Malware
This is the malware associated with the fake WhatsApp notification. Once users click on the Play button in the said email, they are lead to a multi-platform malware that can execute on Windows, iOS, and Android devices.
Read moreThis malware is associated with the reported increase in the number of Tor users. It has the capability to execute commands and download adware on to the infected system.
Read moreThis backdoor is the detection for malicious attachments in email messages that spoof the 2013 G20 Summit in Russia. Users with systems affected by this malware may find their personal information stolen and the security of their systems compromised.
Read moreThis backdoor is related to the Sykipot campaign that targets the United States civil aviation sector. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis backdoor is used by cybercriminals to brute-force many WordPress blogs via logging into administrator pages. When executed, it connects to a C&C server, where it downloads the list of sites to target and the passwords to use to brute-force it.
Read moreThis is the Trend Micro detection for KINS Trojan, dubbed as the next ZeuS by media reports. Similar to ZeuS/ZBOT, it downloads configuration file and steals online banking credentials.
Read moreThis ZBOT variant was used in a spam run which takes advantage of the UK Tax Return deadline. The said spam message purports to come from HM Revenue and Customs in the UK and informs users of a certain VAT return receipt.
Read moreThis ZBOT variant was used in a spam run which takes advantage of the UK Tax Return deadline. The said spam message purports to come from HM Revenue and Customs in the UK and informs users of a certain VAT return receipt.
Read moreThis malware was found to be hosted on certain compromised South Korean websites. Aside from stealing credentials from specific online games, it also downloads a backdoor detected as BKDR_TENPEQ.
Read moreThis spyware is related to the bogus project dubbed as flashplayerwindows.When executed, it connects to Google Code to download other files.
Read more
Rule ID | Rule Description | Confidence Level | DDI Default Rule | Network Content Inspection Pattern Release Date |
---|