Malware

  • This Microsoft Word document malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of North Korea rocket launch to lure users into opening itself.
    Read more

  • This malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it disguises as a Skype Encryption to lure users into downloading and executing the itself.
    Read more

  • This malware pretends to be either an Instagram or Angry Birds Space application for Android phones.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
    Read more

  • This Trojan arrives as an attachment to spammed email claiming to be from a security researcher. It drops a malicious JavaScript that drops a backdoor.
    Read more

  • This Android backdoor can be controlled via SMS or phone calls.To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below.
    Read more

  • This Trojan infects the Master Boot Record (MBR) of an affected system. It restarts the system afterwards and shows a ransom message, urging users to pay an amount in order to reverse the effect.
    Read more

  • This Java malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, this malware arrives through an email campaign that makes use of Pro-Tibetan sentiments as social engineering ploy.
    Read more

  • This malware arrives as payload of an email campaign that makes use of Pro-Tibetan sentiments. It uses the said subject or content to lure users into opening the email for this malware to be downloaded or executed on the affected user's system.
    Read more

  • This malware arrives as an executable file infected by a file infector malware detected as PE_SALITY.AC.
    Read more

  • This Trojan arrives as an attachment to email messages purportedly promoting Tibetan culture. It drops a file that is a backdoor and is infected by a file infector.
    Read more

Connect with us on