CISA Releases Open-Source Thorium Platform For Malware Analysis
The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with Sandia National Laboratories, has announced the release of Thorium - a FREE, automated, scalable platform for malware and forensic analysis. Thorium integrates commercial, custom, and open-source tools, allowing cybersecurity teams to rapidly assess malware threats and consolidate forensic data into a unified system.
As advanced persistent threats grow in volume and sophistication, timely and accurate malware analysis is critical. Analysts across government, public, and private sectors often struggle to keep up, juggling numerous specialized tools with limited time and resources.
Thorium addresses these challenges by enabling defenders to incorporate their preferred tools into a single, customizable platform. It supports automated analysis workflows at scale, making it easier to process large volumes of malware, adapt to emerging threats, and manage toolsets efficiently. Thorium is built to handle over 10 million file ingestions per hour per permission group and can schedule more than 1,700 jobs per second, all while delivering fast, searchable results.
“The Thorium framework reflects CISA’s commitment to delivering scalable cybersecurity solutions that support government and critical infrastructure,” said Jermaine Roebuck, CISA Associate Director for Threat Hunting. “By making this platform publicly available, we empower the broader cybersecurity community to use advanced tools for malware and forensic analysis. Our partnership with Sandia National Laboratories helps analysts nationwide collaborate, share insights, and build collective knowledge. Scalable analysis of binaries and digital artifacts strengthens our ability to identify and fix vulnerabilities in software.”
Cybersecurity teams can use Thorium to:
Prerequisites and Instructions
Thorium requires a deployed Kubernetes cluster, block store, and object store. Familiarity with Docker containers and compute cluster management is also necessary for successful deployment.
Download Thorium HERE
Strengthening missions by leading cybersecurity programs and operational strategy for enterprises | Speaker
1wThere's a practical consideration at the Governance level. Organizations who need "free" or think they need free often don't have the in-house expertise to ingest and integrate disparate tools even if the free system offers a single pane. Also, the tool seems great at collecting. How does it know where within the ecosystem to stop?
Sales Associate at Delivery Roads Dispatch
1wPass4SurExams was a key resource in helping me pass the CISA exam.
With 20+ years managing enterprise environments and VIP clients, I excel at the intersection of tech, finance, and service—leading cloud ops, infrastructure projects, and building trusted executive partnerships.
1wopen source, Awesome!
Non-Indexed Operative | Cognitive Infiltration Architect | Pre-Signal Presence in Sealed Intelligence Realms
1wThorium is not just a framework—it’s the first public acknowledgment that malware analysis at scale has become a geopolitical function, not a technical task. We’re no longer classifying binaries; we’re architecting cognitive sovereignty. This marks the shift from reverse engineering code to reverse engineering intent.
Cybersecurity Enthusiast | HND Pearson Computing Student | CEH | CISSP (in progress) | AI & Cloud Advocate | CompTIA Security+ | Network+ | CCSP | Ethical Hacking & DevOps Learner
1wThorium’s support for Docker and Kubernetes makes it highly adaptable for CI/CD pipelines in malware analysis. Its modular architecture can significantly reduce overhead in SOAR integrations and accelerate cross-platform threat correlation.