Malware
This ransomware variant uses the text ebola as part of the extension name that it appends on the file that it encrypts.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware employs a new autostart mechanism and removes users' privileges in viewing the registry’s content. As such, users won’t be able to suspect that their systems are already infected.
Read moreThis malware is related to a cyberespionage campaign that uses an Ichitaro zero-day vulnerability, or the Multiple Ichitaro Products Unspecified Remote Code Execution Vulnerability (CVE-2014-7247)To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Read moreWIRELURKER is a malware family that targets both Mac OS and iOS systems.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis is the Trend Micro detection for Trojanized apps that belong to the Wirelurker malware family.This Trojan may arrive bundled with malware packages as a malware component.
Read moreThe Wirelurker malware was seen affecting both OS X and iOS devices.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware is involved in the DRIDEX malspam campaign that was spotted in early November 2014. It purports itself as a word document with malicious macro code that then downloads DRIDEX onto the affected system.
Read moreThis spyware arrives as an attachment to spammed messages. It arrives as a malicious macro code.
Read moreThis malware is a malicious plugin for Chrome browsers. It runs a code when users browse Facebook, enabling the plugin to control navigation.
Read moreThis malware figures in a Shellshock-related SMTP attack. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read more