• This threat, dubbed as BitCrypt, is a ransomware that steals funds from various cryptocurrency wallets. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This threat downloads TROJ_CRIBIT.B, a ransomware that steals funds from various cryptocurrency wallets.
    Read more   

  • This malware is noteworthy due to the click fraud routines it exhibits as an entirely new strain of ZBOT. It is capable of opening browser windows and perform mouse actions without user intervention.
    Read more   

  • This is the first Android malware discovered to abuse the TOR network in order to conceal its connection to its C&C server. Users affected by this malware may find the security of their mobile devices compromised.
    Read more   

  • This malware runs a certain command that disables Windows Firewall depending on the operating system version. It elevates certain privileges when not in Admin mode.
    Read more   

  • This malware uses Malaysia Airlines Flight 370 as its social engineering lure.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This malicious .DOC file entitled "Violent terror attack" took advantage of the mass stabbing incident in Kunming, China in early March 2014, as social engineering bait.
    Read more   

  • This malware is dropped by the malicious .DOC file, TROJ_EXPLOYT.
    Read more   

  • This OSX malware was used in the targeted attack campaign named Careto. The attack was noted for encoding its configuration data and encrypting its network traffic.
    Read more   

  • This malware arrives as an unusual malicious attachment. It displays a fake and malicious error message when uncompressed and executed.
    Read more