Search
Keyword: ad
This iOS malware modifies the developer ID in the advertisement SDKs used by installed applications.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware may be manually installed by a user.
Android
NOTES: This malware is a Potentially-Unwanted Application (PUA) live show payware app with multiple pay SDKS, such as Alipay, Iapppay and Unionpay. Iappay is a payment service SDK that allows for payments to be made by SMS...
This adware may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected sy...
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this writing, the said sites are inaccessible.
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Android OS
NOTES: Certain applications on Google Play pose as legitimate voice messenger platforms, with suspicious automated functions such as automatic pop-ups of fake surveys and fraudulent ad clicks. When the app is install...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website. It redirects browsers to cert...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
* indicates a new version of an existing rule Deep Packet Inspection Rules: Database Microsoft SQL 1000917* - Restrict Microsoft SQL Server XP_CMDSHELL Procedure MySQL Cluster NDBD 1011389 - Oracle MySQL Cluster Data Node Info...
This potentially unwanted application may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on...
This Adware drops and runs other files on the device. It displays pop-up advertisements.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses a user interface (UI).
