Anomali


Anomali Inc. is an American cybersecurity company that develops and provides threat intelligence products. In 2023, the company moved into providing security analytics powered by artificial intelligence (AI).

History

Anomali was founded in 2013 under the name ThreatStream, by Greg Martin and Colby DeRodeff. At that time, the company's products provided filtering and customization options to give companies visibility into indicators of compromise. In 2013, the company launched the first version of ThreatStream, a threat intelligence platform (TIP), uses different sources to track known threats, monitor and detect security breaches.
In 2016, company rebranded as Anomali and introduced new products and a new approach to threat intelligence. This included providing SaaS and on-premise platforms that customers could use to upload their logs. It launched its second product, Anomali, which later became Anomali Match, an enterprise threat detection service that matched data against threat intelligence for existing IOCs.
By 2018, Anomali had received $96.3 million in funding from 11 investors, including Paladin Capital Group, Institutional Venture Partners (IVP), GV, General Catalyst, Telstra Ventures, and Lumina Capital. The company works with government and business organizations such as the Bank of England, Citigroup, and Alaska Airlines.
In 2019, Anomali introduced Anomali Lens, a web-browser extension that highlights and collects relevant threat data from web pages. The data is added to ThreatStream and matched with internal network events using Anomali’s Match platform. Since being founded, Anomali has collaborated with partners spanning channel resellers, managed security services providers, systems integrators, and Commercial Threat Intelligence Feed providers to build out the Anomali Preferred Partner Store. Anomali has established a collaborative relationship with Microsoft to integrate threat intelligence from ThreatStream with security insights from Microsoft Graph security API. This allowed companies to correlate cloud service and network activity with adversary threat information. The company also partnered with the National Health Information Sharing and Analysis Center to bring cybersecurity tools and threat intelligence to the healthcare community.
In March 2021, the company signed a partnership with Netpoleon, a network security distributor. This was the company’s first partnership in Australia and New Zealand. In January 2022, a distribution agreement was signed with ACA Pacific to reach markets in Singapore, Malaysia, Indonesia, and Thailand.
In March 2022, the company released its Cloud-Native XDR solution. It works with Anomali’s threat intelligence and IOC repositories to help companies improve existing security infrastructure. It can be integrated with the MITRE ATT&CK framework and other security frameworks.
That same month, Anomali started its Resilience Partner Program for Global Systems Integrators, Value Added Resellers, Distributors, and service providers. The program gives partners simplified access to the Anomali Platform and Cloud-Native XDR.

Investigations / Anomali Threat Research (ATR) Team

In January 2019, Anomali uncovered a phishing scam targeting Australian businesses. Hackers would email companies, claim that they had been selected by the Department of Infrastructure and Regional Development to submit a tender for a commercial project, and then require companies to register in the tender portal to continue. The link in the email took businesses to a replica site of the government's AusTender website. The ATR team alerted the government to the scam.
In July 2019, the ATR observed a new ransomware targeting QNAP Network Attached Storage devices and named it eCh0raix. A decryptor was released in August.
In December 2019, Anomali published research that said that Gamaredon, a hacking group, had launched attacks targeting Ukrainian military and government agencies, including the Ministry of Foreign Affairs, journalists, law enforcement, and nongovernmental organizations. The attacks started in mid-September.
In June 2020, the company identified twelve apps posing as coronavirus contact tracing apps that were designed to steal personal and financial information from Android users. Four of the apps used either the Anubis banking malware or the SpyNote Trojan. The apps targeted people in Armenia, Brazil, Colombia, India, Indonesia, Iran, Italy, Kyrgyzstan, Russia and Singapore.
in February 2021, ATR identified a cyberespionage campaign targeting UAE and Kuwait government agencies. The work was attributed to Static Kitten and the objective was to install the remote management tool ScreenConnect with "unique launch parameters that have custom properties with malware samples and URLs masquerading as the Ministry of Foreign Affairs of Kuwait and the UAE National Council". Static Kitten is a state-sponsored hacking group believed to be working for Iran's Islamic Republic Guard Corps.
In May 2021, the team identified threat actors who were using Microsoft Build Engine to filelessly deliver remote access trojans and password-stealing malware on targeted Windows systems. The campaign had been active since April, with the attackers using the Microsoft application to load the attack code, thereby avoiding any traces of infection. The samples analyzed by Anomali delivered Remcos RAT, Quasar RAT, and RedLine Stealer.
In September, ATR identified action from the FIN7 financial cybercrime gang. The gang was delivering JavaScript backdoors using Word documents to steal payment-card data.