• This malware family takes its name from the SIMDA botnet operations, which was taken down in April 2015.This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This malware, which is known for its HOSTS file modification routines, is related to the SIMDA botnet. Last April 2015, Trend Micro together with Cyber Defense Institute, Interpol, and other security vendors collaborated for the takedown of the said botnet.
    Read more   

  • This malware is involved in the targeted attack incident that shut down a global French-language television network on April 2015. Users affected by this malware may find the security of their systems compromised.
    Read more   

  • This crypto-ransomware encrypts files and appends an extension that may look like it is a quarantined file. Quarantined files are usually done by anti-malware products.
    Read more   

  • This malware has been seen in campaigns that target the energy sector.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This malware has been seen in campaigns that target the energy sector.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This is the Trend Micro detection for the SDK found in possibly thousands of apps once hosted in Google Play. Most of these apps have been since removed.
    Read more   

  • This Point-of-Sale(PoS) malware was discovered on April 2015 attempting to target certain US-based airports. PoS devices infected by this malware should be considered compromised due to its info-stealing routines.
    Read more   

  • This malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
    Read more   

  • This is macro-based malware that employed a bogus Air Canada e-ticket with an attached .DOC file.
    Read more