The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced today that Thorium, an open-source platform for malware and forensic analysis, is now publicly available for government, public, and private sectors.
Thorium is a scalable cybersecurity tool created with Sandia National Laboratories that automates tasks in cyberattack investigations. It can handle over 1,700 jobs per second and process more than 10 million files per hour per permission group.
“Thorium enhances cybersecurity teams’ capabilities by automating analysis workflows through seamless integration of commercial, open-source, and custom tools,” CISA said on Thursday.
“It supports various mission functions, including software analysis, digital forensics, and incident response, allowing analysts to efficiently assess complex malware threats.”
Security teams can use Thorium for automating and speeding up various file analysis workflows, including but not limited to:
Easily import and export tools to facilitate sharing across cyber defense teams,
Integrate command-line tools as Docker images, including open-source, commercial, and custom software,
Filter results using tags and full-text search,
Control access to submissions, tools, and results with strict group-based permissions,
Scale with Kubernetes and ScyllaDB to meet workload demands.
Defenders can find installation instructions and get their own copy of Thorium from CISA’s official GitHub repository.
“By publicly sharing this platform, we empower the broader cybersecurity community to orchestrate the use of advanced tools for malware and forensic analysis,” added CISA Associate Director for Threat Hunting Jermaine Roebuck.
“Scalable analysis of binaries as well as other digital artifacts further enables cybersecurity analysts to understand and address vulnerabilities in benign software.”
On Wednesday, CISA released a tool to help security teams respond to incidents by giving them the steps needed to remove attackers from affected networks and devices.
17K+ SharePoint Servers Exposed to Internet : 840 Servers Vuln to 0-Day Attacks