Malware

  • This Microsoft Word Document malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed.Specifically, it makes use of 2012 Olympics to entice users into opening itself.
    Read more

  • Trend Micro has received multiple samples of this MAC OSX malware from multiple, independent sources, including customer reports and internal sources. These indicate that this malware poses a high risk to users due to the increased possibility of infection.
    Read more

  • This Trojan comes as an attachment to spammed email. It carries with it a backdoor that runs on Mac OS X systems.
    Read more

  • This spyware targets mobile banking users by posing as a fake token generator. During execution it asks for the user's password and generates a fake token while sending the user's information to a specific number and remote servers in the background.
    Read more

  • This malicious file disguises itself as an image file in order for users to install and execute its backdoor component.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware intercepts browser requests and changes the displayed content according to the configuration, written by the administrator of the botnet. This way, cybercriminals can trick users into entering valuable information without raising suspicion.
    Read more

  • This malware is related to a mass compromise that leads to a series of redirections that ultimately point users to the Blackhole Exploit kit exploiting vulnerabilities cited in CVE-2010-0188 and CVE-2010-1885, respectively. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware can be downloaded from fake site that imitates Google Play, formerly known as the Android Market. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This malware is a backdoor with the primary purpose of stealing information from online transactions. The list of the monitored URLs can also be dynamically updated by a cybercriminal.
    Read more

  • This malware is a backdoor with the primary purpose of stealing information from online transactions. The list of the monitored URLs can also be dynamically updated by a cybercriminal.
    Read more

 

connect with us on

facebook youtube linkedin feed