4e-214c-4039-957d-7c0cbe682da8/?utm_source=mastodon&utm_medium=post&utm_campaign=rmm_blind_spot&utm_term=280426&utm_content=linktoservice

๐Ÿ“Œ Learn how to close the blind spot before access turns into impact: https://any.run/cybersecurity-blog/rmm-blind-spot-for-cisos/?utm_source=mastodon&utm_medium=post&utm_campaign=rmm_blind_spot&utm_term=280426&utm_content=linktoblog

#cybersecurity #infosec

โ—๏ธ For MSSPs, every new client adds headcount before margin. So how do you scale?

Teams breaking that cycle aren't hiring faster, they're investigating faster.

โšก๏ธ See how #ANYRUN cuts analysis time, letting you handle more clients without extra hires: https://any.run/mssp/?utm_source=mastodon&utm_medium=post&utm_campaign=grow_your_mssp&utm_term=280426&utm_content=linktomssplanding

#mssp

๐Ÿ‡ง๐Ÿ‡ท Active #phishing campaign targeting finance & banks in Brazil: attackers watch sessions live and break in to commit fraud.

โš ๏ธ That means direct financial loss, not just data exposure.

Research by Moises Cerqueira. Detection & response by #ANYRUN ๐Ÿ‘‡

https://any.run/cybersecurity-blog/brazilian-banking-phishing-campaign/?utm_source=mastodon&utm_medium=post&utm_campaign=brazilian_banking_phishing_campaign&utm_term=240426&utm_content=linktoblog

#cybersecurity #infosec

Brazilian Phishing Campaign Deploys agenteV2 Stealer

Brazilian phishing delivers agenteV2: a Nuitka-compiled banking stealer targeting major banks with live screen streaming via WebSocket.

ANY.RUN's Cybersecurity Blog