Malware

  • This malware is a cryptocurrency mining malware discovered late August 2017 and found to be sporting fileless routines. Users affected by this malware may find their systems being used to mine cryptocurrency without their authorization.
    Read more

  • This malware was discovered on August 2017 to have been delivered by the Disdain exploit kit. This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
    Read more

  • This malware is involved in the filelessly-installed backdoor malware attack discovered early August 2017. It is able to install a backdoor malware onto the systems it infects.
    Read more

  • This mobile ransomware threatens to send personal data from a victim's phone to everyone in their contact list. It was carried by three apps found in Google Play: “Wallpapers Blur HD”, “Booster & Cleaner Pro”, and “Calls Recorder”.
    Read more

  • This malware opens a command shell on the targeted system. It mainly targets IoT devices, particularly Network Attached Storage (NAS) devices.
    Read more

  • This malware masquerades as popular apps like MMS, whatsapp, and Pokemon Go. It is capable of hijacking a phone and is capable of many actions including calling a number or sending an SMS indicated by an attacker, upload files into a C&C server, and steal information.
    Read more

  • This cross-platform remote access trojan (RAT) can be run on any machine installed with Java. This includes Windows, Mac OSX, Linux, and Android.
    Read more

  • This malware abuses certificates and has security software evasion that affects machines using Apple's OS X operating system. The fake certificates installed by the malware allows for man in the middle attacks.
    Read more

  • A new variant of this mobile malware (ANDROIDOS_SLOCKER.OPST) is known to have the same GUI as WannaCry, and are capable of encrypting files.
    Read more

  • This information stealing malware was one of the IoCs found in recent attacks targeting hospitals in Israel. This malware is also notable for its stealth.
    Read more

 

connect with us on

facebook youtube linkedin feed