Malware

  • This is the detection for the infected .MSI files related to the URSNIF variant that steals information.
    Read more

  • This is the detection for the infected .EXE and .
    Read more

  • This is the new POS malware family known as LusyPOS, which has similar characteristics to Dexter and Chewbacca POS malware. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more

  • This backdoor contains a list of user names and passwords which it uses in its attempt to grant access to the System Root folder of an infected machine. It also installs another backdoor on the system.
    Read more

  • This is the Trend Micro detection for malicious files that belong to the malware family known as REGIN. REGIN is a multi-component malware that uses different files for its malicious functionalities and payload.
    Read more

  • REGIN is a sophisticated malware that has been used to target high profile victims. REGIN uses a variety of advanced evasion techniques.
    Read more

  • This ransomware variant uses the text ebola as part of the extension name that it appends on the file that it encrypts.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware employs a new autostart mechanism and removes users' privileges in viewing the registry’s content. As such, users won’t be able to suspect that their systems are already infected.
    Read more

  • This malware is related to a cyberespionage campaign that uses an Ichitaro zero-day vulnerability, or the Multiple Ichitaro Products Unspecified Remote Code Execution Vulnerability (CVE-2014-7247)To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more

  • WIRELURKER is a malware family that targets both Mac OS and iOS systems.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

Connect with us on