Malware
This malware is involved in the filelessly-installed backdoor malware attack discovered early August 2017. It is able to install a backdoor malware onto the systems it infects.
Read moreThis mobile ransomware threatens to send personal data from a victim's phone to everyone in their contact list. It was carried by three apps found in Google Play: “Wallpapers Blur HD”, “Booster & Cleaner Pro”, and “Calls Recorder”.
Read moreThis malware opens a command shell on the targeted system. It mainly targets IoT devices, particularly Network Attached Storage (NAS) devices.
Read moreThis malware masquerades as popular apps like MMS, whatsapp, and Pokemon Go. It is capable of hijacking a phone and is capable of many actions including calling a number or sending an SMS indicated by an attacker, upload files into a C&C server, and steal information.
Read moreThis cross-platform remote access trojan (RAT) can be run on any machine installed with Java. This includes Windows, Mac OSX, Linux, and Android.
Read moreA new variant of this mobile malware (ANDROIDOS_SLOCKER.OPST) is known to have the same GUI as WannaCry, and are capable of encrypting files.
Read moreThis information stealing malware was one of the IoCs found in recent attacks targeting hospitals in Israel. This malware is also notable for its stealth.
Read moreThis variant of PETYA ransomware is involved in the ongoing attack campaign that Trend Micro discovered late June 2017 . Along with encryption capabilities it also has the ability to steal login credentials.
Read moreThis malware is a variant of the ransomware family EREBUS and was discovered to be involved in an attack against South Korean webhosting company NAYANA. Users affected by this malware may find their personal files and documents encrypted and thus rendered useless.
Read more