• This is the latest CARBANAK variant reportedly related to the compromised Microsoft Windows client. CARBANAK is a malware family that hits banks and financial organizations.
    Read more   

  • This malware is related to the attack on certain banking organizations in Japan on late August/Early September 2015. Users with systems affected by this malware may find their online banking accounts compromised.
    Read more   

  • This malware is related to an active campaign that compromised Japanese websites and used these as C&C servers of EMDIVI Backdoor. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3839. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat Diagram shown below.
    Read more   

  • This detection is a proof of concept (PoC) malware related to the Android vulnerability CVE-2015-3840. To get a one-glance comprehensive view of the behavior of this Others, refer to the Threat Diagram shown below.
    Read more   

  • This malware is the payload for the BIND Denial of Service vulnerability assigned with CVE-2015-5477. Once this vulnerability is successfully exploited, it could launch denial of service attacks.
    Read more   

  • This malware is the payload for the BIND Denial of Service vulnerability assigned with CVE-2015-5477. Once this vulnerability is successfully exploited, it could launch denial of service attacks.
    Read more   

  • This is the Trend Micro detection for the Encryptor RaaS (Ransomware as a Service) that has the capability to set deadlines as well as for the ransom amount to increase. This new platform allows attackers and cybercriminals to create their own ransomware for free.
    Read more   

  • This TorrentLocker variant has the capability to double the amount of decryption after its 5-day deadline. It arrives via spam message purporting as a business email that targeted an Australian company.
    Read more   

  • This malware is related to the campaign that targeted TV and government-related websites in Hong Kong and Taiwan. In the said campaign, attackers used Flash exploits that emerged from the Hacking Team leak to deliver this PoisonIvy variant.
    Read more