Malware
This iOS malware is related to the SEDNIT malware family. It is specifically designed for espionage on iOS devices.
Read moreThis UPATRE variant is used by DYRE banking malware to arrive in systems via spam emails. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware which is downloaded by DYRE banking malware, has the capability to compose email messages in Microsoft Outlook with the UPATRE malware attached.To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.
Read moreThis mew malware is related to the release of the Njw0rm malware source code found in early January 2015.To get a one-glance comprehensive view of the behavior of this Hacking Tool, refer to the Threat Diagram shown below.
Read moreThis mew malware is related to the release of the Njw0rm malware source code found in early January 2015.To get a one-glance comprehensive view of the behavior of this Hacking Tool, refer to the Threat Diagram shown below.
Read moreThis malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
Read moreThis malware was discovered to be involved in a series of malicious campaigns that found victims in Europe, China, Middle East, Africa, India, and Latin America on late January 2015. It comes as an attachment to a spammed mail and downloads a cryptolocker variant onto affected systems.
Read moreThis cryptoransomware variant was discovered to be involved in a series of malicious campaigns that found victims in Europe, China, Middle East, Africa, India, and Latin America on late January 2015. It encrypts files using various file extensions.
Read moreThis PlugX variant is found in compromised releases of some legitimate online games.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis file infector is embedded in an infected zip file served by a website hosted in North Korea.To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below.
Read more