• This spyware arrives as an attachment to spammed messages. It arrives as a malicious macro code.
    Read more   

  • This malware is a malicious plugin for Chrome browsers. It runs a code when users browse Facebook, enabling the plugin to control navigation.
    Read more   

  • This malware figures in a Shellshock-related SMTP attack. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This Trojan comes from a malware family that employs evasion tactics such as checking if it is running in a virtual environment. This malware is linked to the FlashPack exploit kit.
    Read more   

  • This malware figures in a Shellshock-related SMTP attack.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This is a malicious PowerPoint file, whose final payload is slide1.gif, TROJ_TALERET.
    Read more   

  • This Trojan is the final malware delivered in an attack that exploits the CVE-2014-4114 vulnerability. This Trojan is known to come from a malware family used in targeted attacks against Taiwan-based entities.
    Read more   

  • This spyware uploads documents it finds to a specific Google Drive location.This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This Trojan is a CryptoLocker variant that uses Tor to hide its network activity. This specific variant is found as an attachment to spammed email with an Italian message.
    Read more   

  • This Trojan is a zero-day exploit for CVE-2014-4113, an identified vulnerability in Windows Kernel-Mode. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more