• This malware is involved in the CryptoLocker ransomware malicious spam campaign spotted on October 2013. It is the malicious attachment that, when executed, downloads more malware onto the affected system.
    Read more   

  • This malware makes use of “garbage” strings, which in actual hides the malicious code. The said malicious code is an obfuscated AutoIt script.
    Read more   

  • This malware is one of the latest ransomware variants known as cryptolockers. When executed, it encrypts files and displays a warning message informing users that even though the malware has been deleted on their system, the encrypted files are inaccessible.
    Read more   

  • This backdoor is a variant of the malware family BLYPT. It uses binary large objects (BLOB) to store information in the affected system's registry.
    Read more   

  • This backdoor is a variant of the malware family BLYPT. It uses binary large objects (BLOB) to store information in the affected system's registry.
    Read more   

  • This is the malware associated with the fake WhatsApp notification. Once users click on the Play button in the said email, they are lead to a multi-platform malware that can execute on Windows, iOS, and Android devices.
    Read more   

  • This malware is associated with the reported increase in the number of Tor users. It has the capability to execute commands and download adware on to the infected system.
    Read more   

  • This backdoor is the detection for malicious attachments in email messages that spoof the 2013 G20 Summit in Russia. Users with systems affected by this malware may find their personal information stolen and the security of their systems compromised.
    Read more   

  • This backdoor is related to the Sykipot campaign that targets the United States civil aviation sector. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This backdoor is used by cybercriminals to brute-force many WordPress blogs via logging into administrator pages. When executed, it connects to a C&C server, where it downloads the list of sites to target and the passwords to use to brute-force it.
    Read more