Malware
Makers of this ransomware scares users by claiming that it posts online all files that it locks and encrypts. It also invites its victims to be affiliated with its makers.
Read moreThis malware is related to the DRIDEX spam runs that used financial matters as its social engineering ploy. These spam emails have Word and Excel file documents which contain the macro that downloads DRIDEX.
Read moreThis spyware is one of the many DRIDEX variants that have been found in spam runs in November 2015. The said spam runs were observed after the takedown of a DRIDEX botnet.
Read moreThis malware is related to the DRIDEX spam runs that used financial matters as its social engineering ploy. These spam emails have Word and Excel file documents which contain the macro that downloads DRIDEX.
Read moreThis malware is related to the DRIDEX spam runs that used financial matters as its social engineering ploy. These spam emails have Word and Excel file documents which contain the macro that downloads DRIDEX.
Read moreThis spyware is one of the many DRIDEX variants that have been found in spam runs in November 2015. The said spam runs were observed after the takedown of a DRIDEX botnet.
Read moreThis malware is the payload for the Adobe Flash zero-day exploit (assigned with CVE-2015-7645) which is used in the cyberespionage campaign, Pawn Storm. In addition, the Angler Exploit Kit has reportedly integrated CVE-2015-7645.
Read moreThis malware leverages Moplus SDK to automatically and periodically deploy unwanted applications onto Android devices. Moplus SDK has been found out to include backdoor capabilities.
Read moreThis malware launched distributed denial of service (DDoS) attacks to a number of gaming- and education-related websites. Its communication with its servers are encrypted via XOR, hence the name.
Read moreThis malware is the payload for the malvertising campaign that affected around 3,000 Japanese websites. The said attack uses Angler kit which leveraged vulnerabilities in Internet Explorer and Adobe Flash Player.
Read more