Malware
This is the detection for the Java zero-day exploit (designated with CVE-2015-2590) that was used in the targeted attack campaign, Operation Pawn Storm. Once successfully exploited, it downloads another malware detected as TROJ_DROPPR.
Read moreThis is the detection for the second stage malware related to the new Java zero-day exploit which was used in the targeted attack campaign, Operation Pawn Storm. In the second stage of the attack, it downloads this malware, which serves as a dropper of .
Read moreThe malicious files <i>flash32.exe</i> and <i>kbflashUpd.
Read moreThe malicious files <i>flash32.exe</i> and <i>kbflashUpd.
Read moreExploit kits such as Angler Exploit Kit and Nuclear Exploit Pack have been updated to include one of the recent Hacking Team Flash zero-day vulnerabilities. Magnitude Exploit kit, in particular, includes CVE-2015-5119 to its exploits.
Read moreThis is the detection for the payload related to the Hacking Team Flash zero-day affecting latest version of Flash in Windows, Mac, and Linux. Once this zero-day vulnerability has been successfully exploited, it downloads this malware.
Read moreThis is the detection for the exploit that targets the Adobe zero-day vulnerability covered in CVE-2015-5119. The said vulnerability affects the latest versions of Flash on Windows, Mac, and Linux.
Read moreThis is the detection for the latest variant of Tinba that hit certain countries in Europe. Tinba is dubbed as smallest banker Trojan due to its file size.
Read moreThis backdoor is implicated in the 2015 compromise of the German parliament, also known as Bundestag. This malware connects to a specific C&amp;C server that we believe was controlled by Operation Pawn Storm during extended periods from February 2014 - February 2015.
Read moreThis is one of the Trend Micro detections on the recent Stegoloader malware that affected healthcare organizations in North America. Steganography is a technique where malicious codes are embedded in image files to avoid detection.
Read more