Malware Tracker
Daily intelligence on active malware families. Sample counts, IOCs, C2 infrastructure, and trend analysis from MalwareBazaar, ThreatFox, and URLhaus.
Threat Landscape 2026
Statistics, category breakdown, and trends
Top Infostealers 2026
Most active information stealers ranked
Top RATs 2026
Most active remote access trojans ranked
Tracked Families
Agent Tesla
A long-running .NET-based keylogger and infostealer distributed primarily through phishing emails, with extensive data exfiltration channel options.
↓ Declining 23%AsyncRAT
An open-source .NET remote access trojan widely adopted by threat actors for its extensibility, ease of deployment, and active community development.
↓ Declining 18%Formbook
A prolific information stealer and form grabber sold as malware-as-a-service, known for its advanced anti-analysis techniques and cross-platform evolution into XLoader.
↓ Declining 30%Lumma Stealer
A Malware-as-a-Service infostealer sold on dark web forums, specializing in cryptocurrency wallet theft and browser credential extraction.
QuasarRAT
A lightweight open-source remote administration tool for Windows, widely repurposed by both cybercriminals and nation-state actors for persistent remote access.
↓ Declining 50%Raccoon Stealer
A C/C++ infostealer operated as MaaS, known for its user-friendly panel and the arrest of its lead developer by the FBI in 2022.
RedLine Stealer
A widely distributed .NET-based infostealer sold on underground forums, known for harvesting browser credentials, cryptocurrency wallets, and system metadata.
Remcos RAT
A commercial remote access tool frequently abused by threat actors for surveillance, credential theft, and persistent backdoor access.
Snake Keylogger
A .NET-based keylogger and credential stealer sold on underground forums, notable for its multiple data exfiltration channels and aggressive harvesting capabilities.
Vidar
A C++-based infostealer forked from Arkei, notable for abusing legitimate platforms like Telegram and Steam for dead-drop C2 resolution.
↑ Rising 47%Latest Reports
View all →Defense Guides
Step-by-step removal, detection, protection, and incident response guides for each tracked malware family.
Data & Statistics
IOCs, sample databases, detection rates, distribution analysis, and geographic targeting for each family.