• This malware uses DLL preloading, a technique more known to be utilized by PlugX.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This is the detection for exploit codes that takes advantage of a vulnerability in the hosting control panel Plesk.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This is involved in an exploit attack targeting a critical vulnerability of Ruby on Rails. It connects to an IRC server where it can receive and perform commands from remote malicious attackers, as well as make the affected system part of its botnet.
    Read more   

  • Spammers take advantage of the news regarding the supposedly merging of Skype, Hotmail, and MSN to lure users into downloading this malware. The spammed message includes a URL that points to this malware posing as an authorized certificate.
    Read more   

  • This malware propagates by creating copies of itself in password-protected archives. It also downloads other malware onto the systems it infects, causing malicious routines to be exhibited.
    Read more   

  • This malware was involved in a malicious spam attack targeting Walmart customers on May 2013. It takes advantage of certain vulnerabilities to download and execute malware onto affected systems, causing malicious routines to be exhibited.
    Read more   

  • This malware was involved in an attack targeting Banco de Brasil users during May 2013. It came bundled as a plugin for a customized banking browser.
    Read more   

  • This malicious script was inserted onto a legitimate website of the US Department of Labor and downloads a Poison Ivy backdoor.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This backdoor was downloaded by a malicious script hosted on a compromised website of the US Department of Labor.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This malware uses multi-protocol instant-messaging applications in order to propagate itself. It also has backdoor routines that steal login information from the affected system's browsers.
    Read more