cognitive cybersecurity intelligence

News and Analysis

Search

CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability

CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability

The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with Sandia National Laboratories, today announced the public release of Thorium, a highly scalable and distributed platform designed for automated file analysis and result aggregation.

The new tool aims to significantly enhance the capabilities of cybersecurity teams by automating complex analysis workflows and integrating a wide array of commercial, open-source, and custom-built tools.

Thorium is engineered to support a variety of critical mission functions, including in-depth software analysis, digital forensics, and incident response.

It provides analysts with a unified system to efficiently assess sophisticated malware threats. Teams that regularly analyze large volumes of files can leverage Thorium to implement scalable automation and index results, streamlining their operations.

“The goal of Thorium is to enable cyber defenders to bring automation to their existing analysis workflows through simple tool integration and intuitive event-driven triggers,” CISA stated in its announcement.

Key features of the platform include its capacity for easy tool integration, allowing analysts to incorporate command-line tools as Docker images.

It also offers powerful filtering of results through tags and full-text searches, and ensures security with strict group-based permissions controlling access to submissions, tools, and results.

FeatureDescriptionEasy Tool IntegrationIntegrate command-line tools as Docker images, including open-source, commercial, and custom tools.FilteringFilter analysis results using tags and full-text search for efficient data handling.SecurityEnforce group-based permissions to control access to submissions, tools, and results.ScalabilitySupports high workload demands using Kubernetes and ScyllaDB; can ingest over 10 million files/hour per group.PipeliningDefine event triggers and execution sequences to automate workflows.Workflow IntegrationControl the platform via RESTful API, web interface, or command-line utility for seamless workflow.Result AggregationAggregate and index tool outputs for deeper analysis and integration with downstream processes.Tool SharingImport and export tools easily for sharing across cyber defense teams.

One of Thorium’s most notable attributes is its immense scalability. Built to grow with hardware demands using Kubernetes and ScyllaDB, the platform is configured to ingest over 10 million files per hour for each permission group and can schedule more than 1,700 jobs per second, all while maintaining fast query performance for results.

The platform allows users to define event triggers and tool execution sequences to automate entire workflows. It can be fully controlled via a RESTful API and offers a web-based interface or a command-line utility for easy access.

Furthermore, Thorium aggregates and indexes tool outputs, preparing them for deeper analysis or for use by other downstream processes.

Example use cases highlighted by CISA include triaging malware with static and dynamic analysis tools, automatically processing host forensic artifacts like emails and memory images, and conducting performance assessments of various tools on benchmark datasets.

CISA encourages cybersecurity teams to adopt Thorium. Deploying the platform requires a Kubernetes cluster, block store, and object store, as well as familiarity with Docker containers. The agency is actively seeking feedback from users to further enhance Thorium’s capabilities.

Integrate ANY.RUN TI Lookup with your SIEM or SOAR To Analyses Advanced Threats -> Try 50 Free Trial Searches
The post CISA Open-sources Malware and Forensic Analysis Tool Thorium to Public Availability appeared first on Cyber Security News.

Source: cybersecuritynews.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts