• This is one of the samples related to the Neutrino bot or Kasidet. Its code was leaked in the underground forum last July 2015.
    Read more   

  • This is one of the samples related to the Neutrino bot or Kasidet. Its code was leaked in the underground forum last July 2015.
    Read more   

  • This is the latest CARBANAK variant reportedly related to the compromised Microsoft Windows client. CARBANAK is a malware family that hits banks and financial organizations.
    Read more   

  • This is the latest CARBANAK variant reportedly related to the compromised Microsoft Windows client. CARBANAK is a malware family that hits banks and financial organizations.
    Read more   

  • This malware is related to the attack on certain banking organizations in Japan on late August/Early September 2015. Users with systems affected by this malware may find their online banking accounts compromised.
    Read more   

  • This malware is related to an active campaign that compromised Japanese websites and used these as C&C servers of EMDIVI Backdoor. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3839. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat Diagram shown below.
    Read more   

  • This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3840. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat Diagram shown below.
    Read more   

  • This malware is the payload for the BIND Denial of Service vulnerability assigned with CVE-2015-5477. Once this vulnerability is successfully exploited, it could launch denial of service attacks.
    Read more   

  • This malware is the payload for the BIND Denial of Service vulnerability assigned with CVE-2015-5477. Once this vulnerability is successfully exploited, it could launch denial of service attacks.
    Read more