Novel ELF64 Remote Access Tool Embedded in Malicious PyPI Uploads
Analyzing a Linux-targeted malware campaign on the Python Package Index.
Developing open source tools to promote open source security.
Features
Here are a few reasons we think we stand out from the crowd.
A structured incident response pipeline triaging and analyzing potential malware with an average takedown of 10 minutes or less.
End user configurable, language agnostic design can be extended to scan and triage any type of file, and scaled to fit any workload.
Maintained by a dedicated team of open source security enthusiasts rapidly adapting to tomorrow's cyber threat landscape.
Utilizing cloud-native application development and cutting-edge monitoring to maintain constant vigilance over the open source supply chain.
Packages Scanned
Package Takedowns
Detection Signatures
Contributors
projects
A dockerized malware scanner written in Rust to safely perform static analysis on files using VirusTotal YARA rules.
A FastAPI-based command and control server performing data aggregation and file distribution functions for use with the client scanning application.
A Discord front end to allow for community triaging and analysis of potentially malicious files detected by the Dragonfly framework.
Want to know what threats are affecting the software supply chain? Check out some of the articles by our team of malware analysts and engineers.
Analyzing a Linux-targeted malware campaign on the Python Package Index.
Examining the cascading effect of software supply chain compromises and their mitigation strategies.
Discussing the internals of our client compute node in the Dragonfly framework.
Discussing a persistent threat actor group utilizing automated malware pipelines to productionize malware uploads.