Miroslav Stampar shares insights to Maltrail system that’s designed to detect malicious traffic by identifying potential threats and monitors network traffic. A great case study from Croatia! #CyberWeek2024
With the latest version (0.29.24), we added a new feed "statics" that will keep your sensor's static trails up to date, even if you don't frequently update the codebase
Challenge. Try (free and open-source) Maltrail and compare malware detection results with any commercial network product you use in your corporate network. Pass results to your management and your colleagues.
p.s. we already know the results, but have to play neutral :D
If you are a CERT member, I would like to point you to the maltrail.github.io/ and its demo site located at maltraildemo.github.io/. @maltrail is free and open-source network sensor system, where we spend tons of time filling it with latest network IoCs
Two new UI features: A) "Hide threat" - threat details will be hidden in future browser reports and B) "Report false positive" - threat details will be sent to us for additional analysis
Tags are patched now. So, you can add searchable tags (i.e. attributes) for each recognized threat, which will be stored inside your local web browser storage for future usage
If you want to integrate Maltrail events into your existing SIEM platform, from this moment you can choose between CEF (option SYSLOG_SERVER) and JSON (option LOGSTASH_SERVER) formats
Shout out to @maltrail project who accounts for 46% of the C2Tracker data dump trafic!
Since november 1st, a daily avg of 700+ uniq ip's pulling from the tracker from that project alone.
Thks to : @500mk500 & @stamparm for the initiative
ref: github.com/stamparm/maltrail