- Threat Encyclopedia
- Malware
This malware is responsible for dropping the cryptocurrency miner Coinminer.Linux.
Read more
This malware is part of the leaked source code of Carbanak, as reported by FireEye in April 2019.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read more
This malware is part of the leaked source code of Carbanak, as reported by FireEye in April 2019.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read more
This malware is a PowerShell script responsible for downloading and dropping other files. It is implicated in a malicious cryptocurrency-mining activity that features a malware propagating via various methods.
Read more
This is an updated Bashlite malware designed to add infected internet-of-things devices to a distributed-denial-of-service (DDoS) botnet.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read more
This is an updated Bashlite malware designed to add infected internet-of-things devices to a distributed-denial-of-service (DDoS) botnet.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read more
This XLoader variant poses as a security app for Android devices, and uses a malicious iOS profile to affect iPhone and iPad devices.
Read more
This backdoor uses several known websites to receive backdoor commands, facilitate communication of the commands, and upload files.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read more
This malware is a downloader used by the OceanLotus threat actor group. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read more
This ransomware comes from a high volume spam campaign that aims to deliver this to as many users possible.This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read more