Malware
These malicious apps are found to gather account information from users' devices, including Google, Facebook, and Twitter account details. These apps use various social engineering techniques in order to appear legitimate on Google Play.
Read moreThis malware is downloaded by TSPY_ZBOT.YYKE, a malware related to the new UPATRE variant that uses the 'spam within the spam' technique.
Read moreThis malware is downloaded by TSPY_ZBOT.YYKE, a malware related to the new UPATRE variant that uses the 'spam within the spam' technique.
Read moreThis malware leverages a macro-enabled word document as a malicious spam attachment in order to infect machines with a backdoor. The spammed email message is related to payment remittance.
Read moreThis malware is downloaded by W97M_SHELLHIDE.B, which is related to the attack leveraging a macro-enabled word document as a malicious spam attachment.
Read moreThis malware is related to the new spam technique wherein a mail has an.MSG attachment.
Read moreThis ZBOT variant is related to a spam run in which its technique involves spammed messages containing .MSG attachment that contains a .
Read moreThis ZBOT variant is embedded in a .DOCM or macro-enabled document file, which arrives as spammed email attachment.
Read moreThis malware is involved in an April 2014 attack that leveraged a macro-enabled word document as a malicious spam attachment in order to infect machines with ZBOT malware. Users affected by this malware may find their online banking accounts compromised.
Read moreOne of the Windows malware related to the Careto attack known for encoding its configuration data and encrypting its network traffic thus making analysis difficult.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|