Malware Tracker

Daily intelligence on active malware families. Sample counts, IOCs, C2 infrastructure, and trend analysis from MalwareBazaar, ThreatFox, and URLhaus.

20
Families Tracked
20
Active Threats
196
Daily Reports

Threat Landscape 2026

Statistics, category breakdown, and trends

Top Infostealers 2026

Most active information stealers ranked

Top RATs 2026

Most active remote access trojans ranked

Tracked Families

Agent Tesla

Infostealer ● Active
61
samples/day

A long-running .NET-based keylogger and infostealer distributed primarily through phishing emails, with extensive data exfiltration channel options.

→ Stable 8%

Akira

Ransomware ● Active

Akira is a ransomware family first observed in 2023, known for targeting organizations with double-extortion tactics and data exfiltration.

AsyncRAT

RAT ● Active
42
samples/day

An open-source .NET remote access trojan widely adopted by threat actors for its extensibility, ease of deployment, and active community development.

→ Stable 11%

Black Basta

Ransomware ● Active

Black Basta is a ransomware-as-a-service operation that emerged in early 2022, known for encrypting Windows systems and exfiltrating data to pressure...

Cobalt Strike

RAT ● Active
5
samples/day

Cobalt Strike is a commercial penetration testing and red teaming framework that has been widely adopted by threat actors for post-exploitation activities...

↑ Rising 94%

Emotet

Loader ● Active

Emotet is a sophisticated malware family that evolved from a banking trojan into a modular loader used to distribute other malicious payloads via email...

Formbook

Infostealer ● Active
95
samples/day

A prolific information stealer and form grabber sold as malware-as-a-service, known for its advanced anti-analysis techniques and cross-platform evolution into XLoader.

↑ Rising 346%

INC Ransom

Ransomware ● Active

INC Ransom is a ransomware family known for double-extortion tactics, encrypting files and threatening to leak stolen data from victims.

LockBit

Ransomware ● Active

LockBit is a ransomware-as-a-service family known for its speed, automated deployment, and double-extortion tactics targeting organizations globally.

Lumma Stealer

Infostealer ● Active

A Malware-as-a-Service infostealer sold on dark web forums, specializing in cryptocurrency wallet theft and browser credential extraction.

Medusa

Ransomware ● Active

Medusa is a human-operated ransomware family known for double-extortion tactics, targeting organizations globally since 2019 with data theft and encryption.

Mirai

Botnet ● Active
100
samples/day

Mirai is a Linux-based botnet malware that infects Internet of Things devices to launch large-scale distributed denial-of-service attacks.

↑ Rising 75%

Qilin

Ransomware ● Active

Qilin is a ransomware-as-a-service operation that emerged in 2022, known for targeting large organizations with double-extortion tactics and data exfiltration.

QuasarRAT

RAT ● Active
11
samples/day

A lightweight open-source remote administration tool for Windows, widely repurposed by both cybercriminals and nation-state actors for persistent remote access.

↑ Rising 18%

Raccoon Stealer

Infostealer ● Active

A C/C++ infostealer operated as MaaS, known for its user-friendly panel and the arrest of its lead developer by the FBI in 2022.

RansomHub

Ransomware ● Active

RansomHub is a ransomware-as-a-service operation that emerged in early 2024, known for encrypting files and exfiltrating data to pressure victims into...

RedLine Stealer

Infostealer ● Active

A widely distributed .NET-based infostealer sold on underground forums, known for harvesting browser credentials, cryptocurrency wallets, and system metadata.

Remcos RAT

RAT ● Active

A commercial remote access tool frequently abused by threat actors for surveillance, credential theft, and persistent backdoor access.

Snake Keylogger

Keylogger ● Active
9
samples/day

A .NET-based keylogger and credential stealer sold on underground forums, notable for its multiple data exfiltration channels and aggressive harvesting capabilities.

↑ Rising 91%

Vidar

Infostealer ● Active
28
samples/day

A C++-based infostealer forked from Arkei, notable for abusing legitimate platforms like Telegram and Steam for dead-drop C2 resolution.

→ Stable 2%

Latest Reports

View all →

Defense Guides

Step-by-step removal, detection, protection, and incident response guides for each tracked malware family.

Data & Statistics

IOCs, sample databases, detection rates, distribution analysis, and geographic targeting for each family.