News
3/18/2014
10:41 AM
50%
50%

Barracuda Labs Launches Threatglass To Share And Research Malicious Websites

Threatglass allows users to graphically browse Web site infections

CAMPBELL, Calif., March 18, 2014 /PRNewswire/ -- Barracuda Networks, Inc. (NYSE:

CUDA), a leading provider of cloud-connected security and storage solutions, today announced the launch of Threatglass (http://www.threatglass.com), an online tool for sharing, browsing and analyzing web-based malware. Threatglass allows users to graphically browse website infections by viewing screenshots of the stages of infection, as well as by analyzing network characteristics such as host relationships and packet captures.

http://photos.prnewswire.com/prnvar/20131113/SF16521LOGO

"'Good sites gone bad' is a daily problem for popular websites targeted by attackers and used to serve malware to their unsuspecting visitors," said Dr.

Paul Judge, chief research officer and VP, Barracuda. "Threatglass was designed for both casual users and the research community to provide a way to document and better understand this ongoing problem."

Threatglass was built as a frontend for a large-scale, automated system that leverages heavyweight virtualization to detect web-based malware in a vulnerability and exploit-independent manner. The platform analyzes millions of websites each week. Websites for inspection are sourced from multiple data feeds including the Alexa top 25,000 websites, social feeds and suspicious websites from Barracuda's customer network, consisting of more than 150,000 organizations worldwide. In addition to screen captures of the infections, Threatglass displays various representations of network traffic including DNS, HTTP, and netflow in both graphical and textual formats. The system has cataloged approximately 10,000 live web-based malware attacks and adds new ones each day.

Barracuda Labs' malware detection engines have discovered numerous infections in high-profile websites. In the last few months, Barracuda Labs published those findings for Cracked.com, Php.net and Hasbro.com. Those examples and thousands of other infected websites now are visible through Threatglass.

Key features Threatglass users can explore include:

Visualization

-- Casually browse website infections in an Pinterest-like graphical

representation

-- View charting and trending data of historical malware volumes

-- Examine relationships between various components of an attacker ring Community

-- Share data among other researchers

-- Review easily-parsed breakout data as well as source data

-- Submit websites for inspection and analysis For additional insight and details on Threatglass from the Barracuda Labs team, please check out the blog post at https://barracudalabs.com/2014/03/introducing-threatglass-new-industry-portal-offering-exploration-visualization-and-analysis-of-exploited-websites/.

Barracuda Labs

To find research updates, industry news, events, statistics, free security tools and other resources, visit: http://barracudalabs.com/

About Barracuda Networks, Inc. (NYSE: CUDA) Barracuda provides cloud-connected security and storage solutions that simplify IT. These powerful, easy-to-use and affordable solutions are trusted by more than 150,000 organizations worldwide and are delivered in appliance, virtual appliance, cloud and hybrid deployments. Barracuda's customer-centric business model focuses on delivering high-value, subscription-based IT solutions that provide end-to-end network and data security. For additional information, please visit http://www.barracuda.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4774
Published: 2015-05-25
Cross-site request forgery (CSRF) vulnerability in the login page in IBM License Metric Tool 9 before 9.1.0.2 and Endpoint Manager for Software Use Analysis 9 before 9.1.0.2 allows remote attackers to hijack the authentication of arbitrary users via vectors involving a FRAME element.

CVE-2014-4778
Published: 2015-05-25
IBM License Metric Tool 9 before 9.1.0.2 and Endpoint Manager for Software Use Analysis 9 before 9.1.0.2 do not send an X-Frame-Options HTTP header in response to requests for the login page, which allows remote attackers to conduct clickjacking attacks via vectors involving a FRAME element.

CVE-2014-6190
Published: 2015-05-25
The log viewer in IBM Workload Deployer 3.1 before 3.1.0.7 allows remote attackers to obtain sensitive information via a direct request for the URL of a log document.

CVE-2014-6192
Published: 2015-05-25
Cross-site scripting (XSS) vulnerability in IBM Curam Social Program Management 6.0 SP2 before EP26, 6.0.4 before 6.0.4.5 iFix10, 6.0.5 before 6.0.5.6, and 6.0.5.5a before 6.0.5.8 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.

CVE-2014-8146
Published: 2015-05-25
The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (hea...

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.