Visually explore and uncover
malware connections in seconds.
features
Search and view attacks in motion or go back in time:
Proofpoint ET Intelligence
Access industry-leading current and historical intelligence.
Transform
Analyze data using 100+ commercially-supported transforms
Make Connections
Connect specific attacks to billions of available indicators and visualize campaigns of records in the 1000s.
Geographical Information
Create a map of suspicious activity and follow your suspect’s trail.
Start anywhere. Arrive at the source.
anti-malware investigations
& response
MalNet brings together the industry’s most extensive malware threat information from Proofpoint ET Intelligence with link analysis capabilities from ShadowDragon®. MalNet enables incident responders, threat analysts and law enforcement to identify and visualize malware connections in just seconds to expedite investigations, response, and malware protection.
expose cyber espionage
ClearSky and Trend Micro exposed CopyKittens as an active cyber espionage actor who has targeted governments and large companies in the United States, Europe and Middle East. MalNet was used to help identify an infrastructure that used known malware and newly uncovered code and tools.
uncover and attribute
From 2016 – 2017, attackers used malware in continual attempts to breach IEC – Israel’s largest source of electrical power. Clearsky Security is investigating the attribution behind these attacks, using MalNet to support their process and attribute artifacts.
See malware in motion. Schedule a demo and see what it could do for your prevention and incident response.
What our SocialNet customers are saying
“
MalNet [is a] tremendous resources for incidents investigation.
[It allows] for unparalleled pivoting, malicious infrastructure detection and categorization and attribution.”
with malnet:
No more wasted time and energy context switching between data collection and analysis
Produce better, more focused reports without the hassle of manual collection effort.
Map large and complex
malware campaigns and their
C2 infrastructure.
Discover additional malware from a compromised domain
or correlate dates.
Uncover IDS signatures that
key on traffic and IOC from
specific malware samples.
Gain cyber threat Intelligence
relating to malware artifacts.
MalNet is used by:
MSSP Teams
SOC Teams
Cyber Threat Intelligence
DFIR Consultants
Legal Professionals
Forensic Detectives and Investigators
Corporate Security
Cyber Threat Intelligence Teams
integrations
And our stuff works with your stuff.
With its Restful API, MalNet is built to work easily with your other investigation and data tools. OEM developers, contact us for information on adding MalNet’s monitoring and alerting to your platform.
dossier template:
Whether you use MalNet or another collection tool, presenting your intelligence clearly inspires confidence and supports action.
Check out our custom template
that includes the 7 essential elements every target dossier needs.
Getting started with the
right answers is easy.
Getting started with the
right answers is easy.
Getting started with the right answers is easy.
_1
Schedule your demo
See how MalNet speed up your anti-malware or response efforts.
_2
start your free trial
Experience the power of MalNet, for free.
_3
go beyond the profile
Pivot through reliable, high quality data.
Get started by scheduling your demo today.
Malware is more than code. It's bad code in motion.
When malware strikes, you need to quickly find, identify, and mitigate its effect. MalNet™ speeds up your investigation, allowing you to start with any artifact and pivot through its network and activity to find the source threat actors or identify related infections.
INVESTIGATE ON THE GO - ANYWHERE, ANYTIME
Use OSINT, breach data, intelligence, monitoring and geolocation analysis to take investigations further in one comprehensive platform. Our OSINT tool helps you uncover valuable insights and make informed decisions.
ELEVATE YOUR INVESTIGATIONS NOW