Malware
This ransomware is delivered via the Magnitude exploit kit exploiting the Adobe Flash Player vulnerability CVE-2016-1019.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreSAMSAM is the latest ransomware variant that hit healthcare industry, specifically the Kentucky Hospital. Based on reports, this malware is distributed via unpatched servers, instead of the usual infection vectors such as malicious websites or email attachments.
Read moreSAMSAM is the latest ransomware variant that hit healthcare industry, specifically the Kentucky Hospital. Based on reports, this malware is distributed via unpatched servers, instead of the usual infection vectors such as malicious websites or email attachments.
Read moreThis is the detection for the malicious app dubbed as "InstaCare" that steals user's Instagram account information. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreKnown as PETYA crypto-ransomware, this malware displays ransom notes at system startup and overwrites Master Boot Record (MBR). It also abuses the cloud storage service, Dropbox for its infection vector.
Read moreKnown as PETYA crypto-ransomware, this malware displays ransom notes at system startup and overwrites Master Boot Record (MBR). It also abuses the cloud storage service, Dropbox for its infection vector.
Read moreThis new ransomware variant is known for the unique graphic designs of its ransom notes. Similar to other ransomware variants, it encrypts files and arrives via email.
Read moreThis new ransomware variant is known for the unique graphic designs of its ransom notes. Similar to other ransomware variants, it encrypts files and arrives via email.
Read moreThis malware was involved in the March 2016 compromise of a popular bittorent client website, where it was passed off as a legitimate upgrade installer. The first ransomware to exclusively target OSX machines, users affected by this malware may find their important files and documents useless and unopenable.
Read moreThis crypto-ransomware "speaks", apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|