Malware Tracker

Daily intelligence on active malware families. Sample counts, IOCs, C2 infrastructure, and trend analysis from MalwareBazaar, ThreatFox, and URLhaus.

10
Families Tracked
10
Active Threats
69
Daily Reports

Threat Landscape 2026

Statistics, category breakdown, and trends

Top Infostealers 2026

Most active information stealers ranked

Top RATs 2026

Most active remote access trojans ranked

Tracked Families

Agent Tesla

Infostealer ● Active
16
samples/day

A long-running .NET-based keylogger and infostealer distributed primarily through phishing emails, with extensive data exfiltration channel options.

↓ Declining 23%

AsyncRAT

RAT ● Active
7
samples/day

An open-source .NET remote access trojan widely adopted by threat actors for its extensibility, ease of deployment, and active community development.

↓ Declining 18%

Formbook

Infostealer ● Active
9
samples/day

A prolific information stealer and form grabber sold as malware-as-a-service, known for its advanced anti-analysis techniques and cross-platform evolution into XLoader.

↓ Declining 30%

Lumma Stealer

Infostealer ● Active

A Malware-as-a-Service infostealer sold on dark web forums, specializing in cryptocurrency wallet theft and browser credential extraction.

QuasarRAT

RAT ● Active
3
samples/day

A lightweight open-source remote administration tool for Windows, widely repurposed by both cybercriminals and nation-state actors for persistent remote access.

↓ Declining 50%

Raccoon Stealer

Infostealer ● Active

A C/C++ infostealer operated as MaaS, known for its user-friendly panel and the arrest of its lead developer by the FBI in 2022.

RedLine Stealer

Infostealer ● Active

A widely distributed .NET-based infostealer sold on underground forums, known for harvesting browser credentials, cryptocurrency wallets, and system metadata.

Remcos RAT

RAT ● Active

A commercial remote access tool frequently abused by threat actors for surveillance, credential theft, and persistent backdoor access.

Snake Keylogger

Keylogger ● Active

A .NET-based keylogger and credential stealer sold on underground forums, notable for its multiple data exfiltration channels and aggressive harvesting capabilities.

Vidar

Infostealer ● Active
16
samples/day

A C++-based infostealer forked from Arkei, notable for abusing legitimate platforms like Telegram and Steam for dead-drop C2 resolution.

↑ Rising 47%

Latest Reports

View all →

Defense Guides

Step-by-step removal, detection, protection, and incident response guides for each tracked malware family.

Data & Statistics

IOCs, sample databases, detection rates, distribution analysis, and geographic targeting for each family.