• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Cybersecurity Researchers Launch New Malware Hunting Tool YARAify

You are here: Home / General Cyber Security News / Cybersecurity Researchers Launch New Malware Hunting Tool YARAify
June 29, 2022

A team of security scientists from Abuse.ch and ThreatFox launched a new hub for scanning and hunting files.

Dubbed YARAify, the defensive instrument is built to scan suspicious data files against a huge repository of YARA principles.

“YARA is an open resource tool for sample matching,” Abuse.ch founder Roman Hüssy mentioned in an interview with The Day-to-day Swig. “It makes it possible for everyone […] to write their possess rules to detect [issues] this kind of as malicious or suspicious files.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


YARAify can scan documents making use of public YARA procedures and combine each general public and non-general public YARA rules from Malpedia, which is operated by the Fraunhofer Institute in Germany.

On top of that, scientists can use the tool to scan documents employing open and industrial ClamAV signatures, set up hunting procedures to match both of those YARA procedures and ClamAV signatures and hyperlink YARAify to other applications by using software programming interfaces (APIs). 

According to Hüssy, YARAify was produced to facilitate the dealing with of YARA policies, which he explained as highly effective but complicated to cope with.

Right before the release of YARAify, malware hunters had to come across YARA regulations across platforms and git repositories, without a direct way of sharing them and with no regular naming conference (leading to duplicates).

“We made the decision to start the YARAify platform to the public to allow any person to share their YARA principles with the community in a structured way and to use all those to hunt for suspicious and malicious information viewed inside of the Abuse.ch universe,” Hüssy concluded.

For context, YARA procedures have been utilized by several companies and people in the earlier and have aided quite a few security researchers place perilous threats.

For occasion, in February 2021, FireEye applied YARA rules during the situations surrounding its data breach. The instrument was also utilized months afterwards by Microsoft to find proof of the infamous Emotet botnet.


Some components of this post are sourced from:
www.infosecurity-journal.com

Previous Post: «Cyber Security News Cybersecurity Researchers Launch New Malware Hunting Tool YARAify
Next Post: New UnRAR Vulnerability Could Lead to Zimbra Webmail Hack Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.