• This malicious .DOC file entitled "Violent terror attack" took advantage of the mass stabbing incident in Kunming, China in early March 2014, as social engineering bait.
    Read more   

  • This malware is dropped by the malicious .DOC file, TROJ_EXPLOYT.
    Read more   

  • This OSX malware was used in the targeted attack campaign named Careto. The attack was noted for encoding its configuration data and encrypting its network traffic.
    Read more   

  • This malware arrives as an unusual malicious attachment. It displays a fake and malicious error message when uncompressed and executed.
    Read more   

  • This malware is involved in a socially-engineered spam campaign leveraging the popularity of messaging application, WhatsApp. It is offered as a download of the alleged 'desktop' version of the app.
    Read more   

  • This malware is related to the zero-day exploit on Adobe Flash Player (CVE-2014-0502) detected as SWF_EXPLOYT.LPE.
    Read more   

  • This malware was involved in the Adobe Flash Player zero-day exploit incident reported on February 2014. It would automatically download onto users' systems once the user browsed a compromised website.
    Read more   

  • This ransomware specifically targets Turkish users. It arrives as a spammed message informing users about a billing invoice update.
    Read more   

  • This malicious HTML file is related to the zero-day vulnerability in Internet Explorer 9 and 10, or CVE-2014-0322. The vulnerability makes use of a "hybrid exploit" where the malicious exploit code is split between JavaScript and Adobe Flash.
    Read more   

  • This malware exploits a zero-day vulnerability in some versions of Internet Explorer. Once successfully exploited, it drops a backdoor on the vulnerable computer.
    Read more