📢 Google TI Mondays. Quick reminder to Follow the Google TI Mondays series across our social platforms every week for quick, actionable practitioner tips and product adoption advice designed to enhance your efficiency. These actionable tips are essential. #GoogleTIMondays
💪 Detection Highlights. The Google Threat Intelligence Group and FLARE team consistently update Google TI's YARA rules and malware configuration extractors. Over the past week, we've released YARA rules covering 2 newly tracked malware families, and expanded our detection capabilities by updating existing YARA rules and configuration extractors for 41 malware families. This update prioritizes malware families actively observed in Mandiant incident response engagements, SecOps customer environments, and top Google TI search trends.
Some recent examples of updates to our detections include: DAVESHELL, ASYNCRAT, and SYSTEMBC. These updates ensure you have the latest indicators that were extracted by our configuration extraction systems.
See latest malware family profiles added to the knowledge base and the complete list of curated YARA rules in our database.
🆕 Advanced Search Support for Dark Web Entities. The Dark Web module within Google Threat Intelligence provides deep visibility into encrypted and unindexed layers of the web, including underground forums, messaging channels (like Telegram), paste sites, and onion-hosted marketplaces. It normalizes illicit data into actionable intelligence, allowing security teams to monitor environments where cybercriminals trade credentials, leak data, and plan attacks.
The Intelligence Search capability, previously exclusive to IoCs and threat intelligence objects (like malware families and campaigns), have been expanded to include Dark Web entities or communications.
Users can now execute complex queries using the entity:ddw operator to scope searches specifically to the Deep and Dark Web communications. We have introduced a comprehensive library of search modifiers to filter by different attributes such as:
- Author & Identity: Filter by author name or even its avatar MD5 hash.
- Channel & Source: Search by communication channel names, descriptions, or invite URLs.
- Content & Type: Narrow results by specific communication types (Forum Posts, Messages, Pastes, and Web Content) or search directly within their body.
Explore the full list of Dark Web search modifiers and documentation here.
💪 Dark Web Data now available within Agentic. Agentic is an AI-powered analysis interface built to automate complex investigative workflows. By leveraging specialized agents with direct access to Google Threat Intelligence datasets and analysis engines, users can rapidly summarize threats and pivot through malicious infrastructure.
By integrating the Dark Web dataset into Agentic, now users are allowed to query Google Threat Intelligence’s vast archives of deep and dark web content, including forum posts, messaging services like Telegram, paste sites, and illicit marketplaces, using natural language.
💪 Ransomware DLS Activity now integrated into Agentic. Now that we have integrated the Ransomware Data Leaks dashboard and Agentic tool, users can query live extortion trends, victimology data, and ransomware group activities through natural language prompts instead of manual dashboard filtering.
💪 Strategic Country & Industry Profiles now integrated within Agentic. We have integrated Agentic with Countries and Industry Profiles. This update allows users to perform high-level strategic queries using natural language to extract immediate insights from specific geographic or sectoral lenses. Instead of manually pivoting through different modules, you can now ask Agentic to synthesize broad landscape overviews directly.























