Malware
This JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
Read moreThis JIGSAW ransomware uses chat support to aid customers in paying the demanded ransom. Previous variants of JIGSAW are known to use scary or porn-related ransom messages.
Read moreThis ransomware is one of the few ransomware families that is capable of spreading on its own. It drops a copy of itself in removable drives, making use of USBs a risky practice.
Read moreTo get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreThis ransomware, known as CryptXXX, is a .DLL file that is capable of locking screens.
Read moreThis malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It has certain routines that are tailored to take advantage of the SWIFT messaging network in order to steal funds.
Read moreThis malware is involved in the global financial network transfer system Swift hacking incident of April-May 2016. It is a crucial component of the malware that performs the SWIFT message tampering that then causes financial theft.
Read moreThis ransomware attempts to bait Chinese users by using Chinese language in its ransom notes and interface.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware is seen being distributed by the Magnitude Exploit Kit. It exploits a vulnerability in the Windows kernel (CVE-2015-1701) to download a LOCKY ransomware.
Read moreThis is the detection for a malicious PDF file that executes Windows PowerShell via its OpenAction event to download a spyware. As a result, the routines of the spyware are exhibited on the affected system.
Read more