Malware
This mobile malware is capable of mining specific cryptocurrencies via mobile.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware is part of an attempted PHP backdoor attack via spam that took place on March 2014. Users affected by this malware would be shown a user interface of the malware's control panel, which shows its backdoor capabilities.
Read moreTo get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This malware mines bitcoins via mobile devices.
Read moreThis threat, dubbed as BitCrypt, is a ransomware that steals funds from various cryptocurrency wallets. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis threat, dubbed as BitCrypt, is a ransomware that steals funds from various cryptocurrency wallets. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis threat downloads TROJ_CRIBIT.B, a ransomware that steals funds from various cryptocurrency wallets.
Read moreThis malware is noteworthy due to the click fraud routines it exhibits as an entirely new strain of ZBOT. It is capable of opening browser windows and perform mouse actions without user intervention.
Read moreThis is the first Android malware discovered to abuse the TOR network in order to conceal its connection to its C&C server. Users affected by this malware may find the security of their mobile devices compromised.
Read moreThis malware runs a certain command that disables Windows Firewall depending on the operating system version. It elevates certain privileges when not in Admin mode.
Read moreThis malware uses Malaysia Airlines Flight 370 as its social engineering lure.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read more