Malware
The Wirelurker malware was seen affecting both OS X and iOS devices.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware is involved in the DRIDEX malspam campaign that was spotted in early November 2014. It purports itself as a word document with malicious macro code that then downloads DRIDEX onto the affected system.
Read moreThis spyware arrives as an attachment to spammed messages. It arrives as a malicious macro code.
Read moreThis malware is a malicious plugin for Chrome browsers. It runs a code when users browse Facebook, enabling the plugin to control navigation.
Read moreThis malware figures in a Shellshock-related SMTP attack. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis Trojan comes from a malware family that employs evasion tactics such as checking if it is running in a virtual environment. This malware is linked to the FlashPack exploit kit.
Read moreThis malware figures in a Shellshock-related SMTP attack.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis is a malicious PowerPoint file, whose final payload is slide1.gif, TROJ_TALERET.
Read moreThis Trojan is the final malware delivered in an attack that exploits the CVE-2014-4114 vulnerability. This Trojan is known to come from a malware family used in targeted attacks against Taiwan-based entities.
Read moreThis spyware uploads documents it finds to a specific Google Drive location.This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|