Malware
This USTEAL variant drops a ransomware detected as TROJ_RANSOM.SMAR, which is created by a new toolkit builder.
Read moreThis malware is the final payload of a USTEAL variant that was reported on late April 2014. It encrypts certain files detected on the affected system and demands the user pay the ransom to have them restored.
Read moreThis malicious Adobe Flash file is related to the Adobe zero-day vulnerability, <i><a href="http://about-threats.trendmicro.
Read moreThis malware uses the exploit targeting (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution (2814124) vulnerability. The said exploit was found to be the payload of a series of redirections that started from a website on how to avoid income tax in Canada.
Read moreIt is a malicious attachment related to a tax-themed spam campaign. The malware connects to malicious URLs to download an encrypted version of a ZBOT variant, which disables the antivirus products installed in the system.
Read moreThis malware exploits the (MS13-022) Vulnerability in Silverlight Could Allow Remote Code Execution (2814124) vulnerability to run malicious code on a system through a specially-crafted app. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware is the attached payload of a socially-engineered malicious spam themed after the South Korea Ferry tragedy. Discovered on April 2014, it is detected to receive and execute commands from a remote malicious user.
Read moreThis old remote access Trojan (RAT) can be found as attachments to spammed messages related to financial matters.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis malware is related to the spammed message that purported to come from Starbucks. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
Read moreThese malicious apps are found to gather account information from users' devices, including Google, Facebook, and Twitter account details. These apps use various social engineering techniques in order to appear legitimate on Google Play.
Read more