Malware
This Point-of-Sale(PoS) malware was discovered on April 2015 attempting to target certain US-based airports. PoS devices infected by this malware should be considered compromised due to its info-stealing routines.
Read moreThis malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
Read moreThis is macro-based malware that employed a bogus Air Canada e-ticket with an attached .DOC file.
Read moreThis variant is also known as CryptoWall 3.0.
Read moreThis malware is related to CryptoWall 3.0 attacks seen in March 2015.
Read moreThis malware is involved in the Cryptowall 3.0 attacks detected on March 2015.
Read moreThis malicious JavaScript downloads and executes a CryptoWall 3.0 ransomware variant and a FAREIT spyware.
Read moreThis malware is related to CryptoWall 3.0 attacks seen in March 2015.
Read moreThis malware is involved in Operation Woolen Goldfish, an advanced targeted attack campaign executed by threat actor Rocket Kitten and reported on March 2015. It steals personal information from affected system through keylogging.
Read moreThis malware is related to the discovery of the malicious use of the Insert and Link feature in Microsoft Office. Users affected by this malware may have malicious routines exhibited on their systems.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|