• This is the detection for the Java zero-day exploit (designated with CVE-2015-2590) that was used in the targeted attack campaign, Operation Pawn Storm. Once successfully exploited, it downloads another malware detected as TROJ_DROPPR.
    Read more   

  • This is the detection for the second stage malware related to the new Java zero-day exploit which was used in the targeted attack campaign, Operation Pawn Storm. In the second stage of the attack, it downloads this malware, which serves as a dropper of .
    Read more   

  • The malicious files <i>flash32.exe</i> and <i>kbflashUpd.
    Read more   

  • The malicious files <i>flash32.exe</i> and <i>kbflashUpd.
    Read more   

  • Exploit kits such as Angler Exploit Kit and Nuclear Exploit Pack have been updated to include one of the recent Hacking Team Flash zero-day vulnerabilities. Magnitude Exploit kit, in particular, includes CVE-2015-5119 to its exploits.
    Read more   

  • This is the detection for the payload related to the Hacking Team Flash zero-day affecting latest version of Flash in Windows, Mac, and Linux. Once this zero-day vulnerability has been successfully exploited, it downloads this malware.
    Read more   

  • This is the detection for the exploit that targets the Adobe zero-day vulnerability covered in CVE-2015-5119. The said vulnerability affects the latest versions of Flash on Windows, Mac, and Linux.
    Read more   

  • This is the detection for the latest variant of Tinba that hit certain countries in Europe. Tinba is dubbed as smallest banker Trojan due to its file size.
    Read more   

  • This backdoor is implicated in the 2015 compromise of the German parliament, also known as Bundestag. This malware connects to a specific C&C server that we believe was controlled by Operation Pawn Storm during extended periods from February 2014 - February 2015.
    Read more   

  • This is one of the Trend Micro detections on the recent Stegoloader malware that affected healthcare organizations in North America. Steganography is a technique where malicious codes are embedded in image files to avoid detection.
    Read more