Malware
This malware is related to a spammed message that leverages the news on “Royal Baby." The said spammed message lures users in accessing the related blog which is in actual redirects to a malicious URL.
Read moreThis is a malicious applet that downloads and executes a file infector detected as PE_EXPIRO.JX-O.
Read moreThis file infector arrives via malicious Java applet. Once it infects a system, it seeks out executable files in all available drives, making it easy to propagate especially to other computers that are sharing folders over a network.
Read moreThis malware guises as an Opera update. Cybercriminals behind this threat stole an outdated Opera digital certificate, which they used to sign this malware.
Read moreIt drops a distributed denial of service (DDoS) component that targets primary and secondary DNS name servers of record for multiple South Korean government sites.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read moreThis malware is related to the security incident that affected certain government and news websites in South Korea. Cybercriminals compromised the auto-update mechanism of a file-sharing software in order to serve a modified malicious version of the said software's installer.
Read moreThis Android malware installs itself as an administrator and uses a vulnerability found in Android. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis Android malware leads users to a fake adult dating website. Once users click on the websites' links, which purportedly lead to dating profiles and contact details, they are instead given fraudulent information.
Read moreThis malware uses DLL preloading, a technique more known to be utilized by PlugX.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
Read moreThis is the detection for exploit codes that takes advantage of a vulnerability in the hosting control panel Plesk.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
Read more