• This malware claims to be an update installer for Java. Once installed, it downloads malicious files onto the affected system and executes them, causing routines to be exhibited.
    Read more   

  • This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing certain malicious routines to be exhibited.
    Read more   

  • This malware was involved in the Red October campaign, a series of attacks targeting diplomatic and government agencies. It drops malicious files onto the affected system and executes them, causing certain malicious routines to be exhibited.
    Read more   

  • This malware is involved with a spam attack during January 2013. It arrives as a dropped file from a spammed mail with the body written in the Japanese language and bearing the subject New Year Greetings.
    Read more   

  • This malware is involved in the Blackhole Exploit Kit (BHEK) attacks in January 2013. It takes advantage of a zero-day vulnerability (CVE-2013-0422) in Java in order to drop ransomware.
    Read more   

  • This malware has the capability of downloading and installing plugins from a remote server. This feature allows the malware to be more flexible in its attacks.
    Read more   

  • This backdoor monitors and captures screenshots of specific Korean games. It is also capable of displaying fake blue screen of death screens.
    Read more   

  • This Trojan overwrites the Master Boot Record (MBR) with new codes. It also contains a TSPY_URELAS.
    Read more   

  • This spyware monitors and captures screenshots of specific games. It sends the stolen information its C&C server.
    Read more   

  • This malware uses a Powerpoint presentation about the Mayan December 2012 Apocalypse hoax as a lure. The presentation contains a macro that drops malicious files onto the affected system.
    Read more