📢 Google TI Mondays. Quick reminder to Follow the Google TI Mondays series across our social platforms every week for quick, actionable practitioner tips and product adoption advice designed to enhance your efficiency. These actionable tips are essential. #GoogleTIMondays
📢 Mastering the Hunt: New Practitioner-Oriented Content. Monitoring cybercrime actors on the dark web is a complex, labor-intensive process, constantly disrupted by forum seizures and the rapid emergence of new platforms. To help you navigate this shifting landscape, our latest blog post demonstrates how to leverage Agentic and the new Deep and Dark Web (DDW) module to streamline your investigations. We showcase real-world use cases and internal hunting techniques that utilize natural language and new search modifiers to pivot through diverse data sources, eliminating the need to manually track fragmented forums.
💪 Detection Highlights. The Google Threat Intelligence Group and FLARE team continue to expand Google TI’s detection surface by developing custom YARA rules and malware configuration extractors. This week, our researchers focused on updating our existing detections for many popular malware families. A few examples include:
- SQUIDSLEEP: This family was updated to include the latest indicators observed in recent campaigns and threat actor activity. See its curated YARA detection rules.
- HAVOCDEMON: Updates to this family include expanded malware configuration extraction to better identify command-and-control infrastructure.See its curated YARA detection rules.
- ZIGZAG: We have refined the YARA signatures for this family based on new samples identified through our research into active campaigns. See its curated YARA detection rules.
See latest malware family profiles added to the knowledge base and the complete list of curated YARA rules in our database.
🔄 Enhanced Security Control: Two-Factor Authentication (2FA) Enforcement. The Group Management suite within the Google Threat Intelligence platform allows administrators to oversee their organization's users, service accounts, and settings. It provides a centralized interface to ensure that access to the platform aligns with corporate security policies.
The Group Administrators can now mandate Two-Factor Authentication (2FA) for all members of their group. When enabled, this group-level setting prevents users from accessing Google Threat Intelligence features until they have configured a secondary authentication method (such as an authenticator app or offline code) on their individual accounts.
This safeguards sensitive data against credential theft while maintaining administrative control. If a user loses their 2FA device, administrators can perform a secure reset to facilitate seamless re-enrollment without impacting the user's existing collections or research.
🔄 Private Scanning Network Control: New Regional Routing through Chile. Private Scanning is a core capability within Google Threat Intelligence that allows organizations to analyze suspicious files and URLs in a completely isolated environment. This ensures that the analysis remains confidential and that no data is shared with the public community or third parties.
We are expanding our global egress infrastructure by introducing Chile as a new routing option for Private Scanning. This marks our first network exit point in Latin America, allowing users to route the network traffic generated during dynamic analysis through a localized Chilean IP space.
The new Chilean egress node enables Localized Evasion Testing, allowing analysts to bypass "geo-fencing" by observing how threats interact specifically with users in the LATAM region.
💡 Remember! Network Livehunt Rules + Typosquatting. YARA is the de facto pattern-matching tool for threat intel and malware research. Google Threat Intelligence extends YARA beyond file content matching to include incoming URLs, domains, and IP addresses. By configuring Livehunt rulesets, researchers can define complex behavioral indicators to identify emerging threats and receive real-time detection notifications before they impact their environment.
Remember that now instead of manually listing dozens of permutations for a single domain, analysts can use a specific syntax to flag domains that are visually or typographically similar to their target brand or high-value infrastructure via the vt.net.domain.permutation_of module to specify a "distance" or "similarity" score.
Fine-tune your detections by applying flags for specific techniques:
vt.Domain.Permutation.TYPO: Detects common keyboard misspellings.vt.Domain.Permutation.HOMOGLYPH: Flags look-alike characters (e.g., using "0" for "o").vt.Domain.Permutation.HYPHENATION: Identifies unauthorized additions of hyphens.vt.Domain.Permutation.SUBDOMAIN: Spots brand names repurposed as subdomains.vt.Domain.Permutation.BITSQUATTING: Detects domains resulting from single-bit errors in hardware memory.
💪 Enriched Mitigations in Agentic via OWASP Integration. Agentic is an AI-powered analysis interface built to automate complex investigative workflows. By leveraging specialized agents with direct access to Google Threat Intelligence datasets and analysis engines, users can rapidly summarize threats and pivot through malicious infrastructure.
We have integrated OWASP (Open Worldwide Application Security Project) documentation directly into Agentic to streamline your defense strategy. While investigating potential threats, you can now ask for mitigation advice and receive standard-aligned security guidance and best practices based on the OWASP framework.
💪 Enhanced Agentic Interaction for Dark Web Saved Searches. We’ve improved how Agentic handles Saved Searches for the Dark Web. You can now request an intelligence digest using natural language, prompting the agent to cross-reference forums, pastes, etc, to deliver actionable insights based on your specific saved logic.
💪Enhanced Visibility in Agentic: Data Visualization and Real-time Analysis Tracking. We have introduced two major visibility upgrades to Google TI’s Agentic tool:
- We’ve added a live progress indicator for background malware analyses. Users can now see the progress of background Malware Analysis in real-time.
- We've upgraded how you interpret threat data with the addition of automated chart generation. When requesting statistical breakdowns, the platform now renders Pie Charts, Bar Charts, and World Maps directly in the UI, delivering an immediate, 'at-a-glance' understanding of data trends.























