Analysed Malware Samples
Browse our collection of analysed OT malware samples and their behavioural uniqueids.
Submit Malware Sample
Upload a file for analysis. You'll receive a unique ID to track your submission.
Submission Successful!
Your unique ID:
Use this ID in the Retrieve tab to check your analysis results.
Retrieve Analysis Results
Enter your unique ID to retrieve your malware analysis report.
About Smoke and Mirrors
What is Smoke and Mirrors?
Smoke and Mirrors is an AI-powered OT (Operational Technology) malware analysis platform developed by the Fata Morgana team at the Alan Turing Institute. It uses dynamic emulation environments to safely analyse malware targeting industrial control systems and critical infrastructure.
Unlike traditional approaches that require expensive hardware or detailed device emulation, Smoke and Mirrors creates responsive AI-powered environments that adapt in real-time to malware behaviour, deceiving malicious samples into revealing their capabilities without exposing real infrastructure to risk.
How It Works
Our system creates a "network mirage" - a deceptive environment where malware interacts with what appear to be real industrial devices. AI-powered responders mimic protocol behaviour on demand, generating convincing responses to malware queries across various OT protocols such as Modbus and S7.
The malware remains in our sandbox, revealing its tactics, payloads, and intended effects without ever touching actual industrial hardware.
Key Features
AI-Powered Protocol Simulation
Real-time generation of protocol-compliant responses without requiring exhaustive reverse engineering or manual configuration of specific industrial devices.
Safe Analysis Environment
Analyse OT malware behaviour without risking actual industrial infrastructure or requiring expensive hardware setups.
Scalable Coverage
Designed to handle diverse OT protocols and malware variants without protocol-specific engineering for each new target.
Learn More
For detailed technical insights, research updates, and the story behind our approach to OT security, visit our research publication: