Malware
This is the Trend Micro detection for Trojanized apps that belong to the Wirelurker malware family.This Trojan may arrive bundled with malware packages as a malware component.
Read moreThe Wirelurker malware was seen affecting both OS X and iOS devices.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware is involved in the DRIDEX malspam campaign that was spotted in early November 2014. It purports itself as a word document with malicious macro code that then downloads DRIDEX onto the affected system.
Read moreThis spyware arrives as an attachment to spammed messages. It arrives as a malicious macro code.
Read moreThis malware is a malicious plugin for Chrome browsers. It runs a code when users browse Facebook, enabling the plugin to control navigation.
Read moreThis malware figures in a Shellshock-related SMTP attack. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis Trojan comes from a malware family that employs evasion tactics such as checking if it is running in a virtual environment. This malware is linked to the FlashPack exploit kit.
Read moreThis malware figures in a Shellshock-related SMTP attack.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis is a malicious PowerPoint file, whose final payload is slide1.gif, TROJ_TALERET.
Read moreThis Trojan is the final malware delivered in an attack that exploits the CVE-2014-4114 vulnerability. This Trojan is known to come from a malware family used in targeted attacks against Taiwan-based entities.
Read more