• This malware is a variant of the SOREBRECT malware that Trend Micro discovered on June 2017. It sports fileless, code-injecting capabilities.
    Read more   

  • This malware is a variant of the SOREBRECT malware that Trend Micro discovered on June 2017. It sports fileless, code-injecting capabilities.
    Read more   

  • This malware is part of the malware spam attack Trend Micro uncovered early June of 2017, one that targeted certain organizations in the EMEA region. It has the capability of delivering malware through the act of showing a hyperlink's contents via mouse hover.
    Read more   

  • This ransomware was uncovered by Trend Micro during late May 2017. The first variant of the UIWIX malware family, it sports fileless infection capabilities as well as the ability to take advantage of the EternalBlue vulnerability.
    Read more   

  • This ransomware exploits the MS17-010 vulnerability to spread to other vulnerable computers. This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This ransomware exploits the MS17-010 vulnerability to spread to other vulnerable computers. This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This malware was discovered on early May 2017 and is found to be capable of brute-forcing Telnet and SSH logins. Users affected by this malware may find the security of their systems compromised and at risk of information theft.
    Read more   

  • This malware is related to the Shadow Broker dump that was released on late April, 2017. It exploits various vulnerabilities in Windows.
    Read more   

  • TROJ_ETERNALROM.A is a hacking tool released by a hacking group called Shadow Brokers.
    Read more   

  • This malware, detected April 2017, is a Trojan related to the hacking group Shadow Brokers' leak. The exploit targets server vulnerabilities and leverages internet and network protocols.
    Read more