%# $Id$ <%method title> Reading Room - Whitepapers <& /Elements/BoxStart.mc, heading => 'Team Cymru\'s SOHO Pharming Whitepaper' &>

UPDATE: Here is the video for our SOHO Pharming Update of March 11, 2014. This update discusses the results of our SOHO Pharming Whitepaper release as well as further developments on that topic.

Below, find the first of the original series of four (five with the bonus eye-candy video) discussing our SOHO Pharming Whitepaper publication.

If you've navigated to this site from an external source and are seeking the download of the SOHO Pharming Whitepaper, please scroll down on this page. Thanks for watching and feel free to share with your colleagues and friends!

Products mentioned in the SOHO Pharming Whitepaper:

Enterprise Intelligence Service
The Team Cymru Enterprise Intelligence Service (EIS) is our premier partnership offering. When organizations are confronted with the most insidious threats, the most baffling of incidents, or strategic cyber security questions, the EIS stands ready to assist. Bringing our full resources to bear on your urgent and difficult problems ensures an enumerative analysis and answers on which to base your next steps. The Enterprise Intelligence Service is designed to augment and enhance other existing Cyber Intelligence Services that an organization may already be using.

See more at: http://www.team-cymru.com/Services/EIS/
Threat Intelligence
Internet threat intelligence can be a challenge to understand. As a security professional or product manager it's critical that you have the right insight to help with the problem you're looking to solve. Be it command and control data related to DDoS or botnets for your service or application, IP address reputation data for your e-commerce services, or fresh malware data for your research team, Team Cymru has what you're looking for.

See more at: http://www.team-cymru.com/Services/Intel/

Because you're interested in the SOHO Pharming Whitepaper, you may be interested in these offerings:

Malware Hawk
Team Cymru's legendary malware insight is now available as a cloud-based portal and API: a database of relationships and sandbox technologies that does in seconds what it used to take days or weeks to achieve. Malware Hawk is the latest addition to our Hawk suite of tools to save you time and help you focus on what's really important.
  • Access to our entire database of relationships of over 52 million samples (samples are linked by a number of key factors from domain, IP address contacted through mutex names, and even the icon used)
  • Ability to submit samples to two different Sandboxes for analysis and reporting using up to 400 different combinations of OS and applications
  • Ability to submit samples for rapid scanning by major AV engines
  • API support for enterprise automation

See more at: http://www.team-cymru.com/Services/MalwareHawk/
Team Cymru's #totalhash provides static and dynamic analysis of Malware samples. The data available on the site is free for non-commercial use. If you have samples that you would like analyzed you may upload them to our anonymous FTP server.

We believe in empowering you, the user, with the extremely fast and relevant data you need on relevant malware found in the wild. #totalhash returns the matches you are looking for instantly. By pushing the intelligence into the web client, we can help you quickly find what you are looking for. Access to the data on this site (including commercial usage) is also available through our API!

See more at: http://totalhash.com/
<& /Elements/BoxEnd.mc &> <& /Elements/BoxStart.mc, heading => 'Want to be contacted by us directly regarding any of our products?' &> % if ($ARGS{'submit'} && $validform) {

Thank you for your interest! We will contact you by e-mail as soon as possible.

% } else {

For details about our products, please complete the following form:

% if (!$validform) {

Please complete the required fields

% }

Enterprise Intelligence Service
Executive Briefing Service
Botnet Analysis and Reporting Service
Insight Hawk
Malware Hawk
Controller Feed
Reputation Feed
DDoS Victim Feed
Malicious URL Feed
Malware Binaries
Other Malware Data
Data Sharing Options (Non-Commercial)
Botnet Analysis and Tactical Tool for Law Enforcement (law-enforcement only)
BIN Feed of Compromised Accounts (financial-institutions only)
TC Console (malicious activity on your network)
CSIRT Assistance Program (national and regional CSIRTs only)
Dragon News Bytes
Other (Please Specify):
* denotes required fields
% } # else (if ! $ARGS{'submit'})

Download the Team Cymru SOHO Pharming Whitepaper:

Click the images above to download our SOHO Pharming Whitepaper (left) and our SOHO Pharming Update (right). The five-page update discusses the results of our SOHO Pharming Whitepaper release as well as further developments on that topic and the SOHO Pharming Whitepaper is our original publication containing many of the details that the update discusses.

Don't miss the next one!

We frequently announce our whitepapers on our social media offerings as well as other news and discussions. If you use social media, check us out:


For any media inquiries, please contact press@cymru.com.

<& /Elements/BoxEnd.mc &> <%init> my $validform = 1; if ($ARGS{'submit'}) { # form has been submitted, send us some e-mailzor! #$validform = 0 unless ($email =~ /^(\w¦\-¦\_¦\.)+\@((\w¦\-¦\_)+\.)+[a-zA-Z]{2,}$/ ); $validform = 0 unless ($email =~ /^\w[\w\.\-]*\w\@\w[\w\.\-]*\w(\.\w{2,4})$/ ); $validform = 0 unless ($name && $company && $position && $interest); if ($validform) { my $ip = $r->connection->remote_ip; my $msgbody = < 'smtp', #FROM => $ARGS{'email'}, FROM => 'sales@cymru.com', TO => 'sales@cymru.com', SUBJECT => '**SOHO Pharming Application Received!**', BODY => $msgbody, ); }} <%args> $name => undef $email => undef $company => undef $phone => undef $position => undef $interest => undef $enterprise => undef $executive => undef $botnet => undef $insight => undef $malware => undef $controller => undef $reputation => undef $ddos => undef $malicious => undef $malware_binaries => undef $other_malware_data => undef $data_sharing => undef $botnet_analysis => undef $bin_feed => undef $tc_console => undef $csirt => undef $dragon_news => undef $other => undef $other_text => undef