• This malware is related to the DRIDEX spam runs that used financial matters as its social engineering ploy. These spam emails have Word and Excel file documents which contain the macro that downloads DRIDEX.
    Read more   

  • This spyware is one of the many DRIDEX variants that have been found in spam runs in November 2015. The said spam runs were observed after the takedown of a DRIDEX botnet.
    Read more   

  • This malware is related to the DRIDEX spam runs that used financial matters as its social engineering ploy. These spam emails have Word and Excel file documents which contain the macro that downloads DRIDEX.
    Read more   

  • This malware is related to the DRIDEX spam runs that used financial matters as its social engineering ploy. These spam emails have Word and Excel file documents which contain the macro that downloads DRIDEX.
    Read more   

  • This spyware is one of the many DRIDEX variants that have been found in spam runs in November 2015. The said spam runs were observed after the takedown of a DRIDEX botnet.
    Read more   

  • This malware is the payload for the Adobe Flash zero-day exploit (assigned with CVE-2015-7645) which is used in the cyberespionage campaign, Pawn Storm. In addition, the Angler Exploit Kit has reportedly integrated CVE-2015-7645.
    Read more   

  • This malware leverages Moplus SDK to automatically and periodically deploy unwanted applications onto Android devices. Moplus SDK has been found out to include backdoor capabilities.
    Read more   

  • This malware launched distributed denial of service (DDoS) attacks to a number of gaming- and education-related websites. Its communication with its servers are encrypted via XOR, hence the name.
    Read more   

  • This malware is the payload for the malvertising campaign that affected around 3,000 Japanese websites. The said attack uses Angler kit which leveraged vulnerabilities in Internet Explorer and Adobe Flash Player.
    Read more   

  • This malware, discovered late September 2015, lets attackers force an ATM to dispense cash without proper authorization. It also has the capability to delete itself from the infected system to prevent detection.
    Read more