Government

CISA Releases Malware Next-Gen Analysis System for Public Use

CISA’s Malware Next-Gen system is now available for any organization to submit malware samples and other suspicious artifacts for analysis.

The US government’s cybersecurity agency CISA has released its threat hunting and internal malware analysis system for public use, promising capabilities for the automatic analysis of potentially malicious files or uniform resource locators (URLs).

The system, called Malware Next-Gen, will now be available for any organization to submit malware samples and other suspicious artifacts for analysis and will allow CISA to more effectively support partners by automating analysis of newly identified malware.

In a statement, CISA said the Malware Next-Gen service is used at US federal agencies to analyze, correlate, enrich data, and share cyber threat insights with CISA’s partners.  

Since November, CISA said Malware Next-Gen has been available to .gov and .mil organizations with nearly 400 registered users submitting more than 1,600 files. The agency said the system has pinpointed approximately 200 suspicious or malicious files and URLs that were quickly shared with partners. 

“All organizations, security researchers and individuals are encouraged to register and submit suspected malware into this new automated system for CISA analysis,” the agency said.

 CISA said the malware analysis is performed by a combination of static and dynamic analysis tools in a secure environment and results are available in PDF and STIX 2.1 data formats. 

Related: Microsoft’s Security Chickens Have Come Home to Roost

Related: CISA Outlines Efforts to Secure Open Source Software

Advertisement. Scroll to continue reading.

Related: CISA Moving Forward With Cyber Incident Reporting Rules

Related Content

Vulnerabilities

CISA’s Vulnrichment project is adding important information to CVE records to help improve vulnerability management processes.

Vulnerabilities

CISA and the FBI warn of threat actors abusing path traversal software vulnerabilities in attacks targeting critical infrastructure.

ICS/OT

Government agencies are sharing recommendations following attacks claimed by pro-Russian hacktivists on ICS/OT systems.

Artificial Intelligence

New CISA guidelines categorize AI risks into three significant types and pushes a four-part mitigation strategy.

Data Breaches

The US government says Midnight Blizzard’s compromise of Microsoft corporate email accounts "presents a grave and unacceptable risk to federal agencies."

Data Breaches

The US government issues a red-alert for what appears to be a massive supply chain breach at Sisense, a company that sells big-data analytics...

Government

CISA is seeking comment on the implementation of CIRCIA, which will cost $2.6 billion and will impact 316,000 entities.

Vulnerabilities

CISA and the FBI issue a secure-by-design alert on eliminating SQL injection vulnerabilities from software.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version