All Posts
Cyber Threat Intelligence
Anomali
1
min read

How Anomali Enterprise Helped Me Detect Malware in My Home Network

Published on
June 29, 2017
Table of Contents
<p>Have you ever wondered who is trying to connect to your home network? Or from your home network to the internet? Few internet users consider either of these questions (and the ones that do usually work in the security industry). Many believe the router their internet service provider issued to them is more than sufficient to protect them from threats. Time-after-time even the most basic steps to improve security - changing the default router password - is ignored by consumers. Coincidentally my ISP, Virgin Media, <a href="https://www.theguardian.com/media/2017/jun/23/virgin-media-change-passwords-hacking-which-super-hub-2-router">recently told 800,000 of their customers using default passwords to change them immediately</a>.</p><blockquote><p>"You Will Be Breached"</p></blockquote><p>This ethos holds true as much in the commercial world as it does for your home network. But has my home network already been breached? I decided to use Anomali Match to identify any potential malicious activity.</p><h2>Introducing Anomali Match</h2><p><a href="https://www.anomali.com/products/match">Anomali Match (AE) is a powerful Threat Hunting engine that compares millions of IOCs against your network traffic to identify active threats</a>. AE can analyze millions of Indicators of Compromise (IOCs) against billions of events every day. In the case of my home network, currently generating an average of 2 million log lines per day, AE is more than sufficient (to put it lightly!).</p><h2>Topology (and shopping list)</h2><h2><img alt="" src="https://cdn.filestackcontent.com/Q7x8NPKNReSRVFhBc229" style="width: 600px; height: 338px;"/></h2><p>The network topology of my home network is fairly simple. Most devices connect wirelessly to my router, an Asus RT-AC68U. Some network switches are plugged directly into the router. In either scenario all data in and out of the network flows through the router. Anomali Match can accept raw syslog feeds from any network device. Given the simplicity of my network I decided to stream syslogs from my router to AE. One other thing to note, not all routers support streaming of router logs via syslog, especially the cheap ones provided by ISPs.</p><p>Once I figured out how to configure syslog streaming I then needed to setup a machine to run Anomali Match and Anomali Universal Link, a client that sits in-front of AE to parse the incoming raw syslog feeds. The machine needed to be both powerful enough for AE to analyse my network traffic against millions of IOCs and have enough storage to handle all of the information being thrown at it. For this, I used a spare Mac Mini I had lying around that met the hardware specifications required. I then installed VMFusion on the Mac Mini to run an OS supported by AE - I chose CentOS - and proceeded to setup and configure both Anomali Match and Anomali Universal Link on it.</p><h2>What I Found</h2><h3>Lots of inbound threats from China</h3><p><img alt="" src="https://cdn.filestackcontent.com/CETpXDpWTeG1twA8p2aW" style="width: 600px; height: 419px;"/></p><p>And Russia. And the Untied States. And Ukraine. You get the idea.</p><h3>That were predominantly scanning IPs</h3><h3><img alt="" src="https://cdn.filestackcontent.com/HUNHDFmTSy2bIBYc50k4" style="width: 600px; height: 267px;"/></h3><p>Most IOC matches, totaling hundreds per day, were known scanning IPs. My router reports all information including blocked requests by its firewall so this was unsurprising.</p><h3>And generally benign</h3><h3><img alt="" src="https://cdn.filestackcontent.com/xz199EoyRGCmp8f5fdOJ" style="width: 600px; height: 303px;"/></h3><p>Anomali ThreatStream Threat Intelligence ranks the severity and confidence of an IOC match. I can use AE's powerful search interface to filter and pivot quickly on the threats detected. This made it easy to identify that most matches were fairly benign with low severity and low confidence scores. </p><h3>Though some were more serious</h3><h3><img alt="" src="https://cdn.filestackcontent.com/iTQW93iRQMiwYbl93XJ9" style="width: 600px; height: 315px;"/></h3><p>Not only were scanning IPs identified by Anomali Match, some outbound connections were being made to a recently identified malware IP. As Anomali Match allowed me to see the detailed analysis and context for the malware IOC in question and view the raw log of the event, I was able to easily identify the potentially comprised machine. Thankfully (for me) in this case it was just one machine and it belonged to a friend who had connected his laptop to the WiFi at my house whilst visiting.</p><p>Being extra cautious, I was also able to retrospectively compare this recent malware IOC against all my historic network logs stored in Anomali Match. Thankfully, no matches this time.</p><h2>In Summary</h2><p>Whilst their were some known threats observed by Anomali Match on my network most were nothing to worry about. I was able to triage matches and come to this conclusion quickly because Anomali Match provided:</p><ol><li>A detailed analysis and context of every IOC matched to my network data</li><li>The ability to view the raw log of an event that matched a known IOC</li><li>The option to run a forensic search to discover if an IOC had ever been seen in my network data previously</li></ol><p>Clearly in a larger corporate network, the amount of data being generated will be significantly greater than on my home network. Corporate networks are more likely to be the subject of targeted and sustained attacks with many more points of weakness (generally employees).</p><p><strong><a href="https://www.anomali.com/products/match">You should see what Anomali Match is really capable of...</a></strong></p>

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All