{"id":4646,"date":"2023-04-30T22:12:50","date_gmt":"2023-04-30T22:12:50","guid":{"rendered":"https:\/\/osintme.com\/?p=4646"},"modified":"2023-04-30T22:15:59","modified_gmt":"2023-04-30T22:15:59","slug":"malware-osint-how-to-find-information-on-malicious-software","status":"publish","type":"post","link":"https:\/\/osintme.com\/index.php\/2023\/04\/30\/malware-osint-how-to-find-information-on-malicious-software\/","title":{"rendered":"Malware OSINT &#8211; how to find information on malicious software"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4646\" class=\"elementor elementor-4646\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bfcaaf2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bfcaaf2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bc01020\" data-id=\"bc01020\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3590b6 elementor-widget elementor-widget-image\" data-id=\"c3590b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"292\" height=\"226\" src=\"https:\/\/i0.wp.com\/osintme.com\/wp-content\/uploads\/2021\/09\/Screenshot-2021-09-19-at-13.21.24.png?fit=292%2C226&amp;ssl=1\" class=\"attachment-large size-large wp-image-2317\" alt=\"ransomware OSINT\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a21218e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a21218e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3f32eba\" data-id=\"3f32eba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9142e93 elementor-widget elementor-widget-text-editor\" data-id=\"9142e93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Another busy month, so this time I&#8217;m sharing a quick (but solid!) list of approximately 50+ resources that can be useful for gathering openly available information on malware campaigns, news, samples and more. Hoping to get back into classical old school OSINT very soon though, so keep an eye out.<\/p><p>In the meantime, bookmark or archive this list!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ae60c06 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ae60c06\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9e1753b\" data-id=\"9e1753b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae094a7 elementor-widget elementor-widget-heading\" data-id=\"ae094a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Sandbox, upload &amp; analysis services<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c82e6bd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c82e6bd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e25bb76\" data-id=\"e25bb76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-863da66 elementor-widget elementor-widget-text-editor\" data-id=\"863da66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Online sandbox services and similar websites listed below allow you to upload potentially malicious files (and URLs) that can be executed safely away from your system. You can also compare known hashes and indicators of compromise based on what other users already sent in.<\/p><p>Note that paid access will be needed for more granular analysis. Also remember that advanced malware can detect a sandbox and alter its behaviour accordingly. Finally, DO NOT upload files that contain sensitive or private information &#8211; users with premium access to the services might be able to gain access to those secrets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-664ba6c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"664ba6c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-166f076\" data-id=\"166f076\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ecc1fb3 elementor-widget elementor-widget-text-editor\" data-id=\"ecc1fb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Any Run: <a href=\"https:\/\/app.any.run\">https:\/\/app.any.run<\/a><\/li><li>Cockoo Sandbox: <a href=\"https:\/\/cuckoosandbox.org\">https:\/\/cuckoosandbox.org<\/a><\/li><li>DocGuard: <a href=\"https:\/\/app.docguard.io\">https:\/\/app.docguard.io<\/a><\/li><li>Hybrid Analysis: <a href=\"https:\/\/www.hybrid-analysis.com\">https:\/\/www.hybrid-analysis.com<\/a><\/li><li>Filescan: <a href=\"https:\/\/www.filescan.io\/scan\">https:\/\/www.filescan.io\/scan<\/a><\/li><li>Firmware.re: <a href=\"http:\/\/firmware.re\">http:\/\/firmware.re<\/a><\/li><li>ID Ransomware MalwareHunterTeam: <a href=\"https:\/\/id-ransomware.malwarehunterteam.com\">https:\/\/id-ransomware.malwarehunterteam.com<\/a><\/li><li>Malware Tracker: <a href=\"https:\/\/malwaretracker.com\">https:\/\/malwaretracker.com<\/a><\/li><li>PDF Examiner: <a href=\"https:\/\/tylabs.com\/tools\/pdfexaminer\">https:\/\/tylabs.com\/tools\/pdfexaminer<\/a><\/li><li>Sucuri SiteCheck: <a href=\"https:\/\/sitecheck.sucuri.net\">https:\/\/sitecheck.sucuri.net<\/a><\/li><li>Virus Total: <a href=\"https:\/\/www.virustotal.com\">https:\/\/www.virustotal.com<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-75dcb30 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"75dcb30\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a12f6ba\" data-id=\"a12f6ba\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c95a034 elementor-widget elementor-widget-heading\" data-id=\"c95a034\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Repositories &amp; news<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-83456bc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"83456bc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e25daf2\" data-id=\"e25daf2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ad5472 elementor-widget elementor-widget-text-editor\" data-id=\"4ad5472\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A mix of news aggregators, malware samples sites and everything in between.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cdfa089 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cdfa089\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d0cf33\" data-id=\"3d0cf33\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8653f0e elementor-widget elementor-widget-text-editor\" data-id=\"8653f0e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Bleeping Computer: <a href=\"https:\/\/www.bleepingcomputer.com\/tag\/malware\">https:\/\/www.bleepingcomputer.com\/tag\/malware<\/a><\/li><li>CISA: <a href=\"https:\/\/www.cisa.gov\/topics\/cyber-threats-and-advisories\/malware-phishing-and-ransomware\">https:\/\/www.cisa.gov\/topics\/cyber-threats-and-advisories\/malware-phishing-and-ransomware<\/a><\/li><li>Malpedia:\u00a0<a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/library\">https:\/\/malpedia.caad.fkie.fraunhofer.de\/library\u00a0<\/a><\/li><li>Malware Analysis: <a href=\"https:\/\/malwareanalysis.co\/malware-samples\">https:\/\/malwareanalysis.co\/malware-samples<\/a><\/li><li>Malware News: <a href=\"https:\/\/malware.news\">https:\/\/malware.news<\/a><\/li><li>Info Security: <a href=\"https:\/\/www.infosecurity-magazine.com\/malware\">https:\/\/www.infosecurity-magazine.com\/malware<\/a><\/li><li>PC Risk: <a href=\"https:\/\/www.pcrisk.com\">https:\/\/www.pcrisk.com<\/a><\/li><li>The Daily Swig: <a href=\"https:\/\/portswigger.net\/daily-swig\/malware\">https:\/\/portswigger.net\/daily-swig\/malware<\/a><\/li><li>Virus Share: <a href=\"https:\/\/virusshare.com\">https:\/\/virusshare.com<\/a><\/li><li>Wired: <a href=\"https:\/\/www.wired.com\/tag\/malware\/\">https:\/\/www.wired.com\/tag\/malware\/<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e18666f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e18666f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c10c5de\" data-id=\"c10c5de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-630d403 elementor-widget elementor-widget-heading\" data-id=\"630d403\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Companies &amp; known industry brands<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e288af4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e288af4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3c98530\" data-id=\"3c98530\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4481494 elementor-widget elementor-widget-text-editor\" data-id=\"4481494\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Below is a collection of websites run by cybersecurity companies and known industry brands. These companies and vendors collect and provide information on various types of malware, their characteristics, and ways to mitigate them. NOTE: I tried to include the ones that don&#8217;t hit you with their sales pitch every time you click on a link!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ea93dd7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ea93dd7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1f3a5fb\" data-id=\"1f3a5fb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b45ddf elementor-widget elementor-widget-text-editor\" data-id=\"4b45ddf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>AlienVault OTX: <a href=\"https:\/\/otx.alienvault.com\/browse\/global\/malware\">https:\/\/otx.alienvault.com\/browse\/global\/malware<\/a><\/li><li>BlackBerry: <a href=\"https:\/\/blogs.blackberry.com\/en\/home\">https:\/\/blogs.blackberry.com\/en\/home<\/a><\/li><li>ESET &#8211; We Live Security: <a href=\"https:\/\/www.welivesecurity.com\">https:\/\/www.welivesecurity.com<\/a><\/li><li>Forcepoint: <a href=\"https:\/\/www.forcepoint.com\/blog\">https:\/\/www.forcepoint.com\/blog<\/a><\/li><li>Malwarebytes Labs: <a href=\"https:\/\/www.malwarebytes.com\/blog\">https:\/\/www.malwarebytes.com\/blog<\/a><\/li><li>McAfee: <a href=\"https:\/\/www.mcafee.com\/blogs\">https:\/\/www.mcafee.com\/blogs<\/a><\/li><li>Microsoft: <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">https:\/\/www.microsoft.com\/en-us\/security\/blog<\/a><\/li><li>Sentinel One: <a href=\"https:\/\/www.sentinelone.com\/blog\">https:\/\/www.sentinelone.com\/blog<\/a><\/li><li>Sophos &#8211; Naked Security: <a href=\"https:\/\/nakedsecurity.sophos.com\">https:\/\/nakedsecurity.sophos.com<\/a><\/li><li>Trend Micro: <a href=\"https:\/\/www.trendmicro.com\/en_ie\/research.html\">https:\/\/www.trendmicro.com\/en_ie\/research.html<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60e6368 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60e6368\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bfb6e0a\" data-id=\"bfb6e0a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5b84a88 elementor-widget elementor-widget-heading\" data-id=\"5b84a88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Social media accounts<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f705391 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f705391\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e4a857\" data-id=\"4e4a857\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25a69ed elementor-widget elementor-widget-text-editor\" data-id=\"25a69ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Twitter users and communities on Twitter are overall great for sharing warnings, detections and advice about malware that can be useful to online investigators. A subjective list in no particular order (other than alphabetical) and only really a tiny, tiny part of what you can find on Twitter using <a href=\"https:\/\/twitter.com\/search?q=%23Malware&amp;f=user\">#malware<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-564a8b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"564a8b6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6f6dea\" data-id=\"f6f6dea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-920f2a6 elementor-widget elementor-widget-text-editor\" data-id=\"920f2a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Abuse.ch: <a href=\"https:\/\/twitter.com\/abuse_ch\">https:\/\/twitter.com\/abuse_ch<\/a><\/li><li>Amigo-A: <a href=\"https:\/\/twitter.com\/Amigo_A_\">https:\/\/twitter.com\/Amigo_A_<\/a><\/li><li>Execute Malware: <a href=\"https:\/\/twitter.com\/executemalware\">https:\/\/twitter.com\/executemalware<\/a><\/li><li>Hasherezade: <a href=\"https:\/\/twitter.com\/hasherezade\">https:\/\/twitter.com\/hasherezade<\/a><\/li><li>Jake Williams: <a href=\"https:\/\/twitter.com\/MalwareJake\">https:\/\/twitter.com\/MalwareJake<\/a><\/li><li>MalwareHunterTeam: <a href=\"https:\/\/twitter.com\/malwrhunterteam\">https:\/\/twitter.com\/malwrhunterteam<\/a><\/li><li>Michael Gillespie: <a href=\"https:\/\/twitter.com\/demonslay335\">https:\/\/twitter.com\/demonslay335<\/a><\/li><li>MISP Project: <a href=\"https:\/\/twitter.com\/MISPProject\">https:\/\/twitter.com\/MISPProject<\/a><\/li><li>Lenny Zeltser: <a href=\"https:\/\/twitter.com\/lennyzeltser\">https:\/\/twitter.com\/lennyzeltser<\/a><\/li><li>Vitali Kremez: <a href=\"https:\/\/twitter.com\/VK_Intel\">https:\/\/twitter.com\/VK_Intel<\/a><\/li><li>VX-Underground: <a href=\"https:\/\/twitter.com\/vxunderground\">https:\/\/twitter.com\/vxunderground<\/a><\/li><li>3xp0rt: <a href=\"https:\/\/twitter.com\/3xp0rtblog\">https:\/\/twitter.com\/3xp0rtblog<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5e7b6e5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5e7b6e5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fd3dd2b\" data-id=\"fd3dd2b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9dfdce elementor-widget elementor-widget-heading\" data-id=\"c9dfdce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Blogs &amp; community groups<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b17ceb7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b17ceb7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4021f29\" data-id=\"4021f29\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-491bfa1 elementor-widget elementor-widget-text-editor\" data-id=\"491bfa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A loose collection of online communities and blogs where known industry individuals share content and knowledge to raise awareness on malware-related topics. Some of the authors are more prolific and in depth than others. This section definitely could use some community suggestions and contributions as there are hundreds more of useful resources out there.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-232232e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"232232e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c1f7029\" data-id=\"c1f7029\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2704fdd elementor-widget elementor-widget-text-editor\" data-id=\"2704fdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Dancho Danchev: <a href=\"https:\/\/ddanchev.blogspot.com\">https:\/\/ddanchev.blogspot.com<\/a><\/li><li>ID Ransomware: <a href=\"https:\/\/id-ransomware.blogspot.com\">https:\/\/id-ransomware.blogspot.com<\/a><\/li><li>Malware Hell: <a href=\"https:\/\/c3rb3ru5d3d53c.github.io\">https:\/\/c3rb3ru5d3d53c.github.io<\/a><\/li><li>Malware Tech: <a href=\"https:\/\/malwaretech.com\">https:\/\/malwaretech.com<\/a><\/li><li>Malware Tips: <a href=\"https:\/\/malwaretips.com\/blogs\">https:\/\/malwaretips.com\/blogs<\/a><\/li><li>Malware Traffic Analysis: <a href=\"https:\/\/www.malware-traffic-analysis.net\/index.html\">https:\/\/www.malware-traffic-analysis.net\/index.html<\/a><\/li><li>Schneier on Security: <a href=\"https:\/\/www.schneier.com\">https:\/\/www.schneier.com<\/a><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c88f28d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c88f28d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-700ad9c\" data-id=\"700ad9c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43b983d elementor-widget elementor-widget-text-editor\" data-id=\"43b983d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>PLEASE DO SHARE ANY ADDITIONAL LINKS YOU CAN RECOMMEND VIA COMMENTS OR EMAIL!<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>50+ resources that can be useful for gathering openly available information on malware campaigns, news, samples and more.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[18],"tags":[61,15,20,144],"class_list":["post-4646","post","type-post","status-publish","format-standard","hentry","category-digital-privacy-security","tag-malware","tag-security","tag-software","tag-url"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/4646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/comments?post=4646"}],"version-history":[{"count":28,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/4646\/revisions"}],"predecessor-version":[{"id":4675,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/posts\/4646\/revisions\/4675"}],"wp:attachment":[{"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/media?parent=4646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/categories?post=4646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/osintme.com\/index.php\/wp-json\/wp\/v2\/tags?post=4646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}