Malware
This malware is a PowerShell script responsible for downloading and dropping other files. It is implicated in a malicious cryptocurrency-mining activity that features a malware propagating via various methods.
Read moreThis is an updated Bashlite malware designed to add infected internet-of-things devices to a distributed-denial-of-service (DDoS) botnet.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreThis is an updated Bashlite malware designed to add infected internet-of-things devices to a distributed-denial-of-service (DDoS) botnet.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreThis XLoader variant poses as a security app for Android devices, and uses a malicious iOS profile to affect iPhone and iPad devices.
Read moreThis backdoor uses several known websites to receive backdoor commands, facilitate communication of the commands, and upload files.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreThis malware is a downloader used by the OceanLotus threat actor group. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreThis ransomware comes from a high volume spam campaign that aims to deliver this to as many users possible.This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreThis ransomware comes from a high volume spam campaign that aims to deliver this to as many users possible.This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreThis fileless malware connects to specific URLs to download PowerShell codes and execute these.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreThis malware is implicated as an exploit for the zero-day vulnerability in Adobe Flash Player known as CVE-2018-15982. This exploit made its rounds via drive-by downloads.
Read more