• This BANLOAD variant checks for the presence of G-buster Plugin, a plugin that prevents malicious code from running during a banking session, on the system. It does this to indicate if the system is being used for online banking.
    Read more   

  • This BANKER variant is downloaded on the system by TROJ_BANLOAD.GB, a malware that targets Banco de Brasil users.
    Read more   

  • This malware uses an AutoIT packer, a scripting language leveraged by cybercriminals. It has the capability to propagate via drives and steals user names and passwords from Yahoo, Hotmail, and Pidgin among others.
    Read more   

  • This malware uses an AutoIT packer, a scripting language leveraged by cybercriminals. When executed, it steals system-related information and gathers stored user names and passwords from certain browsers.
    Read more   

  • This ZBOT variant drops a configuration file that contains a list of its targeted banks and other financial sites. It also steals information from different FTP sites and steals personal certificates from the infected system.
    Read more   

  • This malware is part of the 64-bit ZBOT samples that have been spotted to target 64-bit systems during January 2014. Users affected by this malware may find the security of their systems compromised and their critical personal information stolen (such as their online banking credentials).
    Read more   

  • This malware is part of the 64-bit ZBOT samples that have been spotted to target 64-bit systems during January 2014. Users affected by this malware may find the security of their systems compromised and their critical personal information stolen (such as their online banking credentials).
    Read more   

  • This is a Cryptolocker variant that has propagation routines, enabling it to easily spread to other systems. The said routine is important since other CRILOCK variants do not exhibit the same behavior.
    Read more   

  • This malware is the final payload of an attack that utilized a zero-day vulnerability in Windows XP/Server 2003. Users affected by this malware may find the security of their systems compromised.
    Read more   

  • This malware exploits a Windows XP/Server 2003 zero-day vulnerability. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
    Read more