• This malware variant is designed to compromise Apple OS X systems. It drops files for its keylogging routine in order to steal information from the affected system.
    Read more   

  • This malware is the new variant of BlackPOS malware that targets certain retail accounts. It also poses as an AV software service for its evasion tactic.
    Read more   

  • This malware is related to an attack that took advantage of legitimate services like Google Drive and Dropbox in order to look less suspicious to unwary users.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This malware is involved in the Backoff PoS malware attack discovered in August 2014. It has the ability to steal financial information from the devices it infects.
    Read more   

  • This malware is involved in the Backoff POS malware attack discovered in August 2014. It has the ability to steal financial information from infected devices.
    Read more   

  • This malware is involved in the Backoff PoS malware attack discovered in August 2014. It has the ability to steal financial information from infected devices.
    Read more   

  • This ransomware uses the GNU Privacy Guard application, a legitimate app in order to encrypt files. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This backdoor was hosted in the compromised Gizmodo Brazil website. It starts out as a fake Adobe Flash Player download.
    Read more   

  • This variant of Cryptolocker encrypts files with specific file sizes. This routine impacts files with smaller file sizes such as documents and text files.
    Read more   

  • This CryptoLocker variant uses Tor to mask its C&C communications.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more