Barracuda Networks has launched a new weapon in the fight against web-based malware that allows both individuals and businesses to browse, share and analyse threats.
Threatglass lets users to browse website infections by viewing screenshots of the different stages of infection and by analysing network characteristics such as host relationships and packet captures.
“‘Good sites gone bad’ is a daily problem for popular websites targeted by attackers and used to serve malware to their unsuspecting visitors,” said Dr. Paul Judge, chief research officer and VP, Barracuda. “Threatglass was designed for both casual users and the research community to provide a way to document and better understand this ongoing problem.”
It has been created as a front-end for a large-scale automated system that uses complex virtualisation to detect malware in a vulnerability and exploit independent manner. It analyses millions of websites every week and picks those that it wants to inspect by using various data feeds that include Alexa’s top 25,000 websites and social feeds, in addition to suspicious sites in Barracuda’s own customer network, which includes 150,000 organisations around the globe.
On top of the screen shots of the infections, Threatglass also lays on other visual and textual representations of network traffic that includes DNS, HTTP, and netflow, and so far the system has already catalogued 10,000 malware attacks, a number that grows by the day.
Some of the sites that Barracuda’s malware detection engines have found infections in include Cracked.com, Php.net, and Hasbro.com with those examples as well as a thousands of others now a part of Threatglass’ extensive library of threats.