• This malware spams messages to users using Skype in order to propagate. The spammed messages contain links that lead to an automatic download of the malware itself.
    Read more   

  • The malware tags the affected users' friends in Facebook and posts a message with a malicious link.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware claims to be an update installer for Java. Once installed, it downloads malicious files onto the affected system and executes them, causing routines to be exhibited.
    Read more   

  • This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing certain malicious routines to be exhibited.
    Read more   

  • This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing certain malicious routines to be exhibited.
    Read more   

  • This malware is involved with a spam attack during January 2013. It arrives as a dropped file from a spammed mail with the body written in the Japanese language and bearing the subject New Year Greetings.
    Read more   

  • This malware is involved in the Blackhole Exploit Kit (BHEK) attacks in January 2013. It takes advantage of a zero-day vulnerability (CVE-2013-0422) in Java in order to drop ransomware.
    Read more   

  • This malware has the capability of downloading and installing plugins from a remote server. This feature allows the malware to be more flexible in its attacks.
    Read more   

  • This backdoor monitors and captures screenshots of specific Korean games. It is also capable of displaying fake blue screen of death screens.
    Read more   

  • This Trojan overwrites the Master Boot Record (MBR) with new codes. It also contains a TSPY_URELAS.
    Read more