• These malicious apps are found to gather account information from users' devices, including Google, Facebook, and Twitter account details. These apps use various social engineering techniques in order to appear legitimate on Google Play.
    Read more   

  • This malware is downloaded by TSPY_ZBOT.YYKE, a malware related to the new UPATRE variant that uses the 'spam within the spam' technique.
    Read more   

  • This malware is downloaded by TSPY_ZBOT.YYKE, a malware related to the new UPATRE variant that uses the 'spam within the spam' technique.
    Read more   

  • This malware leverages a macro-enabled word document as a malicious spam attachment in order to infect machines with a backdoor. The spammed email message is related to payment remittance.
    Read more   

  • This malware is downloaded by W97M_SHELLHIDE.B, which is related to the attack leveraging a macro-enabled word document as a malicious spam attachment.
    Read more   

  • This malware is related to the new spam technique wherein a mail has an.MSG attachment.
    Read more   

  • This ZBOT variant is related to a spam run in which its technique involves spammed messages containing .MSG attachment that contains a .
    Read more   

  • This ZBOT variant is embedded in a .DOCM or macro-enabled document file, which arrives as spammed email attachment.
    Read more   

  • This malware is involved in an April 2014 attack that leveraged a macro-enabled word document as a malicious spam attachment in order to infect machines with ZBOT malware. Users affected by this malware may find their online banking accounts compromised.
    Read more   

  • One of the Windows malware related to the Careto attack known for encoding its configuration data and encrypting its network traffic thus making analysis difficult.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more