• This file infector is embedded in an infected zip file served by a website hosted in North Korea.To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below.
    Read more   

  • This threat is related to attacks that used Android Same Origin Policy (SOP) vulnerability to target Facebook users. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This threat is related to attacks that used Android Same Origin Policy (SOP) vulnerability to target Facebook users. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This threat is a Master Boot Record (MBR) wiper that infected systems of a major Korean electric utility. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This threat is related to banking Trojans targeting South Korean banks that used Pinterest as their command and control (C&C) channel.To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more   

  • This is the detection for the infected .MSI files related to the URSNIF variant that steals information.
    Read more   

  • This is the detection for the infected .EXE and .
    Read more   

  • This is the new POS malware family known as LusyPOS, which has similar characteristics to Dexter and Chewbacca POS malware. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more   

  • This backdoor contains a list of user names and passwords which it uses in its attempt to grant access to the System Root folder of an infected machine. It also installs another backdoor on the system.
    Read more   

  • This is the Trend Micro detection for malicious files that belong to the malware family known as REGIN. REGIN is a multi-component malware that uses different files for its malicious functionalities and payload.
    Read more