• This malware disguises as delivery receipts for well-known postal and delivery services firms and airlines.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This backdoor is a new variant of the malware family CARBERP. It downloads and installs new plug-ins from its remote server thus compromising the security of the infected systemsThis backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This backdoor is a new variant of the malware family CARBERP. It downloads and installs new plug-ins from its remote server thus compromising the security of the infected systemsTo get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This malware targets systems running on Linux. It allows remote access of affected systems through the use of SSH (Secure Shell Protocol) and steals system login credentials.
    Read more   

  • This is a keylogger found inside a spammed email message that purports to come from the Cabinet Office Information Systems Office.To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more   

  • This malware spams messages to users using Skype in order to propagate. The spammed messages contain links that lead to an automatic download of the malware itself.
    Read more   

  • This malware spams messages to users using Skype in order to propagate. The spammed messages contain links that lead to an automatic download of the malware itself.
    Read more   

  • The malware tags the affected users' friends in Facebook and posts a message with a malicious link.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware claims to be an update installer for Java. Once installed, it downloads malicious files onto the affected system and executes them, causing routines to be exhibited.
    Read more   

  • This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing certain malicious routines to be exhibited.
    Read more