• This backdoor was hosted in the compromised Gizmodo Brazil website. It starts out as a fake Adobe Flash Player download.
    Read more   

  • This variant of Cryptolocker encrypts files with specific file sizes. This routine impacts files with smaller file sizes such as documents and text files.
    Read more   

  • This CryptoLocker variant uses Tor to mask its C&C communications.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware is involved in the socially-engineered attack that took advantage of the July 2014 Flight MH17 tragedy. Users affected by this malware may have their personal information stolen and their systems infected with other malicious files.
    Read more   

  • This malware is a new derivative of the Gameover Zeus. It uses both Domain Generation Algorithm (DGA) and a "fast flux" tactic to obscure C&C servers.
    Read more   

  • This ZEUS/ZBOT variant is found to be distributed via spam campaign in mid-2014. The spammed messages in the said campaign used a certain file storage service.
    Read more   

  • This spyware sniffs network packets to steal information. It arrives via spammed messages aimed at German online banking users.
    Read more   

  • This malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox. It uses Dropbox to update its C&C settings in order to listen and perform commands from a remote malicious user.
    Read more   

  • This malware is part of a targeted attack against certain entities in Taiwan on June 2014, utilizing not only PlugX RAT malware but also the use of Dropbox. It uses Dropbox to update its C&C settings in order to listen and perform commands from a remote malicious user.
    Read more   

  • This is a malware that downloads and installs malicious apps onto any Android device connected to the affected PC. The apps are malicious versions of online banking apps, which could compromise a user’s online banking account.
    Read more