• This OSX malware was used in the targeted attack campaign named Careto. The attack was noted for encoding its configuration data and encrypting its network traffic.
    Read more   

  • This malware arrives as an unusual malicious attachment. It displays a fake and malicious error message when uncompressed and executed.
    Read more   

  • This malware is involved in a socially-engineered spam campaign leveraging the popularity of messaging application, WhatsApp. It is offered as a download of the alleged 'desktop' version of the app.
    Read more   

  • This malware is related to the zero-day exploit on Adobe Flash Player (CVE-2014-0502) detected as SWF_EXPLOYT.LPE.
    Read more   

  • This malware was involved in the Adobe Flash Player zero-day exploit incident reported on February 2014. It would automatically download onto users' systems once the user browsed a compromised website.
    Read more   

  • This ransomware specifically targets Turkish users. It arrives as a spammed message informing users about a billing invoice update.
    Read more   

  • This malicious HTML file is related to the zero-day vulnerability in Internet Explorer 9 and 10, or CVE-2014-0322. The vulnerability makes use of a "hybrid exploit" where the malicious exploit code is split between JavaScript and Adobe Flash.
    Read more   

  • This malware exploits a zero-day vulnerability in some versions of Internet Explorer. Once successfully exploited, it drops a backdoor on the vulnerable computer.
    Read more   

  • This ransomware variant targets users in Hungary. It locks users' computers and lists the encrypted file types.
    Read more   

  • This malware was discovered on January 2014 as a file infector that not only infects all executable files on an affected system, but also drops a ZBOT variant. Users affected by this malware may find their personal information stolen and their online banking accoutns compromised.
    Read more