Malware

  • This ZeuS variant uses random headers and changes its file extension, making it difficult to detect.To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more

  • This is the first mobile ransomware that uses Tor, a legitimate service that allows for concealed server connections. Users with mobile devices affected by this malware may find the files stored in their mobile device rendered useless and held for ransom.
    Read more

  • This malware is related to the SMS spam attack that affected users in Taiwan. Once installed, the malicious app may send SMS, as well as intercept incoming ones.
    Read more

  • This CryptoWall ransomware can be downloaded from a supposedly Dropbox link found in a spammed message with voicemail.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware is related to a spam run that displays a malicious link which leads to the download of KULUOZ malware.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more

  • This malware was used in a spam campaign that uses Dropbox as a social engineering lure in order for users to click the related links. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware was used in a spam campaign that uses Dropbox as a social engineering lure in order for users to click the related links. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more

  • This malware is a PowerShell scripting file that downloads and launches the final payload BKDR_PRESHIN.JTT.
    Read more

  • This malware is involved in the attack that was discovered to take advantage of Windows Powershell on May 2014. Victims of this malware may find the security of their systems compromised.
    Read more

  • This ransomware uses Windows PowerShell to encrypt files.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

Connect with us on