Malware
This CryptoLocker variant uses Tor to mask its C&C communications.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware is involved in the socially-engineered attack that took advantage of the July 2014 Flight MH17 tragedy. Users affected by this malware may have their personal information stolen and their systems infected with other malicious files.
Read moreThis malware is a new derivative of the Gameover Zeus. It uses both Domain Generation Algorithm (DGA) and a "fast flux" tactic to obscure C&C servers.
Read moreThis ZEUS/ZBOT variant is found to be distributed via spam campaign in mid-2014. The spammed messages in the said campaign used a certain file storage service.
Read moreThis spyware sniffs network packets to steal information. It arrives via spammed messages aimed at German online banking users.
Read moreThis malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox. It uses Dropbox to update its C&C settings in order to listen and perform commands from a remote malicious user.
Read moreThis malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox. It uses Dropbox to update its C&C settings in order to listen and perform commands from a remote malicious user.
Read moreThis is a malware that downloads and installs malicious apps onto any Android device connected to the affected PC. The apps are malicious versions of online banking apps, which could compromise a user’s online banking account.
Read moreThis ZeuS variant uses random headers and changes its file extension to make detection arduous. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
Read moreThis malware is the final payload of the ZeuS variant that uses random headers to make detection difficult. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read more