Malware
This malware is involved in the Backoff PoS malware attack discovered in August 2014. It has the ability to steal financial information from infected devices.
Read moreThis ransomware uses the GNU Privacy Guard application, a legitimate app in order to encrypt files. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis backdoor was hosted in the compromised Gizmodo Brazil website. It starts out as a fake Adobe Flash Player download.
Read moreThis variant of Cryptolocker encrypts files with specific file sizes. This routine impacts files with smaller file sizes such as documents and text files.
Read moreThis CryptoLocker variant uses Tor to mask its C&C communications.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware is involved in the socially-engineered attack that took advantage of the July 2014 Flight MH17 tragedy. Users affected by this malware may have their personal information stolen and their systems infected with other malicious files.
Read moreThis malware is a new derivative of the Gameover Zeus. It uses both Domain Generation Algorithm (DGA) and a "fast flux" tactic to obscure C&C servers.
Read moreThis ZEUS/ZBOT variant is found to be distributed via spam campaign in mid-2014. The spammed messages in the said campaign used a certain file storage service.
Read moreThis spyware sniffs network packets to steal information. It arrives via spammed messages aimed at German online banking users.
Read moreThis malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox. It uses Dropbox to update its C&C settings in order to listen and perform commands from a remote malicious user.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|