• This malware targets systems that host Java-based HTTP servers and Java Servlet containers. It has backdoor routines that compromises the affected server's securityTo get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This malware was discovered to target point of sale (POS) systems used in establishments such as restaurants and hotels in order to steal credit card information from purchasing customers. Purchasing from the establishments with infected systems may result in users' financial information being stolen, and may find themselves billed with unauthorized expenses made by cybercriminals.
    Read more   

  • This police ransomware locks the infected system and urges users to pay by displaying a so-called treaty of antivirus software companies.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This destructive malware causes massive data loss.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This Trojan is a fake installer for Mac OS X. It asks for the user's mobile number.
    Read more   

  • This police ransomware locks the infected system and urges users to pay verbally via its WAVE file. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This malware is related to the Eurograbber attacks that stole up to EU€36 million during December 2012. Eurograbber targeted banks that relied on SMS for user authentication for online transactions.
    Read more   

  • This malware used a Christmas-themed exploit document to deliver its payload, BKDR_GAMFRIC.A.
    Read more   

  • This malware disguises itself as a Trend Micro product/component. It drops a bitcoin-mining malware.
    Read more   

  • This worm is an emerging toolkit seen in the black market. It has the potential to be the next hot botnet malware, similar to DORKBOT.
    Read more