Malware
This is the first Android malware discovered to abuse the TOR network in order to conceal its connection to its C&C server. Users affected by this malware may find the security of their mobile devices compromised.
Read moreThis malware runs a certain command that disables Windows Firewall depending on the operating system version. It elevates certain privileges when not in Admin mode.
Read moreThis malware uses Malaysia Airlines Flight 370 as its social engineering lure.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis malicious .DOC file entitled "Violent terror attack" took advantage of the mass stabbing incident in Kunming, China in early March 2014, as social engineering bait.
Read moreThis malware is dropped by the malicious .DOC file, TROJ_EXPLOYT.
Read moreThis OSX malware was used in the targeted attack campaign named Careto. The attack was noted for encoding its configuration data and encrypting its network traffic.
Read moreThis malware arrives as an unusual malicious attachment. It displays a fake and malicious error message when uncompressed and executed.
Read moreThis malware is involved in a socially-engineered spam campaign leveraging the popularity of messaging application, WhatsApp. It is offered as a download of the alleged 'desktop' version of the app.
Read moreThis malware is related to the zero-day exploit on Adobe Flash Player (CVE-2014-0502) detected as SWF_EXPLOYT.LPE.
Read moreThis malware was involved in the Adobe Flash Player zero-day exploit incident reported on February 2014. It would automatically download onto users' systems once the user browsed a compromised website.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|