• This malware was discovered on August 2017 to have been delivered by the Disdain exploit kit. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This malware is involved in the filelessly-installed backdoor malware attack discovered early August 2017. It is able to install a backdoor malware onto the systems it infects.
    Read more   

  • This mobile ransomware threatens to send personal data from a victim's phone to everyone in their contact list. It was carried by three apps found in Google Play: “Wallpapers Blur HD”, “Booster & Cleaner Pro”, and “Calls Recorder”.
    Read more   

  • This malware opens a command shell on the targeted system. It mainly targets IoT devices, particularly Network Attached Storage (NAS) devices.
    Read more   

  • This malware masquerades as popular apps like MMS, whatsapp, and Pokemon Go. It is capable of hijacking a phone and is capable of many actions including calling a number or sending an SMS indicated by an attacker, upload files into a C&C server, and steal information.
    Read more   

  • This cross-platform remote access trojan (RAT) can be run on any machine installed with Java. This includes Windows, Mac OSX, Linux, and Android.
    Read more   

  • This malware abuses certificates and has security software evasion that affects machines using Apple's OS X operating system. The fake certificates installed by the malware allows for man in the middle attacks.
    Read more   

  • A new variant of this mobile malware (ANDROIDOS_SLOCKER.OPST) is known to have the same GUI as WannaCry, and are capable of encrypting files.
    Read more   

  • This information stealing malware was one of the IoCs found in recent attacks targeting hospitals in Israel. This malware is also notable for its stealth.
    Read more   

  • This variant of PETYA ransomware is involved in the ongoing attack campaign that Trend Micro discovered late June 2017 . Along with encryption capabilities it also has the ability to steal login credentials.
    Read more