• This CryptoLocker variant uses Tor to mask its C&C communications.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware is involved in the socially-engineered attack that took advantage of the July 2014 Flight MH17 tragedy. Users affected by this malware may have their personal information stolen and their systems infected with other malicious files.
    Read more   

  • This malware is a new derivative of the Gameover Zeus. It uses both Domain Generation Algorithm (DGA) and a "fast flux" tactic to obscure C&C servers.
    Read more   

  • This ZEUS/ZBOT variant is found to be distributed via spam campaign in mid-2014. The spammed messages in the said campaign used a certain file storage service.
    Read more   

  • This spyware sniffs network packets to steal information. It arrives via spammed messages aimed at German online banking users.
    Read more   

  • This malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox. It uses Dropbox to update its C&C settings in order to listen and perform commands from a remote malicious user.
    Read more   

  • This malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox. It uses Dropbox to update its C&C settings in order to listen and perform commands from a remote malicious user.
    Read more   

  • This is a malware that downloads and installs malicious apps onto any Android device connected to the affected PC. The apps are malicious versions of online banking apps, which could compromise a user’s online banking account.
    Read more   

  • This ZeuS variant uses random headers and changes its file extension to make detection arduous. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more   

  • This malware is the final payload of the ZeuS variant that uses random headers to make detection difficult. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more