• This malware is a cross-platform threat, affecting both Android and Windows.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware is related to the Whitehole Exploit Kit attacks during February 2012. It takes advantage of certain vulnerabilities in Java to download and execute backdoor malware onto the affected system.
    Read more   

  • This malware disguises as delivery receipts for well-known postal and delivery services firms and airlines.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This backdoor is a new variant of the malware family CARBERP. It downloads and installs new plug-ins from its remote server thus compromising the security of the infected systemsThis backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This backdoor is a new variant of the malware family CARBERP. It downloads and installs new plug-ins from its remote server thus compromising the security of the infected systemsTo get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This malware targets systems running on Linux. It allows remote access of affected systems through the use of SSH (Secure Shell Protocol) and steals system login credentials.
    Read more   

  • This is a keylogger found inside a spammed email message that purports to come from the Cabinet Office Information Systems Office.To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more   

  • This malware spams messages to users using Skype in order to propagate. The spammed messages contain links that lead to an automatic download of the malware itself.
    Read more   

  • This malware spams messages to users using Skype in order to propagate. The spammed messages contain links that lead to an automatic download of the malware itself.
    Read more   

  • The malware tags the affected users' friends in Facebook and posts a message with a malicious link.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more