• This UPATRE variant is used by DYRE banking malware to arrive in systems via spam emails. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware which is downloaded by DYRE banking malware, has the capability to compose email messages in Microsoft Outlook with the UPATRE malware attached.To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.
    Read more   

  • This mew malware is related to the release of the Njw0rm malware source code found in early January 2015.To get a one-glance comprehensive view of the behavior of this Hacking Tool, refer to the Threat Diagram shown below.
    Read more   

  • This mew malware is related to the release of the Njw0rm malware source code found in early January 2015.To get a one-glance comprehensive view of the behavior of this Hacking Tool, refer to the Threat Diagram shown below.
    Read more   

  • This malware exploits an Adobe Flash zero-day vulnerability. When a system is exploited successfully, it allows a remote user to execute arbitrary code on the system.
    Read more   

  • This malware was discovered to be involved in a series of malicious campaigns that found victims in Europe, China, Middle East, Africa, India, and Latin America on late January 2015. It comes as an attachment to a spammed mail and downloads a cryptolocker variant onto affected systems.
    Read more   

  • This cryptoransomware variant was discovered to be involved in a series of malicious campaigns that found victims in Europe, China, Middle East, Africa, India, and Latin America on late January 2015. It encrypts files using various file extensions.
    Read more   

  • This PlugX variant is found in compromised releases of some legitimate online games.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This file infector is embedded in an infected zip file served by a website hosted in North Korea.To get a one-glance comprehensive view of the behavior of this File infector, refer to the Threat Diagram shown below.
    Read more   

  • This threat is related to attacks that used Android Same Origin Policy (SOP) vulnerability to target Facebook users. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more