• This malware is implicated as an exploit for the zero-day vulnerability in Adobe Flash Player known as CVE-2018-15982. This exploit made its rounds via drive-by downloads.
    Read more   

  • This backdoor may arrive in the affected system via ThinkPHP Remote Code Execution exploit.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This backdoor may spread to other devices by abusing a Remote Code Execution exploit in Huawei routers.This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This malware connects to a specific post from a specific Twitter account. The image in the post hosts code that connects to a command and control server used by this malware to receive commands.
    Read more   

  • This malware is part of the Shadow Brokers' leaked tools and exploits. It targets Windows NT 4.
    Read more   

  • This malicious cryptocurrency miner is dropped by exploiting two vulnerabilities in Elasticsearch. This Coinminer arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This malware is dropped as a .DLL file.
    Read more   

  • This Trojan Spy arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more   

  • This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops copies of itself into all the removable drives connected to an affected system.
    Read more