This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Open source 'Malwr' analysis tool launched

Share this article:

A free web-based malware analysis tool powered by Shadowserver aims to shake up vendor-controlled and proprietary systems.

The Malwr tool is designed to provide security professionals with a free and customisable, open-source tool.

It is a front-end for the open source Cuckoo malware analysis sandbox and serves as an alternative for users who don't have the resources or time to operate a Cuckoo installation.

Cuckoo's Claudio Guarnieri said he created Malwr because he found free analysis tools lacking and commercial sandboxes too expensive.

“A lot of companies run [malware analysis] and it's becoming a really profitable market, leaving no space for free initiatives,” Guarnieri told SC Australia. He said that in the first 36 hours, Malwr received about 15,000 page views from 2,000 unique visitors who submitted around 150 files. Some 22 per cent of traffic related to attempted attacks.

While Malwr is running in a limited testing mode, Guarnieri said the Shadowserver resources underpinning the tool would allow it to scale to 10,000 analyses per day.

The Cuckoo sandbox was developed in 2010 as a Honeynet Project for Google's Summer of Code, and recommenced development for the 2011 Google initiative. Development of Malwr started in September last year, but Guarnieri said he always planned to build a web front-end for Cuckoo.

He said: “We would like also to get to a point where anyone running a Cuckoo node can link [their] own setup to our front-end, making it a fully fledged, crowd-distributed malware analysis network.

“It didn't take much work to get it together – most of the effort relies on trying to make Cuckoo a better product.”

A volunteer watchdog that tracks and reports the spread of malware, botnet and malicious activity on the internet, Shadowserver supported the project and supplied resources to it. Users will be able to refine Malwr by submitting code to Cuckoo.

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Google and Facebook offer free cyber-security tools

Google and Facebook offer free cyber-security tools

Google and Facebook have both launched free open-source cyber-security tools this week, designed to help security professionals spot malware and cyber-attacks.

Mixed results for key Government cyber-initiatives

Mixed results for key Government cyber-initiatives

The Government's Verify scheme to confirm IDs is behind scheuduled uptake, but its CISP threat intelligence sharing scheme is ahead of target.

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...