📢 Google TI Mondays. Quick reminder to Follow the Google TI Mondays series across our social platforms every week for quick, actionable practitioner tips and product adoption advice designed to enhance your efficiency. These actionable tips are essential. #GoogleTIMondays
💪 Detection Highlights. The Google Threat Intelligence Group and FLARE team continuously develop and refine YARA rules and malware configuration extractors to enhance Google Threat Intelligence's detection capabilities. This week, we have introduced detections for 5 newly tracked malware families and updated detection content for 14 existing threats. We prioritize the development of new and updated content by analyzing malware identified during Mandiant incident response engagements, telemetry from Google SecOps customer environments, and emerging Google TI search trends.
As we identify and research new malware families, we develop and deploy detection signatures to provide immediate visibility. Some recent examples of newly tracked families include:
- SANDCLOCK: a credential stealer written in Python that communicates via HTTP and HTTPS. The malware targets cloud environments to extract AWS credentials, Kubernetes ServiceAccount tokens, local environment variables, and cryptocurrency wallets. Harvested data is symmetrically encrypted and uploaded to a remote server. SANDCLOCK also escapes containerized environments by deploying a privileged Kubernetes pod to the underlying host, where it writes a script to disk that downloads and executes additional payloads. See its curated YARA detection rules.
- FLATBANANA: a cross-platform lightweight backdoor written in Go. FLATBANANA uses GitHub API for command and control. FLATBANANA is capable of collecting system information, executing system shell commands, and using a configured GitHub repository to upload and download files. See its curated YARA detection rules.
- DEADLOCK: a ransomware family that impacts Windows systems, appending the .dlock extension to encrypted files. DEADLOCK uses the Polygon blockchain smart contracts to host and rotate proxy command-and-control (C2 or C&C) URLs, a technique known as "EtherHiding," for resilience to takedown efforts. For defense evasion, it has been observed using "Bring Your Own Vulnerable Driver" (BYOVD) tactics, specifically exploiting a vulnerable Baidu Antivirus driver to terminate endpoint detection and response (EDR) processes. See its curated YARA detection rule.
- ROSEBOX: a Rust-based ransomware that by default encrypts files in the C:\Users directory. The ransomware accepts multiple command-line arguments that allows the operator to customize the execution including specifying which directories to encrypt or the percentage of the files to encrypt. ROSEBOX leverages AES and RSA encryption and requires an external RSA public key file. In at least some cases the ransomware renames encrypted files with the extension ".flk". See its curated YARA detection rule.
In addition to tracking new threats, we consistently update our detection systems for known malware to ensure coverage against evolving variants. Recent updates have been applied to families such as BEACON, FOUDRE, and SILVERLIME. These updates include expanded YARA coverage and enhanced configuration extraction to provide the most current indicators of compromise.
See latest malware family profiles added to the knowledge base and the complete list of curated YARA rules in our database.
📢 New Agentic Prompt Templates. Agentic is an AI-powered analysis interface designed to automate complex investigative workflows. By leveraging specialized agents with direct access to Google Threat Intelligence datasets and analysis engines, it shifts the paradigm from manual, static research to dynamic, AI-driven investigation.
We have significantly expanded our Agentic Prompt Template library to automate increasingly complex investigative workflows. This update introduces specialized templates for Deep Analysis of Go-Compiled Malware and Reverse Engineering ELF Binaries, alongside advanced tools for Persistence Mechanism Analysis and Bulk IOC Triage. Additionally, researchers can now leverage a dedicated GTI Query Builder for Malware Hunting and generate comprehensive DDoS Activity Reports.
💪 Code Insight Support for LNK Files. Code Insight is an advanced, Gemini AI-driven capability within Google Threat Intelligence that serves as an automated assistant for malware analysts and reverse engineers. It leverages artificial intelligence to generate natural language summaries that clearly describe a file's true intent and overall functionality.
We have extended Code Insight’s analysis to include LNK files. The tool now evaluates what the shortcut actually does from a security perspective, looking past the "claimed" target to provide analysts with a concise, security-first description of its real behavior, including any hidden commands or remote fetches.
See examples here.
🆕 Introducing My Landscape: Personalized, High-Fidelity Intelligence. My Landscape is a new Public Preview capability within Google Threat Intelligence, powered by the Relevance System. It acts as a personalized lens for security operations, automatically filtering Google’s global frontline intelligence to surface threats specific to your business context, industry, and technology stack. By leveraging Gemini-powered analysis, the tool generates automated alerts with plain-language summaries, ensuring your team understands exactly why a specific threat was flagged and why it matters to your organization.
























