• This malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox. It uses Dropbox to update its C&C settings in order to listen and perform commands from a remote malicious user.
    Read more   

  • This is a malware that downloads and installs malicious apps onto any Android device connected to the affected PC. The apps are malicious versions of online banking apps, which could compromise a user’s online banking account.
    Read more   

  • This ZeuS variant uses random headers and changes its file extension to make detection arduous. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more   

  • This malware is the final payload of the ZeuS variant that uses random headers to make detection difficult. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This ZeuS variant uses random headers and changes its file extension, making it difficult to detect.To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more   

  • This is the first mobile ransomware that uses Tor, a legitimate service that allows for concealed server connections. Users with mobile devices affected by this malware may find the files stored in their mobile device rendered useless and held for ransom.
    Read more   

  • This malware is related to the SMS spam attack that affected users in Taiwan. Once installed, the malicious app may send SMS, as well as intercept incoming ones.
    Read more   

  • This CryptoWall ransomware can be downloaded from a supposedly Dropbox link found in a spammed message with voicemail.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware is related to a spam run that displays a malicious link which leads to the download of KULUOZ malware.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This malware was used in a spam campaign that uses Dropbox as a social engineering lure in order for users to click the related links. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more