• This malware is part of the 64-bit ZBOT samples that have been spotted to target 64-bit systems during January 2014. Users affected by this malware may find the security of their systems compromised and their critical personal information stolen (such as their online banking credentials).
    Read more   

  • This is a Cryptolocker variant that has propagation routines, enabling it to easily spread to other systems. The said routine is important since other CRILOCK variants do not exhibit the same behavior.
    Read more   

  • This malware is the final payload of an attack that utilized a zero-day vulnerability in Windows XP/Server 2003. Users affected by this malware may find the security of their systems compromised.
    Read more   

  • This malware exploits a Windows XP/Server 2003 zero-day vulnerability. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
    Read more   

  • This malware was used in the EvilGrab campaign, which targets victims in Japan and China.This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This malware is involved in the targeted attacks that took advantage of an unpatched Microsoft Office vulnerability, namely CVE-2013-3906, on November 2013. Victims of this malware may find the security of their systems compromised.
    Read more   

  • This malware is involved in the targeted attacks that took advantage of an unpatched Microsoft Office vulnerability, namely CVE-2013-3906, on November 2013. Victims of this malware may find the security of their systems compromised.
    Read more   

  • This CryptoLocker is downloaded by a ZeuS/ZBOT variant detected as TSPY_ZBOT.VNA.
    Read more   

  • This malware is involved in a ZBOT spam campaign that targeted British users. Once the malicious attachment is opened, it inevitable leads to the download of ZBOT malware into the affected system.
    Read more   

  • This malware is involved in the CryptoLocker ransomware malicious spam campaign spotted on October 2013. It is the malicious attachment that, when executed, downloads more malware onto the affected system.
    Read more