Malware
This is the detection for another variant of ransomware dubbed as “magic ransomware,” which may be the updated version of EDA2. EDA2 is an open source ransomware created by Utkusen.
Read moreThis is the Trend Micro detection for the latest variant of ransomware that is written in JavaScript. Based on reports, it has capabilities to run on Windows, Mac OS X and Linux.
Read moreThis malware is related to the compromised blog page of the UK news media website, "The Independent." Users who visited the hacked page are redirected to sites hosting Angler Exploit Kit.
Read moreMakers of this ransomware scares users by claiming that it posts online all files that it locks and encrypts. It also invites its victims to be affiliated with its makers.
Read moreThis malware is related to the DRIDEX spam runs that used financial matters as its social engineering ploy. These spam emails have Word and Excel file documents which contain the macro that downloads DRIDEX.
Read moreThis spyware is one of the many DRIDEX variants that have been found in spam runs in November 2015. The said spam runs were observed after the takedown of a DRIDEX botnet.
Read moreThis malware is related to the DRIDEX spam runs that used financial matters as its social engineering ploy. These spam emails have Word and Excel file documents which contain the macro that downloads DRIDEX.
Read moreThis malware is related to the DRIDEX spam runs that used financial matters as its social engineering ploy. These spam emails have Word and Excel file documents which contain the macro that downloads DRIDEX.
Read moreThis spyware is one of the many DRIDEX variants that have been found in spam runs in November 2015. The said spam runs were observed after the takedown of a DRIDEX botnet.
Read moreThis malware is the payload for the Adobe Flash zero-day exploit (assigned with CVE-2015-7645) which is used in the cyberespionage campaign, Pawn Storm. In addition, the Angler Exploit Kit has reportedly integrated CVE-2015-7645.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|