• This malware has been seen in campaigns that target the energy sector.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This malware has been seen in campaigns that target the energy sector.This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This is the Trend Micro detection for the SDK found in possibly thousands of apps once hosted in Google Play. Most of these apps have been since removed.
    Read more   

  • This Point-of-Sale(PoS) malware was discovered on April 2015 attempting to target certain US-based airports. PoS devices infected by this malware should be considered compromised due to its info-stealing routines.
    Read more   

  • This malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
    Read more   

  • This is macro-based malware that employed a bogus Air Canada e-ticket with an attached .DOC file.
    Read more   

  • This variant is also known as CryptoWall 3.0.
    Read more   

  • This malware is related to CryptoWall 3.0 attacks seen in March 2015.
    Read more   

  • This malware is involved in the Cryptowall 3.0 attacks detected on March 2015.
    Read more   

  • This malicious JavaScript downloads and executes a CryptoWall 3.0 ransomware variant and a FAREIT spyware.
    Read more