Malware
This Trojan is implicated in targeted attacks against several Israeli entities. The attackers are supposedly of Palestine origin.
Read moreThis backdoor is loaded onto an affected system via malicious macro code. With its backdoor capabilities, users affected by this malware may find the security of their systems compromised.
Read moreThis malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
Read moreThis iOS malware is related to the SEDNIT malware family. It is specifically designed for espionage on iOS devices.
Read moreThis UPATRE variant is used by DYRE banking malware to arrive in systems via spam emails. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware which is downloaded by DYRE banking malware, has the capability to compose email messages in Microsoft Outlook with the UPATRE malware attached.To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.
Read moreThis mew malware is related to the release of the Njw0rm malware source code found in early January 2015.To get a one-glance comprehensive view of the behavior of this Hacking Tool, refer to the Threat Diagram shown below.
Read moreThis mew malware is related to the release of the Njw0rm malware source code found in early January 2015.To get a one-glance comprehensive view of the behavior of this Hacking Tool, refer to the Threat Diagram shown below.
Read moreThis malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
Read moreThis malware was discovered to be involved in a series of malicious campaigns that found victims in Europe, China, Middle East, Africa, India, and Latin America on late January 2015. It comes as an attachment to a spammed mail and downloads a cryptolocker variant onto affected systems.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|