• This malware abuses certificates and has security software evasion that affects machines using Apple's OS X operating system. The fake certificates installed by the malware allows for man in the middle attacks.
    Read more   

  • A new variant of this mobile malware (ANDROIDOS_SLOCKER.OPST) is known to have the same GUI as WannaCry, and are capable of encrypting files.
    Read more   

  • This information stealing malware was one of the IoCs found in recent attacks targeting hospitals in Israel. This malware is also notable for its stealth.
    Read more   

  • This variant of PETYA ransomware is involved in the ongoing attack campaign that Trend Micro discovered late June 2017 . Along with encryption capabilities it also has the ability to steal login credentials.
    Read more   

  • This malware is a variant of the ransomware family EREBUS and was discovered to be involved in an attack against South Korean webhosting company NAYANA. Users affected by this malware may find their personal files and documents encrypted and thus rendered useless.
    Read more   

  • This malware is a variant of the SOREBRECT malware that Trend Micro discovered on June 2017. It sports fileless, code-injecting capabilities.
    Read more   

  • This malware is a variant of the SOREBRECT malware that Trend Micro discovered on June 2017. It sports fileless, code-injecting capabilities.
    Read more   

  • This malware is part of the malware spam attack Trend Micro uncovered early June of 2017, one that targeted certain organizations in the EMEA region. It has the capability of delivering malware through the act of showing a hyperlink's contents via mouse hover.
    Read more   

  • This ransomware was uncovered by Trend Micro during late May 2017. The first variant of the UIWIX malware family, it sports fileless infection capabilities as well as the ability to take advantage of the EternalBlue vulnerability.
    Read more   

  • This ransomware exploits the MS17-010 vulnerability to spread to other vulnerable computers. This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more