Malware
This malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
Read moreThis is macro-based malware that employed a bogus Air Canada e-ticket with an attached .DOC file.
Read moreThis variant is also known as CryptoWall 3.0.
Read moreThis malware is related to CryptoWall 3.0 attacks seen in March 2015.
Read moreThis malware is involved in the Cryptowall 3.0 attacks detected on March 2015.
Read moreThis malicious JavaScript downloads and executes a CryptoWall 3.0 ransomware variant and a FAREIT spyware.
Read moreThis malware is related to CryptoWall 3.0 attacks seen in March 2015.
Read moreThis malware is involved in Operation Woolen Goldfish, an advanced targeted attack campaign executed by threat actor Rocket Kitten and reported on March 2015. It steals personal information from affected system through keylogging.
Read moreThis malware is related to the discovery of the malicious use of the Insert and Link feature in Microsoft Office. Users affected by this malware may have malicious routines exhibited on their systems.
Read moreThis Trojan targets routers and attempts to log in to all the devices connected to the routers. It pretends to be an Adobe Flash update.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|