Malware

  • This malware is related to an attack that took advantage of legitimate services like Google Drive and Dropbox in order to look less suspicious to unwary users.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more

  • This malware is involved in the Backoff POS malware attack discovered in August 2014. It has the ability to steal financial information from infected devices.
    Read more

  • This malware is involved in the Backoff PoS malware attack discovered in August 2014. It has the ability to steal financial information from infected devices.
    Read more

  • This malware is involved in the Backoff PoS malware attack discovered in August 2014. It has the ability to steal financial information from the devices it infects.
    Read more

  • This backdoor was hosted in the compromised Gizmodo Brazil website. It starts out as a fake Adobe Flash Player download.
    Read more

  • This variant of Cryptolocker encrypts files with specific file sizes. This routine impacts files with smaller file sizes such as documents and text files.
    Read more

  • This CryptoLocker variant uses Tor to mask its C&C communications.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This ransomware uses the GNU Privacy Guard application, a legitimate app in order to encrypt files. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware is involved in the socially-engineered attack that took advantage of the July 2014 Flight MH17 tragedy. Users affected by this malware may have their personal information stolen and their systems infected with other malicious files.
    Read more

  • This malware is a new derivative of the Gameover Zeus. It uses both Domain Generation Algorithm (DGA) and a "fast flux" tactic to obscure C&C servers.
    Read more

Connect with us on