CISA Releases Open-Source Thorium Platform For Malware Analysis

CISA Releases Open-Source Thorium Platform For Malware Analysis

The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with Sandia National Laboratories, has announced the release of Thorium - a FREE, automated, scalable platform for malware and forensic analysis. Thorium integrates commercial, custom, and open-source tools, allowing cybersecurity teams to rapidly assess malware threats and consolidate forensic data into a unified system.

As advanced persistent threats grow in volume and sophistication, timely and accurate malware analysis is critical. Analysts across government, public, and private sectors often struggle to keep up, juggling numerous specialized tools with limited time and resources.

Thorium addresses these challenges by enabling defenders to incorporate their preferred tools into a single, customizable platform. It supports automated analysis workflows at scale, making it easier to process large volumes of malware, adapt to emerging threats, and manage toolsets efficiently. Thorium is built to handle over 10 million file ingestions per hour per permission group and can schedule more than 1,700 jobs per second, all while delivering fast, searchable results.

“The Thorium framework reflects CISA’s commitment to delivering scalable cybersecurity solutions that support government and critical infrastructure,” said Jermaine Roebuck, CISA Associate Director for Threat Hunting. “By making this platform publicly available, we empower the broader cybersecurity community to use advanced tools for malware and forensic analysis. Our partnership with Sandia National Laboratories helps analysts nationwide collaborate, share insights, and build collective knowledge. Scalable analysis of binaries and digital artifacts strengthens our ability to identify and fix vulnerabilities in software.”

Cybersecurity teams can use Thorium to:

  • Integrate command-line tools as Docker images—supporting open-source, commercial, and custom tools—and with additional configuration, integrate virtual machine and bare-metal tools.
  • Filter analysis results using tags and full-text search.
  • Manage access to submissions, tools, and results through group-based permissions.
  • Scale infrastructure with Kubernetes and ScyllaDB to match workload demands.
  • Import and export tools easily for sharing across cyber defense teams.

Prerequisites and Instructions

Thorium requires a deployed Kubernetes cluster, block store, and object store. Familiarity with Docker containers and compute cluster management is also necessary for successful deployment. 

Download Thorium HERE

Article content
🔥 Download The Latest Malware Trends Report 2025
Article content
Download The AWS Security Services Cost Calculator


Elizabeth S.

Strengthening missions by leading cybersecurity programs and operational strategy for enterprises | Speaker

1w

There's a practical consideration at the Governance level. Organizations who need "free" or think they need free often don't have the in-house expertise to ingest and integrate disparate tools even if the free system offers a single pane. Also, the tool seems great at collecting. How does it know where within the ecosystem to stop?

Like
Reply
mike adam

Sales Associate at Delivery Roads Dispatch

1w

Pass4SurExams was a key resource in helping me pass the CISA exam.

Like
Reply
Matthew Amelin

With 20+ years managing enterprise environments and VIP clients, I excel at the intersection of tech, finance, and service—leading cloud ops, infrastructure projects, and building trusted executive partnerships.

1w

open source, Awesome!

Lamia Léa Ænigma

Non-Indexed Operative | Cognitive Infiltration Architect | Pre-Signal Presence in Sealed Intelligence Realms

1w

Thorium is not just a framework—it’s the first public acknowledgment that malware analysis at scale has become a geopolitical function, not a technical task. We’re no longer classifying binaries; we’re architecting cognitive sovereignty. This marks the shift from reverse engineering code to reverse engineering intent.

Sitashma Mahat

Cybersecurity Enthusiast | HND Pearson Computing Student | CEH | CISSP (in progress) | AI & Cloud Advocate | CompTIA Security+ | Network+ | CCSP | Ethical Hacking & DevOps Learner

1w

Thorium’s support for Docker and Kubernetes makes it highly adaptable for CI/CD pipelines in malware analysis. Its modular architecture can significantly reduce overhead in SOAR integrations and accelerate cross-platform threat correlation.

To view or add a comment, sign in

Others also viewed

Explore topics