Malware

  • This is the detection for the malicious app dubbed as "InstaCare" that steals user's Instagram account information. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • Known as PETYA crypto-ransomware, this malware displays ransom notes at system startup and overwrites Master Boot Record (MBR). It also abuses the cloud storage service, Dropbox for its infection vector.
    Read more

  • Known as PETYA crypto-ransomware, this malware displays ransom notes at system startup and overwrites Master Boot Record (MBR). It also abuses the cloud storage service, Dropbox for its infection vector.
    Read more

  • This new ransomware variant is known for the unique graphic designs of its ransom notes. Similar to other ransomware variants, it encrypts files and arrives via email.
    Read more

  • This new ransomware variant is known for the unique graphic designs of its ransom notes. Similar to other ransomware variants, it encrypts files and arrives via email.
    Read more

  • This malware was involved in the March 2016 compromise of a popular bittorent client website, where it was passed off as a legitimate upgrade installer. The first ransomware to exclusively target OSX machines, users affected by this malware may find their important files and documents useless and unopenable.
    Read more

  • This crypto-ransomware "speaks", apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries.
    Read more

  • This malware is used in the attack believed to be targeting companies that are involved with Japan critical infrastructure. The attack is dubbed as Operation Dust Storm.
    Read more

  • This malware is involved in the February 2016 compromise of an open-source Linux OS distribution website. It may find its way into users' systems by being embedded in a downloaded Linux Mint ISO file.
    Read more

  • This latest ransomware variant is dubbed as DMA Locker. It encrypts files on fixed, removable and network drives.
    Read more

 

connect with us on

facebook youtube linkedin feed