Company:Anomali

From HandWiki
Short description: American cybersecurity company
Anomali Inc.
FormerlyThreatStream (2013–2016)
TypePrivate
IndustryCybersecurity
Founded2013; 11 years ago (2013)[1]
Founders
  • Greg Martin
  • Colby DeRodeff
Headquarters
Redwood City, California
,
United States
Area served
Worldwide
Key people
  • Ahmed Rubaie (CEO)
  • Hugh Njemanze (President)
ProductsAnomali ThreatStream, Anomali Match, Anomali Lens, Security Analytics
Websiteanomali.com

Anomali Inc. is an American cybersecurity company that develops and provides threat intelligence products. In 2023, the company moved into providing Security Analytics powered by AI.

History

Anomali was founded in 2013[2] under the name ThreatStream, by Greg Martin and Colby DeRodeff. At that time, the company's products provided filtering and customization options to give companies visibility into indicators of compromise (IOCs).[3] In 2016, company rebranded as Anomali and introduced new products and a new approach to threat intelligence.[4][5] This included providing SaaS and on-premise platforms that customers could use to upload their logs, and then have Anomali match data against threat intelligence for existing IOCs.[6]

In 2013, the company launched the first version of ThreatStream, a threat intelligence platform (TIP),[7] uses different sources to track known threats, monitor and detect security breaches.[8] In 2016, when the company became known as Anomali, it launched its second product, Anomali, which later became Anomali Match, an enterprise threat detection service.[9][10]

By 2018, Anomali had received $96.3 million in funding from 11 investors, including Paladin Capital Group, Institutional Venture Partners (IVP), GV (formerly Google Ventures), General Catalyst, Telstra Ventures, and Lumina Capital.[11][12] The company works with government and business organizations such as the Bank of England, Citigroup, and Alaska Airlines.[13]

In 2019, Anomali introduced Anomali Lens,[14] a web-browser extension that highlights and collects relevant threat data from web pages. The data is added to ThreatStream and matched with internal network events using Anomali’s Match platform.[15] Since being founded, Anomali has collaborated with partners spanning channel resellers, managed security services providers (MSSPs), systems integrators, and Commercial Threat Intelligence Feed providers to build out the Anomali Preferred Partner Store (Anomali APP Store).[16] Anomali has established a collaborative relationship with Microsoft[17][18] to integrate threat intelligence from ThreatStream with security insights from Microsoft Graph security API.[19] This allowed companies to correlate cloud service and network activity with adversary threat information.[20] The company also partnered with the National Health Information Sharing and Analysis Center (NH-ISAC) to bring cybersecurity tools and threat intelligence to the healthcare community.[21]

In March 2021, the company signed a partnership with Netpoleon, a network security distributor.[22] This was the company’s first partnership in Australia and New Zealand.[23] In January 2022, a distribution agreement was signed with ACA Pacific to reach markets in Singapore, Malaysia, Indonesia, and Thailand.[24]

In 2021, Anomali joined MITRE Engenuity’s Center for Threat-Informed Defense to collaborate on the Attack Flow Project to better understand adversary behavior and improve defensive capabilities.[25] This partnership culminated with the public release of the project in March 2022.[26]

In March 2022, the company released its Cloud-Native XDR (eXtended Detection and Response) solution.[27][28] It works with Anomali’s threat intelligence and IOC repositories to help companies improve existing security infrastructure.[29] It can be integrated with the MITRE ATT&CK framework and other security frameworks.[30]

That same month, Anomali started its Resilience Partner Program for Global Systems Integrators (GSIs), Value Added Resellers (VARs), Distributors, and service providers.[31] The program gives partners simplified access to the Anomali Platform and Cloud-Native XDR.[32]

Investigations / Anomali Threat Research (ATR) Team

In January 2019, Anomali uncovered a phishing scam targeting Australian businesses.[33] Hackers would email companies, claim that they had been selected by the Department of Infrastructure and Regional Development to submit a tender for a commercial project, and then require companies to register in the tender portal to continue. The link in the email took businesses to a replica site of the government's AusTender website. The ATR team alerted the government to the scam.[34]

In July 2019, the ATR observed a new ransomware targeting QNAP Network Attached Storage (NAS) devices and named it eCh0raix.[35] A decryptor was released in August.

In December 2019, Anomali published research that said that Gamaredon, a hacking group, had launched attacks targeting Ukrainian military and government agencies, including the Ministry of Foreign Affairs, journalists, law enforcement, and nongovernmental organizations (NGOs).[36] The attacks started in mid-September.

In June 2020, the company identified twelve apps posing as coronavirus contact tracing apps that were designed to steal personal and financial information from Android users.[37][38] Four of the apps used either the Anubis banking malware or the SpyNote Trojan.[39] The apps targeted people in Armenia, Brazil, Colombia, India, Indonesia, Iran, Italy, Kyrgyzstan, Russia and Singapore.[40]

in February 2021, ATR identified a cyberespionage campaign targeting UAE and Kuwait government agencies.[41] The work was attributed to Static Kitten (aka MERCURY and MuddyWater) and the objective was to install the remote management tool ScreenConnect with "unique launch parameters that have custom properties with malware samples and URLs masquerading as the Ministry of Foreign Affairs of Kuwait and the UAE National Council".[42] Static Kitten is a state-sponsored hacking group believed to be working for Iran's Islamic Republic Guard Corps.[43]

In May 2021, the team identified threat actors who were using Microsoft Build Engine (MSBuild) to filelessly deliver remote access trojans and password-stealing malware on targeted Windows systems.[44] The campaign had been active since April, with the attackers using the Microsoft application to load the attack code, thereby avoiding any traces of infection.[45][46] The samples analyzed by Anomali delivered Remcos RAT, Quasar RAT, and RedLine Stealer.[47][48]

In September, ATR identified action from the FIN7 financial cybercrime gang.[49] The gang was delivering JavaScript backdoors using Word documents to steal payment-card data.[50]

Products and services

  • ThreatStream - a threat intelligence platform that automates threat detection, investigation, and response; collects intelligence from different sources[51][52]
  • Match - a breach detection platform that will match external threat intelligence to internal events[53]
  • Lens - a web browser-based plugin that uses natural language processing (NLP) to scan structured and unstructured internet content to automate the identification of adversaries, malware, and cyber threats that are present in the users' network, actively attacking the user's network, or newly detected[54]
  • Anomali Preferred Partner (APP) Store - companies can use APP to purchase additional intelligence; the store was created by collaborating with channel resellers, Managed Security Services Providers (MSSPs), Systems Integrators, and Commercial Threat Intelligence Feed providers.[55]
  • Cloud-Native XDR - helps companies monitor and improve their existing security telemetry infrastructure[56]

See also

References

  1. "Cyber-security firm to create 120 jobs". BBC News. 18 May 2017. https://www.bbc.com/news/uk-northern-ireland-39959091. 
  2. Mishra, Pankaj (20 February 2014). "ThreatStream Raises $4M From Google Ventures To Add Realtime Cybersecurity Intelligence". TechCrunch. https://techcrunch.com/2014/02/20/threatstream-raises-4m-from-google-ventures-to-add-realtime-cybersecurity-intelligence/. 
  3. Kerner, Sean Michael (2016-03-01). "ThreatStream Renames and Refocuses Itself as Anomali" (in en-US). https://www.eweek.com/servers/threatstream-renames-and-refocuses-itself-as-anomali/. 
  4. Panettieri, Joe. "Managed Security Services Provider (MSSP) News: 26 August 2020". MSSP Alert. https://www.msspalert.com/cybersecurity-news/updates-26-august-2020/. 
  5. Kerner, Sean Michael (2016-03-01). "ThreatStream Renames and Refocuses Itself as Anomali" (in en-US). https://www.eweek.com/servers/threatstream-renames-and-refocuses-itself-as-anomali/. 
  6. Kerner, Sean Michael (2016-03-01). "ThreatStream Renames and Refocuses Itself as Anomali" (in en-US). https://www.eweek.com/servers/threatstream-renames-and-refocuses-itself-as-anomali/. 
  7. Lawson, Craig (28 July 2020). "Market Guide for Security Threat Intelligence Products and Services". https://www.gartner.com/en/documents/3988089-summary-translation-market-guide-for-security-threat-int. 
  8. "Anomali secures $40 million Series D led by Lumia Capital to scale threat detection solution" (in en-US). 17 January 2018. https://social.techcrunch.com/2018/01/17/anomali-secures-40-million-series-d-led-by-lumia-capital-to-scale-threat-detection-solution/. 
  9. "Anomali secures $40 million Series D led by Lumia Capital to scale threat detection solution" (in en-US). 17 January 2018. https://social.techcrunch.com/2018/01/17/anomali-secures-40-million-series-d-led-by-lumia-capital-to-scale-threat-detection-solution/. 
  10. "Anomali Altitude automates detection, analysis, and threat response" (in en-US). 2019-10-01. https://www.helpnetsecurity.com/2019/10/01/anomali-altitude/. 
  11. Maheshwary, Saket; Misra, Hemant (2018). "Matching Resumes to Jobs via Deep Siamese Network". Companion of the Web Conference 2018 on the Web Conference 2018 - WWW '18. New York, New York, USA: ACM Press. pp. 87–88. doi:10.1145/3184558.3186942. ISBN 9781450356404. 
  12. "Anomali secures $40 million Series D led by Lumia Capital to scale threat detection solution" (in en-US). 17 January 2018. https://social.techcrunch.com/2018/01/17/anomali-secures-40-million-series-d-led-by-lumia-capital-to-scale-threat-detection-solution/. 
  13. Miller, Ron (2018-01-17). "Anomali secures $40 million Series D led by Lumia Capital to scale threat detection solution" (in en-US). https://techcrunch.com/2018/01/17/anomali-secures-40-million-series-d-led-by-lumia-capital-to-scale-threat-detection-solution/. 
  14. Kovaks, Eduard (30 September 2019). "New Anomali Tool Finds Threat Data in News, Blogs, Social Networks". SecurityWeek. https://www.securityweek.com/new-anomali-tool-finds-threat-data-news-blogs-social-networks. 
  15. "New Anomali Tool Finds Threat Data in News, Blogs, Social Networks | SecurityWeek.Com". 30 September 2019. https://www.securityweek.com/new-anomali-tool-finds-threat-data-news-blogs-social-networks. 
  16. Martins, Andrew. "What Is Cyberthreat Intelligence, and Why Do You Need It?". Business News Daily. https://www.businessnewsdaily.com/11141-cyber-threat-intelligence.html. 
  17. "Microsoft brings fresh intelligence to its security products". 16 April 2018. https://venturebeat.com/2018/04/16/microsoft-brings-fresh-intelligence-to-its-security-products/. 
  18. "Anomali collaborates with Microsoft to integrate threat data - Help Net Security". 17 April 2018. https://www.helpnetsecurity.com/2018/04/17/anomali-microsoft-threat-data/. 
  19. "Anomali collaborates with Microsoft to integrate threat data" (in en-US). 2018-04-17. https://www.helpnetsecurity.com/2018/04/17/anomali-microsoft-threat-data/. 
  20. "Anomali collaborates with Microsoft to integrate threat data" (in en-US). 2018-04-17. https://www.helpnetsecurity.com/2018/04/17/anomali-microsoft-threat-data/. 
  21. "NH-ISAC, Anomali Partner to Improve Secure Healthcare Data Sharing" (in en-US). 2018-03-19. https://healthitsecurity.com/news/nh-isac-anomali-partner-to-improve-secure-healthcare-data-sharing. 
  22. "Anomali signs first A/NZ distie deal with Netpoleon". https://www.arnnet.com.au/article/687218/anomali-signs-first-nz-distie-deal-netpoleon/. 
  23. "Anomali signs first A/NZ distie deal with Netpoleon". https://www.arnnet.com.au/article/687218/anomali-signs-first-nz-distie-deal-netpoleon/. 
  24. "Anomali builds out ASEAN threat intelligence presence with ACA Pacific". https://channelasia.tech/article/694648/anomali-builds-asean-threat-intelligence-presence-aca-pacific/. 
  25. "Top 10 cyber threat intelligence tools" (in en). 2022-03-29. https://cybermagazine.com/operational-security/top-10-cyber-threat-intelligence-tools. 
  26. Baker, Jon (2022-03-02). "Attack Flow — Beyond Atomic Behaviors" (in en). https://medium.com/mitre-engenuity/attack-flow-beyond-atomic-behaviors-c646675cc793. 
  27. Kobialka, Dan (2022-03-01). "Anomali Unveils Cloud XDR Solution: Here's What MSSPs Need to Know" (in en-US). https://www.msspalert.com/cybersecurity-services-and-products/xdr/anomali-unveils-cloud-xdr-solution-heres-what-mssps-need-to-know/. 
  28. "New Anomali Match Features Provide Extended Detection and Response (XDR) Capabilities that Help Customers Stop Breaches and Attackers" (in en). 2021-07-01. https://www.businesswire.com/news/home/20210701005813/en/New-Anomali-Match-Features-Provide-Extended-Detection-and-Response-XDR-Capabilities-that-Help-Customers-Stop-Breaches-and-Attackers. 
  29. "Anomali XDR solution helps enterprises against advanced cyber threats" (in en-US). 2022-03-03. https://www.helpnetsecurity.com/2022/03/03/anomali-xdr/. 
  30. Kobialka, Dan (2022-03-01). "Anomali Unveils Cloud XDR Solution: Here's What MSSPs Need to Know" (in en-US). https://www.msspalert.com/cybersecurity-services-and-products/xdr/anomali-unveils-cloud-xdr-solution-heres-what-mssps-need-to-know/. 
  31. "Anomali releases Resilience Partner Program to meet growing demand for cybersecurity services". March 17, 2022. https://www.helpnetsecurity.com/2022/03/17/anomali-resilience-partner-program/. 
  32. "Anomali releases Resilience Partner Program to meet growing demand for cybersecurity services". March 17, 2022. https://www.helpnetsecurity.com/2022/03/17/anomali-resilience-partner-program/. 
  33. Powell, Dominic (2019-01-16). "Government warns SMEs of new scam luring businesses into applying for fake tender contracts" (in en-US). https://www.smartcompany.com.au/technology/austender-scam-fake-tender-contracts/. 
  34. Powell, Dominic (2019-01-16). "Government warns SMEs of new scam luring businesses into applying for fake tender contracts" (in en-US). https://www.smartcompany.com.au/technology/austender-scam-fake-tender-contracts/. 
  35. "New eCh0raix Ransomware Brute-Forces QNAP NAS Devices" (in en-us). https://www.bleepingcomputer.com/news/security/new-ech0raix-ransomware-brute-forces-qnap-nas-devices/. 
  36. "Possible APT attacks against Ukraine expand to target journalists, researchers say" (in en). 2019-12-09. https://www.cyberscoop.com/gamaredon-apt-ukraine-anomali-foritnet/. 
  37. "Fake contact-tracing apps delivering banking trojans" (in en). https://www.computerweekly.com/news/252484584/Fake-contact-tracing-apps-delivering-banking-trojans. 
  38. "Hackers use fake contact tracing apps in attempt to install banking malware on Android phones" (in en). 2020-06-10. https://www.cyberscoop.com/contact-tracing-hacking-security-anomali/. 
  39. "Hackers use fake contact tracing apps in attempt to install banking malware on Android phones" (in en). 2020-06-10. https://www.cyberscoop.com/contact-tracing-hacking-security-anomali/. 
  40. "Fake contact-tracing apps delivering banking trojans" (in en). https://www.computerweekly.com/news/252484584/Fake-contact-tracing-apps-delivering-banking-trojans. 
  41. "Iranian Hackers Utilize ScreenConnect to Spy On UAE, Kuwait Government Agencies" (in en). https://thehackernews.com/2021/02/iranian-hackers-utilize-screenconnect.html. 
  42. "Iranian Hackers Utilize ScreenConnect to Spy On UAE, Kuwait Government Agencies" (in en). https://thehackernews.com/2021/02/iranian-hackers-utilize-screenconnect.html. 
  43. "Iranian Hackers Utilize ScreenConnect to Spy On UAE, Kuwait Government Agencies" (in en). https://thehackernews.com/2021/02/iranian-hackers-utilize-screenconnect.html. 
  44. "Hackers Using Microsoft Build Engine to Deliver Malware Filelessly" (in en). https://thehackernews.com/2021/05/hackers-using-microsoft-build-engine-to.html. 
  45. "Hackers Using Microsoft Build Engine to Deliver Malware Filelessly" (in en). https://thehackernews.com/2021/05/hackers-using-microsoft-build-engine-to.html. 
  46. "Microsoft build tool abused to deliver password-stealing malware" (in en-us). https://www.bleepingcomputer.com/news/security/microsoft-build-tool-abused-to-deliver-password-stealing-malware/. 
  47. "Hackers Using Microsoft Build Engine to Deliver Malware Filelessly" (in en). https://thehackernews.com/2021/05/hackers-using-microsoft-build-engine-to.html. 
  48. "Microsoft build tool abused to deliver password-stealing malware" (in en-us). https://www.bleepingcomputer.com/news/security/microsoft-build-tool-abused-to-deliver-password-stealing-malware/. 
  49. "FIN7 Capitalizes on Windows 11 Release in Latest Gambit" (in en). https://threatpost.com/fin7-windows-11-release/169206/. 
  50. "FIN7 Capitalizes on Windows 11 Release in Latest Gambit" (in en). https://threatpost.com/fin7-windows-11-release/169206/. 
  51. Zurier, Steve (2020-10-31). "Anomali" (in en). https://www.scmagazine.com/product-test/content/anomali-platform. 
  52. "Shore Up Your Defenses With Cyber Threat Intelligence - businessnewsdaily.com" (in en). https://www.businessnewsdaily.com/11141-cyber-threat-intelligence.html. 
  53. "New Anomali Tool Finds Threat Data in News, Blogs, Social Networks | SecurityWeek.Com". 30 September 2019. https://www.securityweek.com/new-anomali-tool-finds-threat-data-news-blogs-social-networks. 
  54. "New Anomali Tool Finds Threat Data in News, Blogs, Social Networks | SecurityWeek.Com". 30 September 2019. https://www.securityweek.com/new-anomali-tool-finds-threat-data-news-blogs-social-networks. 
  55. "Shore Up Your Defenses With Cyber Threat Intelligence - businessnewsdaily.com" (in en). https://www.businessnewsdaily.com/11141-cyber-threat-intelligence.html. 
  56. Kobialka, Dan (2022-03-01). "Anomali Unveils Cloud XDR Solution: Here's What MSSPs Need to Know" (in en-US). https://www.msspalert.com/cybersecurity-services-and-products/xdr/anomali-unveils-cloud-xdr-solution-heres-what-mssps-need-to-know/. 

External links