AIL v6.4 Release Notes with Mail Search functionality, improved crawling capabilities and many bugs fixes

Aug 22, 2025 • AIL Project Team

Release date: 2025-08-22

🚀 New Features & Changes

  • Core Update
    • Introduced v6.4 update. [terrtia]
  • Crawler
    • Added function to recrawl onion services by month or crawl all at once. [terrtia]
    • The crawler is now named Lacus. [Alexandre Dulaunoy]
  • CVE Integration
    • Migrated CVE information UI to Vulnerability Lookup. [terrtia]

Screenshot from 2025-08-22 15-35-17

  • Module Extractor
    • Improved email extraction. [terrtia]
  • Mail Search
    • Increased cache for better performance. [terrtia]
    • Refactored mail search with improved options:
      • Domain + user fragment
      • User + optional domain fragment
      • Exact address
      • Domain fragment only
    • Improved overall search performance, added caching and pagination for domain search. [terrtia]

Screenshot from 2025-08-22 15-33-51

  • ZMQ Importer
    • Display triggered filters. [terrtia]
    • Added filter content. [terrtia]
    • New option to filter by file start/end. [terrtia]
  • Abstract Object
    • Improved ID iterator performance. [terrtia]
  • Language
    • Added function to ping LibreTranslate. [terrtia]

🛠 Fixes

  • TheHive
    • Adapted to unexpected breaking change. [terrtia]
  • Crawler Recrawl
    • Fixed last parent issue. [terrtia]
  • CVE
    • Fixed typo. [terrtia]
    • Corrected CVE Vulnerability Lookup UI URL. [terrtia]
  • Module Extractor
    • Limited email extraction to prevent excessive data collection. [terrtia]
  • ZMQ Importer
    • Fixed content filters. [terrtia]
  • Language
    • Improved exception handling for unknown ISO1 language codes. [terrtia]
  • Onion Lookup
    • Fixed parsing of invalid URLs (multiple improvements). [terrtia]

✨ Contributors

  • terrtia
  • Alexandre Dulaunoy

Funding

MISP-LEA, a collaborative endeavor between Shadowserver and CIRCL, is a 24-month initiative funded by the European Union. The project’s central aim is to establish operational and enduring MISP and AIL instances dedicated specifically to law enforcement agencies. This setup will facilitate a smoother exchange of evidence between law enforcement agencies and improve the onset of collaborative investigations. For this purpose, the system will ingest data from Shadowserver’s ransomware and C2 infrastructure tracking.

Law enforcement agencies willing to discover and leverage the MISP-LEA platform can apply on the misp-lea.org website.

Follow us