• This malware is involved in a malicious spam campaign leveraging the April 2013 Boston Marathon Bombing. It takes advantage of certain software vulnerabilities to download malicious files onto the affected system.
    Read more   

  • This malware is involved in a malicious spam campaign leveraging the April 2013 Boston Marathon Bombing. It has the ability to steal login credentials to File Transfer Protocol (FTP) clients or file manager software installed in the affected system, as well as receive and perform commands from remote malicious users.
    Read more   

  • This malware intercepts network traffic accessing Facebook and redirects it to a fraudulent page that will lead users in entering their credit card information. Users affected by this malware may find their financial accounts compromised.
    Read more   

  • This malware connects to Evernote to receive and perform commands from remote malicious users. Users affected by this malware may find the security of their systems compromised.
    Read more   

  • This malware is involved in the cyber attacks that targeted specific users in South Korea during March of 2013. It enters systems through a spammed mail purporting to come from a major banking organization.
    Read more   

  • This malware is involved in the Master Boot Record (MBR) wiper outbreak that targeted users in South Korea during March of 2013. It has a destructive payload that wipes the affected system's MBR.
    Read more   

  • This malware is involved in the Master Boot Record (MBR) wiper outbreak that targeted users in South Korea during March of 2013.It drops and executes malware on affected systems, including a destructive payload that wipes the affected system's MBR.
    Read more   

  • This spyware is distributed through ATO tax spam.To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more   

  • This malware is involved in certain targeted attacks that took place on March 2013. It drops and opens non-malicious document files to hide its backdoor routines.
    Read more   

  • This malware takes advantage of a zero-day Java vulnerability. Once it successfully exploited the vulnerability, it downloads and execute an McRAT backdoor.
    Read more