RL Blog

Topics

All Blog PostsAppSec & Supply Chain SecurityDev & DevSecOpsProducts & TechnologySecurity OperationsThreat Research

Follow us

XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBluesky

Subscribe

Get the best of RL Blog delivered to your in-box weekly. Stay up to date on key trends, analysis and best practices across threat intelligence and software supply chain security.

ReversingLabs: The More Powerful, Cost-Effective Alternative to VirusTotalSee Why
Skip to main content
Contact UsSupportLoginBlogCommunity
reversinglabsReversingLabs: Home
Solutions
Secure Software OnboardingSecure Build & ReleaseProtect Virtual MachinesIntegrate Safe Open SourceGo Beyond the SBOM
Increase Email Threat ResilienceDetect Malware in File Shares & StorageAdvanced Malware Analysis SuiteICAP Enabled Solutions
Scalable File AnalysisHigh-Fidelity Threat IntelligenceCurated Ransomware FeedAutomate Malware Analysis Workflows
Products & Technology
Spectra Assure®Software Supply Chain SecuritySpectra DetectHigh-Speed, High-Volume, Large File AnalysisSpectra AnalyzeIn-Depth Malware Analysis & Hunting for the SOCSpectra IntelligenceAuthoritative Reputation Data & Intelligence
Spectra CoreIntegrations
Industry
Energy & UtilitiesFinanceHealthcareHigh TechPublic Sector
Partners
Become a PartnerValue-Added PartnersTechnology PartnersMarketplacesOEM Partners
Alliances
Resources
BlogContent LibraryCybersecurity GlossaryConversingLabs PodcastEvents & WebinarsLearning with ReversingLabsWeekly Insights Newsletter
Customer StoriesDemo VideosDocumentationOpenSource YARA Rules
Company
About UsLeadershipCareersSeries B Investment
EventsRL at RSAC
Press ReleasesIn the News
Pricing
Software Supply Chain SecurityMalware Analysis and Threat Hunting
Request a demo
Menu
Threat ResearchAugust 24, 2022

How abuse.ch evolved into an essential threat hunting platform

smiling woman with glasses
Carolynn van Arsdale, Writer, ReversingLabs.Carolynn van Arsdale
FacebookFacebookXX / TwitterLinkedInLinkedInblueskyBlueskyEmail Us
ConversingLabs episode 6: Leveraging YARA

When Roman Hüssy started abuse.ch, it began as a simple threat research blog. Now, the project offers an open source threat hunting platform to users worldwide.

Cybersecurity has been critical for years, but the the threat landscape has blossomed with the central role technology takes in everything from retail to banking and the remote workforce — plus emerging spaces like the software supply chain.

Researcher Roman Hüssy took an interest in the threat landscape in its nascency, channeling his interest into a threat research blog, dubbed abuse.ch. Fourteen years later, Abuse.ch is now a popular platform used by threat researchers and law enforcement globally, providing several open source services. 

ConversingLabs podcast host Paul Roberts chatted with Hüssy and ReversingLabs Threat Researcher Hrvoje Samardžić for our latest episode about Abuse.ch as a program, as well as YARAify, an Abuse.ch platform for the open sharing and use of YARA rules, an important tool for threat hunters. 

Here are some of the key takeaways from the ConversingLabs podcast.

Not all YARA rules are the same

As Samardžić explains in the ConversingLabs episode, YARA rules function as a pattern matching machine that can find files based on how the rule is written. Anyone can write and share YARA rules with the greater threat hunting community, and they range from being simply written, to being highly complicated and written at the expert level.

See ReversingLabs' open-source YARA rules on GitHub

YARA rules are a great, open source tool for threat researchers to find known and unknown threats, Samardžić said. But not all YARA rules are the same, in terms of quality and purpose. With a constantly growing threat landscape, new YARA rules are created daily, making it difficult to abide by universal classification standards. Plus, it can be tough to scope out the right YARA rules for a threat hunting mission.

Enter YARAify

These challenges are why Hüssy developed YARAify, which Samardžić says is a good platform for testing these rules, as well as for improving and developing them to be of higher quality.

YARAify is meant to serve as a central base for threat researchers, to both share and consume YARA rules, allowing them to stay aligned with the open source fashion of YARA rules in general, Hüssy shared on the podcast.

The platform also has a scan engine, processing thousands of samples per day. YARAify allows threat researchers to hunt for threats on YARAify using their own YARA rules as well. Overall, it is a multifaceted platform that serves as an aid to the global threat hunting community. 

Learn about the evolution of abuse.ch and YARAify in this new ConversingLabs episode, where Paul Roberts asked these experts how YARA rules are created, technical use cases, and details on the future of abuse.ch. 

Keep learning

  • Get up to speed on the state of software security with RL's Software Supply Chain Security Report 2026. Plus: See the the webinar to discussing the findings.
  • Learn why binary analysis is a must-have in the Gartner® CISO Playbook for Commercial Software Supply Chain Security.
  • Take action on securing AI/ML with our report: AI Is the Supply Chain. Plus: See RL's research on nullifAI and watch how RL discovered the novel threat.
  • Get the report: Go Beyond the SBOM. Plus: See the CycloneDX xBOM webinar.

Explore RL's Spectra suite: Spectra Assure for software supply chain security, Spectra Detect for scalable file analysis, Spectra Analyze for malware analysis and threat hunting, and Spectra Intelligence for reputation data and intelligence.

Tags:Threat Research

More Blog Posts

Graphalgo supply chain campaign respawned.

Graphalgo fake recruiter campaign returns

An attack targeting crypto developers has been respawned — with an LLC and new techniques.

Learn More about Graphalgo fake recruiter campaign returns
Graphalgo fake recruiter campaign returns
TeamPCP supply chain attack

The TeamPCP supply chain attack evolves

The malicious campaign started with Trivy and Checkmarx and has shifted to LiteLLM — and now telnix. Here's how.

Learn More about The TeamPCP supply chain attack evolves
The TeamPCP supply chain attack evolves
Malicious npm packages use fake install logs to load RAT

Fake install logs in npm packages load RAT

The final-stage malware in the Ghost campaign is a RAT designed to steal crypto wallets and sensitive data.

Learn More about Fake install logs in npm packages load RAT
Fake install logs in npm packages load RAT
Inside the NuGet hack toolset

Inside the NuGet hackers' toolset

RL discovered two packages containing scripts that complete a typosquatting toolchain. Here's how it worked.

Learn More about Inside the NuGet hackers' toolset
Inside the NuGet hackers' toolset

Spectra Assure Free Trial

Get your 14-day free trial of Spectra Assure for Software Supply Chain Security

Get Free TrialMore about Spectra Assure Free Trial
Blog
Events
About Us
Webinars
In the News
Careers
Demo Videos
Cybersecurity Glossary
Contact Us
reversinglabsReversingLabs: Home
Privacy PolicyCookiesImpressum
All rights reserved ReversingLabs © 2026
XX / TwitterLinkedInLinkedInFacebookFacebookInstagramInstagramYouTubeYouTubeblueskyBlueskyRSSRSS
Back to Top