Read Reverse Deception: Organized Cyber Threat Counter-Exploitation Online
Authors: Sean Bodmer
Tags: #General, #security, #Computers
Malware URL
This data repository is a good resource that can be used to validate specific URLs. You can also search by other criteria, but this data source is focused mostly on malicious URLs. It is possible to register for a trial feed of the data, and the site
says
a corporation can purchase a feed of these malicious URLs. The data feed is especially useful for infector sites, exploit kits, and phishing sites. There are other crimeware families included in the list, but the data has not been updated daily (more like weekly or biweekly) and can’t be used to actively track any specific operators. The site is located at
www.malwareurl.com
.
Fair |
Other Public Data Sources
The following are some additional public data sources. They are not at the top of our list for tactical use, but are handy and offer services and/or products related to the type of content they provide. Some are better than others (they are not listed in any specific order).
Team Cymru (
www.team-cymru.org
)
The Ethical Hacker Network (
www.ethicalhacker.net
)
YGN Ethical Hacker Group (
yehg.net/lab/#home
)
Wepawet (
wepawet.iseclab.org
)
Dasient (
wam.dasient.com/wam/infection_library_index
)
The Day Before Zero (
blog.damballa.com
)
VirusTotal (
www.virustotal.com
)
Antivirus Tracker (
www.avtracker.info
)
ViCheck.ca
(
www.vicheck.ca
)
Securelist (
www.securelist.com
)
Exploit Database (
www.exploit-db.com
)
Malc0de Database (
http://malc0de.com/dashboard/
)