- Threat Encyclopedia
- Malware
This is the Trend Micro detection for Trojanized apps that belong to the Wirelurker malware family.This Trojan may arrive bundled with malware packages as a malware component.
Read more
The Wirelurker malware was seen affecting both OS X and iOS devices.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read more
This malware is involved in the DRIDEX malspam campaign that was spotted in early November 2014. It purports itself as a word document with malicious macro code that then downloads DRIDEX onto the affected system.
Read more
This spyware arrives as an attachment to spammed messages. It arrives as a malicious macro code.
Read more
This malware is a malicious plugin for Chrome browsers. It runs a code when users browse Facebook, enabling the plugin to control navigation.
Read more
This malware figures in a Shellshock-related SMTP attack. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read more
This Trojan comes from a malware family that employs evasion tactics such as checking if it is running in a virtual environment. This malware is linked to the FlashPack exploit kit.
Read more
This malware figures in a Shellshock-related SMTP attack.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read more
This is a malicious PowerPoint file, whose final payload is slide1.gif, TROJ_TALERET.
Read more
This Trojan is the final malware delivered in an attack that exploits the CVE-2014-4114 vulnerability. This Trojan is known to come from a malware family used in targeted attacks against Taiwan-based entities.
Read more