Good Sites Gone Bad: Barracuda Unveils Threatglass, Online Malware Detection Tool

March 26, 2014 (Wed): Barracuda Networks, Inc., a leading provider of cloud-connected security and storage solutions, announced the launch of, an online malware detection tool designed specially for users to share, browse and analyse malware infected sites.

“Good sites gone bad’ is a daily problem for popular websites, that are usually targeted by attackers to infect malware on unsuspecting visitors. With Threatglass, the cyber security community will have access to a high-level tool that can be used by anyone with minimal technical knowledge,” said Thiban Darmalingam, the Regional Manager for Barracuda in Malaysia.

“Each week the platform will analyse millions of websites including the Alexa top 25,000 websites, social feeds and suspicious websites identified through Barracuda’s customer network that consists of more than 150,000 organizations worldwide,” explains Thiban.

Threatglass was originally developed for Barracuda and is now being shared with the cyber security community, for both casual users and the research community to provide an effective way to document and better understand this ongoing problem.

“In the last few months, our malware detection engines at Barracuda Labs have found popular sites like, and to be infected with Malware. Threatglass large-scale automated system has catalogued approximately 10,000 live malware attacks and is constantly updating new ones every day to its system,” explains Thiban.

Threatglass is an automated system that leverages heavyweight virtualization to detect web-based malware in a vulnerability and exploit-independent manner. In addition to screen captures of the infections, the site displays details of these infected sites through various representations of network traffic including DNS, HTTP, and netflow in both graphical and textual formats.

Key features Threatglass users can explore include:


  • Casually browse website infections in an Pinterest-like graphical representation
  • View charting and trending data of historical malware volumes
  • Examine relationships between various components of an attacker ring


  • Share data among other researchers
  • Review easily-parsed breakout data as well as source data
  • Submit websites for inspection and analysis

Author: Terry KS

Share This Post On