• This malicious HTML file exploits a zero-day vulnerability in Internet Explorer 7, 8, and 9. The exploit leads to the dropping of a PoisonIvy backdoor.
    Read more   

  • This malware is a remote access tool (RAT) known as PlugX. It is one of the most common malware used in carrying out targeted attacks.
    Read more   

  • Both malware are related to the modified Enfal variants, which were reported to have infected 874 systems in 33 countries.To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • Both malware are related to the modified Enfal variants, which were reported to have infected 874 systems in 33 countries.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more   

  • This backdoor, which runs on Linux and Mac, is designed to steal passwords stored by a number of popular Internet applications. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This backdoor, which runs on Linux, is designed to steal passwords stored by a number of popular Internet applications. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.
    Read more   

  • This spyware attempts to replace the contact numbers of certain banks with rogue numbers that are controlled by the attackers. This may lead infected users to divulge their banking and personal information to the attackers.
    Read more   

  • This file infector is reported to be spreading massively in the US and Europe. There are two factors about this malware that can explain this spreading: this malware infects common files that are usually shared (documents, spreadsheets, executables) and it targets mapped and removal drives.
    Read more   

  • This file infector is reported to be spreading massively in the US and Europe. There are two factors about this malware that can explain this spreading: this malware infects common files that are usually shared (documents, spreadsheets, executables) and it targets mapped and removal drives.
    Read more   

  • This Trojan is a part of a Java applet that exploits a Java Runtime Environment (JRE) vulnerability. It uses an HTML file to download and execute a backdoor.
    Read more