📢 Google TI Mondays. Quick reminder to Follow the Google TI Mondays series across our social platforms every week for quick, actionable practitioner tips and product adoption advice designed to enhance your efficiency. These actionable tips are essential. #GoogleTIMondays
💪 Detection Highlights. The Google Threat Intelligence Group and FLARE team consistently enhance Google TI's detection capabilities. This week, we've released YARA rules covering 5 newly tracked malware families. We've also enhanced our detection capabilities for 19 existing malware families, including updates to YARA rules for 17 families and configuration extractors for 2 families. Our prioritization for new and updated content focuses on malware families actively observed in Mandiant incident response engagements, Google SecOps customer environments, and top GTI search trends.
As we track new malware families found through our research, we build and release detection signatures. Some recent examples include:
- FROSTCANOPY: a shell script that injects malicious PHP code into legitimate device management web pages. The injected code can harvest credentials and facilitate the remote exfiltration of stolen data via a secret URL. Furthermore, this tool incorporates functions to perform timestomping and erasing traces of file modification. See its curated YARA detection rules.
- ANGRYPICKLE: a downloader written in JavaScript. After performing multiple layers of internal deobfuscation, the code will download a next stage JavaScript script from a remote server and execute that code within the confines of the ANGRYPICKLE's process space. The code uses ActiveX VBScript to interact with the victim's computer from within the JavaScript process. See its curated YARA detection rule.
- LUNAMIST: a C-based backdoor with capabilities for command execution and the bidirectional transfer (upload and download) of files. It initiates communication by issuing HTTP POST requests to its command-and-control (C2 or C&C) infrastructure; the subsequent responses contain commands encapsulated within RSA-encrypted JSON data for execution on the compromised system. See its curated YARA detection rule.
In addition to providing detection rules for new and emerging threats, we continuously update our detection systems for known threats. Recent updates include: SLIVER, SNOWLIGHT, and FAKETREFF. These updates ensure you have the latest indicators and enhanced detection capabilities, including those extracted by our configuration extraction systems.
See latest malware family profiles added to the knowledge base and the complete list of curated YARA rules in our database.
🔄 Updated Conversation Retention Policy in Agentic. Agentic, our AI-powered assistant designed to streamline complex security workflows, now features an automated cleanup process.
We are introducing a new retention policy to keep your workspace organized and focused on active investigations. Conversations inactive for 30 days will now be automatically removed from your Recent sessions. As long as you continue to interact with a specific conversation, it will remain accessible, ensuring your ongoing investigations are preserved while clearing out stale data.
💪 Vulnerabilities Cards: Enhanced Identification with MVE IDs. The Vulnerability Intelligence module within Google TI aggregates and contextualizes security vulnerabilities. It provides a comprehensive view of each vulnerability, including exploitation state, consequence and vectors, risk ratings, mitigations, and direct links to related malware families, threat actors, and active campaigns if possible. Vulnerability cards now include MVE IDs (Mandiant Vulnerability Enumeration) as alternative names. This integration provides a more comprehensive view of vulnerabilities by bridging the gap between standard CVE identifiers and Mandiant’s proprietary research, ensuring analysts can find relevant intelligence regardless of the naming convention used in their source reports.
See example.
🔄 Topic-Based News Analysis Reports. Google Threat Intelligence offers curated analyst Reports, OSINT articles and real-time insights, helping organizations stay ahead of an ever-changing threat landscape. News Analysis curated reports are now organized by topic. This way, instead of focusing on individual news articles, we cover OSINT topics more holistically, generating titles and summaries based on all available OSINT (including blogs, whitepapers, vendor advisories, and more). While the visual style remains consistent, the Media Summary section now features source URLs and text-based timelines where applicable, making it easier to track and verify information.
See example.
We will continue to iterate on this product to ensure we are providing customers with the best possible information available and relating OSINT topics to our vast library of knowledge.




























