News
3/18/2014
10:41 AM
50%
50%

Barracuda Labs Launches Threatglass To Share And Research Malicious Websites

Threatglass allows users to graphically browse Web site infections

CAMPBELL, Calif., March 18, 2014 /PRNewswire/ -- Barracuda Networks, Inc. (NYSE:

CUDA), a leading provider of cloud-connected security and storage solutions, today announced the launch of Threatglass (http://www.threatglass.com), an online tool for sharing, browsing and analyzing web-based malware. Threatglass allows users to graphically browse website infections by viewing screenshots of the stages of infection, as well as by analyzing network characteristics such as host relationships and packet captures.

http://photos.prnewswire.com/prnvar/20131113/SF16521LOGO

"'Good sites gone bad' is a daily problem for popular websites targeted by attackers and used to serve malware to their unsuspecting visitors," said Dr.

Paul Judge, chief research officer and VP, Barracuda. "Threatglass was designed for both casual users and the research community to provide a way to document and better understand this ongoing problem."

Threatglass was built as a frontend for a large-scale, automated system that leverages heavyweight virtualization to detect web-based malware in a vulnerability and exploit-independent manner. The platform analyzes millions of websites each week. Websites for inspection are sourced from multiple data feeds including the Alexa top 25,000 websites, social feeds and suspicious websites from Barracuda's customer network, consisting of more than 150,000 organizations worldwide. In addition to screen captures of the infections, Threatglass displays various representations of network traffic including DNS, HTTP, and netflow in both graphical and textual formats. The system has cataloged approximately 10,000 live web-based malware attacks and adds new ones each day.

Barracuda Labs' malware detection engines have discovered numerous infections in high-profile websites. In the last few months, Barracuda Labs published those findings for Cracked.com, Php.net and Hasbro.com. Those examples and thousands of other infected websites now are visible through Threatglass.

Key features Threatglass users can explore include:

Visualization

-- Casually browse website infections in an Pinterest-like graphical

representation

-- View charting and trending data of historical malware volumes

-- Examine relationships between various components of an attacker ring Community

-- Share data among other researchers

-- Review easily-parsed breakout data as well as source data

-- Submit websites for inspection and analysis For additional insight and details on Threatglass from the Barracuda Labs team, please check out the blog post at https://barracudalabs.com/2014/03/introducing-threatglass-new-industry-portal-offering-exploration-visualization-and-analysis-of-exploited-websites/.

Barracuda Labs

To find research updates, industry news, events, statistics, free security tools and other resources, visit: http://barracudalabs.com/

About Barracuda Networks, Inc. (NYSE: CUDA) Barracuda provides cloud-connected security and storage solutions that simplify IT. These powerful, easy-to-use and affordable solutions are trusted by more than 150,000 organizations worldwide and are delivered in appliance, virtual appliance, cloud and hybrid deployments. Barracuda's customer-centric business model focuses on delivering high-value, subscription-based IT solutions that provide end-to-end network and data security. For additional information, please visit http://www.barracuda.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8148
Published: 2015-01-26
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.

CVE-2014-8157
Published: 2015-01-26
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.

CVE-2014-8158
Published: 2015-01-26
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.

CVE-2014-9571
Published: 2015-01-26
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.

CVE-2014-9572
Published: 2015-01-26
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.