• This malware is the detection for the zero-day exploit leveraging the vulnerability covered under CVE-2014-4114, also known as Sandworm.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware is downloaded by the zero-day exploit leveraging the vulnerability covered under CVE-2014-4114, also known as "Sandworm."To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware is the payload of the exploit related to Sandworm zero-day vulnerability. The said vulnerability has been covered in MS14-060 and believed to be used in cyber attacks against European sectors and industries.
    Read more   

  • This malware is the Dyre banking Trojan, also known as “Dyreza."To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more   

  • This malware was involved in the September 2014 ATM hacking attacks involving Malaysian banks. Systems affected by this malware can be considered compromised, and organizations using these systems may find their finances being affected.
    Read more   

  • This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote user.
    Read more   

  • This malware is an IRC (Internet Relay Chat) bot that leverages the Bash bug vulnerability, also known as Shellshock. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote user.
    Read more   

  • This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote user.
    Read more   

  • This malware is involved in the Bash Vulnerability Exploit attack of September 2014. It is capable of compromising an affected system's security by carrying out commands made by a malicious remote user.
    Read more