• This malware leverages Moplus SDK to automatically and periodically deploy unwanted applications onto Android devices. Moplus SDK has been found out to include backdoor capabilities.
    Read more   

  • This malware launched distributed denial of service (DDoS) attacks to a number of gaming- and education-related websites. Its communication with its servers are encrypted via XOR, hence the name.
    Read more   

  • This malware is the payload for the malvertising campaign that affected around 3,000 Japanese websites. The said attack uses Angler kit which leveraged vulnerabilities in Internet Explorer and Adobe Flash Player.
    Read more   

  • This malware, discovered late September 2015, lets attackers force an ATM to dispense cash without proper authorization. It also has the capability to delete itself from the infected system to prevent detection.
    Read more   

  • This malware is a new PoS malware discovered by Trend Micro late September 2015 to be targeting US SMBs in particular. Systems affected by this malware may be considered to be compromised due to its backdoor routines.
    Read more   

  • This is the detection for the Katrina point-of-sale (PoS) malware.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This is one of the samples related to the Neutrino bot or Kasidet. Its code was leaked in the underground forum last July 2015.
    Read more   

  • This is one of the samples related to the Neutrino bot or Kasidet. Its code was leaked in the underground forum last July 2015.
    Read more   

  • This is one of the samples related to the Neutrino bot or Kasidet. Its code was leaked in the underground forum last July 2015.
    Read more   

  • This is the latest CARBANAK variant reportedly related to the compromised Microsoft Windows client. CARBANAK is a malware family that hits banks and financial organizations.
    Read more