Malware
This cryptoransomware variant was discovered to be involved in a series of malicious campaigns that found victims in Europe, China, Middle East, Africa, India, and Latin America on late January 2015. It encrypts files using various file extensions.
Read moreThis PlugX variant is found in compromised releases of some legitimate online games.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis file infector is embedded in an infected zip file served by a website hosted in North Korea.To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below.
Read moreThis threat is related to attacks that used Android Same Origin Policy (SOP) vulnerability to target Facebook users. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis threat is related to attacks that used Android Same Origin Policy (SOP) vulnerability to target Facebook users. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis threat is a Master Boot Record (MBR) wiper that infected systems of a major Korean electric utility. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis threat is related to banking Trojans targeting South Korean banks that used Pinterest as their command and control (C&C) channel.To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
Read moreThis is the detection for the infected .MSI files related to the URSNIF variant that steals information.
Read moreThis is the detection for the infected .EXE and .
Read moreThis is the new POS malware family known as LusyPOS, which has similar characteristics to Dexter and Chewbacca POS malware. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|