• This is the Trend Micro detection for malicious files that belong to the malware family known as REGIN. REGIN is a multi-component malware that uses different files for its malicious functionalities and payload.
    Read more   

  • REGIN is a sophisticated malware that has been used to target high profile victims. REGIN uses a variety of advanced evasion techniques.
    Read more   

  • This ransomware variant uses the text ebola as part of the extension name that it appends on the file that it encrypts.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware employs a new autostart mechanism and removes users' privileges in viewing the registry’s content. As such, users won’t be able to suspect that their systems are already infected.
    Read more   

  • This malware is related to a cyberespionage campaign that uses an Ichitaro zero-day vulnerability, or the Multiple Ichitaro Products Unspecified Remote Code Execution Vulnerability (CVE-2014-7247)To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • WIRELURKER is a malware family that targets both Mac OS and iOS systems.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This is the Trend Micro detection for Trojanized apps that belong to the Wirelurker malware family.This Trojan may arrive bundled with malware packages as a malware component.
    Read more   

  • The Wirelurker malware was seen affecting both OS X and iOS devices.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware is involved in the DRIDEX malspam campaign that was spotted in early November 2014. It purports itself as a word document with malicious macro code that then downloads DRIDEX onto the affected system.
    Read more   

  • This spyware arrives as an attachment to spammed messages. It arrives as a malicious macro code.
    Read more