Malware -

Úvod  2019  2018  2017  2016  2015  2014  Bankovní  Databáze  Mobil  Ransom  Znalosti  Programy  Virus Calendar 

 

2017

Datum

Název

Info 

31.12.2017

Trojan.Zezin

Trojan.Zezin is a Trojan horse that downloads potentially malicious files onto the compromised computer.

27.12.2017

Win32/Prosiak.AC

The trojan serves as a backdoor. It can be controlled remotely.

27.12.2017

Win32/Sedkom.AA

The trojan serves as a backdoor. It can be controlled remotely.

21.12.2017

Ransom.HC7

Ransom.HC7 is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

21.12.2017

Android.Anubisspy

Android.Anubisspy is a Trojan horse for Android devices that opens a backdoor, steals information, and downloads potentially malicious files.

15.12.2017

Exp.CVE-2017-11886

Exp.CVE-2017-11886 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11886).

15.12.2017

Trojan.Trisis

Trojan.Trisis is a Trojan horse that may perform malicious activities on the compromised computer.

15.12.2017

Exp.CVE-2017-11890

Exp.CVE-2017-11890 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11890)

15.12.2017

Exp.CVE-2017-11889

Exp.CVE-2017-11889 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11889).

15.12.2017

Exp.CVE-2017-11893

Exp.CVE-2017-11893 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11893).

15.12.2017

Exp.CVE-2017-11894

Exp.CVE-2017-11894 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer and Edge Remote Memory Corruption Vulnerability (CVE-2017-11894).

15.12.2017

Exp.CVE-2017-11895

Exp.CVE-2017-11895 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer and Edge Remote Memory Corruption Vulnerability (CVE-2017-11895).

15.12.2017

Exp.CVE-2017-11901

Exp.CVE-2017-11901 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11901).

15.12.2017

Exp.CVE-2017-11907

Exp.CVE-2017-11907 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11907).

15.12.2017

Exp.CVE-2017-11913

Exp.CVE-2017-11913 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11913).

7.12.2017

Win32/KillAV.NTD

Win32/KillAV.NTD is a trojan which tries to download other malware from the Internet.

7.12.2017

Trojan.Bankice

Trojan.Bankice is a Trojan horse that steals information from the compromised computer. It may also download potentially malicious files.

7.12.2017

Trojan.Finsev

Trojan.Finsev is a Trojan horse that may perform malicious activities on the compromised computer.

7.12.2017

Exp.CVE-2017-16408

Exp.CVE-2017-16408 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16408).

30.11.2017

MSIL/Filecoder.Fantom.A

MSIL/Filecoder.Fantom.A is a trojan that encrypts files on local drives. To decrypt files, the user is asked to send information/certain amount of money via the Bitcoin payment service.

30.11.2017

Win32/Agent.YJF

The trojan serves as a backdoor. It can be controlled remotely.

30.11.2017

Win32/Filecoder.Fantom.A

Win32/Filecoder.Fantom.A is a trojan that encrypts files on local drives. To decrypt files, the user is asked to send information/certain amount of money via the Bitcoin payment service.

30.11.2017

Win32/KillWin.NCI

The trojan has a simple payload.

30.11.2017

Win32/Patpoopy.D

Win32/Patpoopy.D serves as a backdoor. It can be controlled remotely.

29.11.2017

Exp.CVE-2017-16415

Exp.CVE-2017-16415 is a heuristic detection for files attempting to exploit the Adobe Reader and Acrobat Multiple Remote Code Execution Vulnerabilities (CVE-2017-16415).

29.11.2017

Exp.CVE-2017-16392

Exp.CVE-2017-16392 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16392).

29.11.2017

Exp.CVE-2017-16375

Exp.CVE-2017-16375 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16375).

29.11.2017

Exp.CVE-2017-16389

Exp.CVE-2017-16389 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader Multiple Remote Code Execution Vulnerabilities (CVE-2017-16389).

29.11.2017

Exp.CVE-2017-16390

Exp.CVE-2017-16390 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader Multiple Remote Code Execution Vulnerabilities (CVE-2017-16390).

29.11.2017

Exp.CVE-2017-16373

Exp.CVE-2017-16373 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16373).

29.11.2017

RANSOM_CRYPTOQKG.A

This Ransomware arrives as an attachment to email messages spammed by other malware/grayware or malicious users.

28.11.2017

Exp.CVE-2017-16393

Exp.CVE-2017-16393 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader Multiple Remote Code Execution Vulnerabilities (CVE-2017-16393).

23.11.2017

Exp.CVE-2017-16383

Exp.CVE-2017-16383 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader Remote Code Execution Vulnerability (CVE-2017-16383). 

23.11.2017

Exp.CVE-2017-16381

Exp.CVE-2017-16381 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16381).

23.11.2017

Exp.CVE-2017-16384

Exp.CVE-2017-16384 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader Multiple Buffer Overflow Vulnerabilities (CVE-2017-16384).

23.11.2017

Exp.CVE-2017-11882

Exp.CVE-2017-11882 is a heuristic detection for files attempting to exploit the Microsoft Office Memory Corruption Vulnerability (CVE-2017-11882).

23.11.2017

Win32/Agent.NDM

Win32/Agent.NDM is a polymorphic and metamorphic file infector.

23.11.2017

Android.Doublehidden

Android.Doublehidden is a Trojan horse for Android devices that displays advertisements and steals information from the compromised device.

22.11.2017

Win32/TrojanDownloader.
Tovkater.HB

Win32/TrojanDownloader.Tovkater.HB is a trojan which tries to download other malware from the Internet.

22.11.2017

Win32/Tapaoux.O

The trojan serves as a backdoor. It can be controlled remotely.

22.11.2017

MSH.Pushbank

MSH.Pushbank is a PowerShell script that targets banking and ecommerce sites to steal information.

21.11.2017

JS.Kraacha

JS.Kraacha is a detection for a JavaScript exploit development framework.

21.11.2017

Android.Fakeyouwon

Android.Fakeyouwon is a Trojan horse for Android devices that displays web pages promoting fake offer scams.

18.11.2017

Android.Rootnik.B

Android.Rootnik.B is a Trojan horse for Android devices that roots the device and downloads potentially malicious files. 

18.11.2017

Exp.CVE-2017-16396

Exp.CVE-2017-16396 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16396). 

18.11.2017

Exp.CVE-2017-16410

Exp.CVE-2017-16410 is a heuristic detection for files attempting to exploit the Adobe Reader and Acrobat Multiple Remote Code Execution Vulnerabilities (CVE-2017-16410).

14.11.2017

Trojan.Reaver

Trojan.Reaver is a Trojan horse that may perform malicious activities on the compromised computer.

14.11.2017

Win32/StoneDrill.A

Win32/StoneDrill.A is a trojan that deletes all files on the local and removable drives. The trojan can overwrite the entire contents of the drives with random data.

14.11.2017

Win32/Delf.TUA

The trojan serves as a backdoor. It can be controlled remotely.

14.11.2017

Win32/NukeSped.AA

Win32/Delf.TUA is a trojan which tries to download other malware from the Internet.

13.11.2017

Win32/Filecoder.Hermes.D

Win32/Filecoder.Hermes.D is a trojan that encrypts files on fixed, removable and network drives.

10.11.2017

Linux.Badbee

Linux.Badbee is a Trojan horse that may perform malicious activities on the compromised computer.

10.11.2017

Backdoor.Badbee

Backdoor.Badbee is a Trojan horse that may perform malicious activities on the compromised computer.

9.11.2017

Downloader.Dydoxic

Downloader.Dydoxic is a Trojan horse that downloads potentially malicious files onto the compromised computer.

7.11.2017

RANSOM_BADRABBIT.SMA

This ransomware known as Bad Rabbit infected systems belonging to several high profile companies in Ukraine and Russia. It arrives via watering hole attack on compromised websites.

7.11.2017

RANSOM_BADRABBIT.A

This ransomware, also known as Bad Rabbit, reportedly spread to networks of some high profile companies located in Ukraine and Russia. It spreads via network shares.

2.11.2017

Win32/Filecoder.
DilmaLocker.A

Win32/Filecoder.DilmaLocker.A is a trojan that encrypts files on local drives.

2.11.2017

Win32/Filecoder.
ArmaLocky.A

Win32/Filecoder.ArmaLocky.A is a trojan that encrypts files on fixed, removable and network drives.

1.11.2017

W97M.Downloader.P

W97M.Downloader.P is a Trojan horse that may perform malicious activities on the compromised computer.

27.10.2017

RANSOM_BADRABBIT.A

This ransomware, also known as Bad Rabbit, reportedly spread to networks of some high profile companies located in Ukraine and Russia. It spreads via network shares.

25.10.2017

WORM_RETADUP.D

This malware is one of the variants/components of RETADUP malware discovered on September 2017 to be hitting users in South America for purposes of cryptocurrency mining.

25.10.2017

TROJ_MALEPS.B

This malware is associated with attacks involving malicious attachments for Hangul Word Processor (HWP). In the attack, PostScript is used to gain access to a victim's machine.

25.10.2017

TROJ_HWDOOR.B

This malware is associated with the attacks against the word processing application Hangul Word Processor (HWP), which is able to run PostScript code.

25.10.2017

TROJ_HWDOOR.A

This malware is associated with the attacks against the word processing application Hangul Word Processor (HWP), which is able to run PostScript code.

25.10.2017

TSPY_EMOTET.AUSJKV

This information stealing malware arrives as spam spoofing an invoice or payment notification.

25.10.2017

TSPY_EMOTET.AUSJKW

This information stealing malware arrives as spam spoofing an invoice or payment notification.

25.10.2017

VBS.Downloader.C

VBS.Downloader.C is a Trojan horse that downloads potentially malicious files onto the compromised computer. 

25.10.2017

Ransom.BadRabbit

Ransom.BadRabbit is a Trojan horse that encrypts files on the compromised computer. It then asks the user to pay to have their files decrypted. 

24.10.2017

Exp.CVE-2017-11826

Exp.CVE-2017-11826 is a heuristic detection for files attempting to exploit the Microsoft Office Memory Corruption Vulnerability (CVE-2017-11826). 

24.10.2017

Trojan.Turla.B

Trojan.Turla.B is a Trojan horse that may perform malicious activities on the compromised computer. 

24.10.2017

Linux.Iotreaper

Linux.Iotreaper is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files. 

21.10.2017

Trojan.Esaprof

Trojan.Esaprof is a Trojan horse that may perform malicious activities on the compromised computer. 

17.10.2017

Ransom.Hermes.B

Ransom.Hermes.B is a Trojan horse that encrypts files on the compromised computer. 

17.10.2017

Exp.CVE-2017-11292

Exp.CVE-2017-11292 is a heuristic detection for files attempting to exploit the Adobe Flash Player Type Confusion Remote Code Execution Vulnerability (CVE-2017-11292). 

17.10.2017

Android.Sockbot

Android.Sockbot is a Trojan horse for Android devices that creates a SOCKS proxy on the compromised device. 

17.10.2017

Exp.CVE-2017-11762

Exp.CVE-2017-11762 is a heuristic detection for files attempting to exploit the Microsoft Windows Graphics Component Remote Code Execution Vulnerability (CVE-2017-11762). 

17.10.2017

Exp.CVE-2017-8727

Exp.CVE-2017-8727 is a heuristic detection for files attempting to exploit the Microsoft Windows Shell Remote Code Execution Vulnerability (CVE-2017-8727). 

17.10.2017

Exp.CVE-2017-11793

Exp.CVE-2017-11793 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11793). 

17.10.2017

Exp.CVE-2017-11798

Exp.CVE-2017-11798 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11798). 

17.10.2017

Exp.CVE-2017-11800

Exp.CVE-2017-11800 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11800). 

17.10.2017

Exp.CVE-2017-11810

Exp.CVE-2017-11810 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11810). 

17.10.2017

Exp.CVE-2017-11822

Exp.CVE-2017-11822 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11822). 

7.10.2017

Win32/Filecoder.FS

Win32/Filecoder.FS is a trojan that encrypts files on fixed, removable and network drives.

7.10.2017

Win32/Ceatrg.A

Win32/Ceatrg.A is a trojan that installs Win32/Delf.OGV malware.

7.10.2017

MSIL/Filecoder.FF

MSIL/Filecoder.FF is a trojan that encrypts files on local drives. To decrypt files the user is requested to comply with given conditions in exchange for a password/instructions.

7.10.2017

Win32/Delf.TSU

Win32/Delf.TSU is a trojan that installs Win32/TrojanProxy.Hioles.AD malware.

7.10.2017

Win32/Spy.Small.NDA

The trojan collects various sensitive information. The trojan attempts to send gathered information to a remote machine.

6.10.2017

Backdoor.Korplug.E

Backdoor.Korplug.E is a Trojan horse that opens a backdoor and steals information from the compromised computer. 

5.10.2017

Trojan.Dubki

is a Trojan horse that may perform malicious activities on the compromised computer. 

5.10.2017

Trojan.Flusihoc

Trojan.Flusihoc is a Trojan horse that uses the compromised computer to carry out distributed denial of service (DDoS) attacks

5.10.2017

Ransom.Arena

Ransom.Arena is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

29.9.2017

Trojan.Starloader

Trojan.Starloader is a Trojan horse that may perform malicious activities on the compromised computer. 

28.9.2017

MSIL/Spy.Netpune.A

MSIL/Spy.Netpune.A is a trojan that steals sensitive information. The trojan attempts to send gathered information to a remote machine.

28.9.2017

MSIL/Spy.RinLog.A

MSIL/Spy.RinLog.A is a trojan that steals passwords and other sensitive information. The trojan attempts to send gathered information to a remote machine.

28.9.2017

Win32/TrojanProxy.
Hioles.AD

The trojan serves as a proxy server. It can be controlled remotely.

28.9.2017

Win32/Emotet.AW

The trojan serves as a backdoor. It can be controlled remotely.

28.9.2017

Win32/TrickBot.V

The trojan serves as a backdoor. It can be controlled remotely.

27.9.2017

Ransom.Redboot

Ransom.Redboot is a Trojan horse that encrypts files on the compromised computer. It also overwrites the master boot record (MBR). 

25.9.2017

Win32/FinSpy.AA

Win32/FinSpy.AA is a trojan that steals sensitive information.

25.9.2017

Win32/FinSpy.AB

Win32/FinSpy.AB is a trojan that steals sensitive information.

25.9.2017

Linux.Proxym

Linux.Proxym is a Trojan horse that may perform malicious activities on the compromised computer. 

21.9.2017

Trojan.Famberp

Trojan.Famberp is a Trojan horse that may perform malicious activities on the compromised computer. 

21.9.2017

Exp.CVE-2017-8737

The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations.

21.9.2017

Exp.CVE-2017-8728

The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations.

21.9.2017

Exp.CVE-2017-8753

The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations.

21.9.2017

Exp.CVE-2017-8757

The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations.

21.9.2017

Exp.CVE-2017-8734

Exp.CVE-2017-8734 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Memory Corruption Vulnerability (CVE-2017-8734). 

21.9.2017

Exp.CVE-2017-8738

Exp.CVE-2017-8738 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8738). 

21.9.2017

Exp.CVE-2017-8747

Exp.CVE-2017-8747 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-8747). 

21.9.2017

Exp.CVE-2017-8749

The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations.

19.9.2017

Python.Fakelib

Python.Fakelib is a Trojan horse that steals information from the compromised computer. 

18.9.2017

JS.Dosdeming

JS.Dosdeming is a detection for a JavaScript used to conduct denial of service attacks.

18.9.2017

Trojan.Sibakdi

Trojan.Sibakdi is a Trojan horse that may perform malicious activities on the compromised computer. 

16.9.2017

MSIL/Filecoder.
Serpent.A

MSIL/Filecoder.Serpent.A is a trojan that encrypts files on fixed, removable and network drives.

14.9.2017

Android.Wirex

Android.Wirex is a Trojan horse for Android devices that opens a backdoor on the compromised device

14.9.2017

Exp.CVE-2017-8759

Exp.CVE-2017-8759 is a heuristic detection for files attempting to exploit the Microsoft Windows .NET Framework Remote Code Execution Vulnerability (CVE-2017-8759). 

9.9.2017

MSIL/Kryptik.FOA

MSIL/Kryptik.FOA is a trojan that installs MSIL/Bladabindi.AH malware.

9.9.2017

MSIL/TrojanDropper.
Agent.DDT

MSIL/TrojanDropper.Agent.DDT is a trojan that installs MSIL/Kryptik.FOA malware.

9.9.2017

Win32/Agent.RXL

The trojan serves as a backdoor. It can be controlled remotely.

9.9.2017

MSIL/Bladabindi.AH

MSIL/Bladabindi.AH is a worm that spreads via removable media. The worm serves as a backdoor. It can be controlled remotely.

9.9.2017

Win32/Filecoder.Erebus.A

Win32/Filecoder.Erebus.A is a trojan that encrypts files on fixed, removable and network drives.

9.9.2017

Win32/Filecoder.
CryptoDefense.A

Win32/Filecoder.CryptoDefense.A is a trojan that encrypts files on fixed, removable and network drives.

8.9.2017

VBS.Forbiks

VBS.Forbiks is a worm that spreads via removable drives and network shares. It also downloads potentially malicious files. 

3.9.2017

TROJ_ANDROM.SVN

This malware is involved in the filelessly-installed backdoor malware attack discovered early August 2017.

3.9.2017

TROJ_PSINJECT.A

This malware is involved in the filelessly-installed backdoor malware attack discovered early August 2017.

3.9.2017

JS_POWMET.DE

This malware is involved in the filelessly-installed backdoor malware attack discovered early August 2017.

3.9.2017

BKDR_ANDROM.ETIN

This malware is the filelessly-installed backdoor malware discovered on early August 2017.

3.9.2017

BKDR_FORSHARE.A

This malware is linked to the discovery of fileless crytocurrency miner TROJ64_COINMINER.QO late August 2017.

3.9.2017

TROJ64_COINMINER.QO

This malware is a cryptocurrency mining malware discovered late August 2017 and found to be sporting fileless routines.

3.9.2017

TROJ_SHARIK.VDA

This malware was discovered on August 2017 to have been delivered by the Disdain exploit kit.

3.9.2017

ELF_SHELLBIND.A

This malware opens a command shell on the targeted system. It mainly targets IoT devices, particularly Network Attached Storage (NAS) devices.

3.9.2017

WORM_RETADUP.A

This information stealing malware was one of the IoCs found in recent attacks targeting hospitals in Israel. This malware is also notable for its stealth.

31.8.2017

Backdoor.Gazer

Backdoor.Gazer is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files. 

31.8.2017

Backdoor.Vodiboti

Backdoor.Vodiboti is a Trojan horse that opens a backdoor on the compromised computer. 

31.8.2017

Ransom.Lukitus

Ransom.Lukitus is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

31.8.2017

Trojan.Turbear

Trojan.Turbear is a Trojan horse that may perform malicious activities on the compromised computer. 

30.8.2017

Trojan.Downblocker

Trojan.Downblocker is a Trojan horse that downloads potentially malicious files onto the compromised computer. 

30.8.2017

OSX.Demsty

OSX.Demsty is a Trojan horse that opens a backdoor on the compromised computer. 

30.8.2017

Ransom.Defray

Ransom.Defray is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

30.8.2017

Backdoor.Notestuk

 

29.8.2017

Win32/Kryptik.FRWV

Win32/Kryptik.FRWV is a trojan that installs Win32/Agent.YIJ malware.

29.8.2017

Win32/Agent.RRE

The trojan serves as a backdoor. It can be controlled remotely.

29.8.2017

Win32/Joao

Win32/Joao is a trojan which tries to download other malware from the Internet.

29.8.2017

Win32/AutoRun.
Agent.AQX

Win32/AutoRun.Agent.AQX is a worm that spreads via removable media.

29.8.2017

MSIL/Small.AG

The trojan serves as a backdoor. It can be controlled remotely.

29.8.2017

MSIL/Injector.SCX

The trojan has a simple payload.

29.8.2017

Win32/Agent.YWQ

Win32/Agent.YWQ is a trojan which tries to download other malware from the Internet.

29.8.2017

Win32/Agent.SSA

The trojan serves as a backdoor. It can be controlled remotely.

29.8.2017

MSIL/Agent.AZM

MSIL/Agent.AZM serves as a backdoor. It can be controlled remotely.

29.8.2017

Win32/Filecoder.FV

Win32/Filecoder.FV is a trojan that encrypts files on local drives.

29.8.2017

Win32/Agent.SLM

Win32/Agent.SLM serves as a backdoor. It can be controlled remotely.

29.8.2017

Win32/Agent.YIJ

Win32/Agent.YIJ is a trojan that steals passwords and other sensitive information.

29.8.2017

JS/Adware.BNXAds

JS/Adware.BNXAds is an adware - an application designed for delivery of unsolicited advertisements.

29.8.2017

Win32/CoinMiner.YB

Win32/CoinMiner.YB is a trojan that uses the hardware resources of the infected computer for mining the Monero digital currency.

29.8.2017

Win32/AutoRun.
Agent.ARE

Win32/AutoRun.Agent.ARE is a worm that spreads via shared folders and removable media.

29.8.2017

Win32/Equdrug.I

Win32/Equdrug.I is a trojan that steals sensitive information.

29.8.2017

Win32/Spy.Banker.ADYV

Win32/Spy.Banker.ADYV is a trojan that steals passwords and other sensitive information.

29.8.2017

Win32/Filecoder.
ThunderCrypt.A

Win32/Filecoder.ThunderCrypt.A is a trojan that encrypts files on fixed, removable and network drives.

29.8.2017

Win32/Poxters.E

The trojan serves as a backdoor. It can be controlled remotely.

17.8.2017

Backdoor.Shadowpad

Backdoor.Shadowpad is a Trojan horse that opens a backdoor on the compromised computer. 

15.8.2017

JS.Bateleur

 

8.8.2017

Backdoor.Weasel

Backdoor.Weasel is a Trojan horse that opens a backdoor on the compromised computer and uses it to conduct distributed denial of service attacks. 

31.7.2017

Trojan.Heriplor

Trojan.Heriplor is a Trojan horse that opens a backdoor on the compromised computer. 

31.7.2017

Trojan.Karagany.B

Trojan.Karagany.B is a Trojan horse that downloads potentially malicious files onto the compromised computer. 

31.7.2017

Trojan.Ismagent

Trojan.Ismagent is a Trojan horse that opens a backdoor on the compromised computer. 

27.7.2017

Ransom.Reyptson

Ransom.Reyptson is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

27.7.2017

Backdoor.Krad

Backdoor.Krad is a Trojan horse that may perform malicious activities on the compromised computer.

26.7.2017

Trojan.Ismdoor.B

Trojan.Ismdoor.B is a Trojan horse that may open a backdoor and steals information from the compromised computer. 

22.7.2017

Exp.CVE-2017-3099

Exp.CVE-2017-3099 is a heuristic detection for files attempting to exploit the Adobe Flash Player Remote Memory Corruption Vulnerability (CVE-2017-3099). 

22.7.2017

Exp.CVE-2017-3100

Exp.CVE-2017-3100 is a heuristic detection for files attempting to exploit the Adobe Flash Player Information Disclosure Vulnerability (CVE-2017-3100). 

22.7.2017

Exp.CVE-2017-8601

Exp.CVE-2017-8601 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8601). 

22.7.2017

Exp.CVE-2017-8605

Exp.CVE-2017-8598 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8598). 

22.7.2017

Exp.CVE-2017-8617

Exp.CVE-2017-8594 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-8594). 

22.7.2017

Exp.CVE-2017-8618

Exp.CVE-2017-8592 is a heuristic detection for files attempting to exploit the Microsoft Edge and Internet Explorer Security Bypass Vulnerability (CVE-2017-8592). 

22.7.2017

Exp.CVE-2017-8619

Exp.CVE-2017-0243 is a heuristic detection for files attempting to exploit the Microsoft Office Remote Code Execution Vulnerability (CVE-2017-0243). 

22.7.2017

Exp.CVE-2017-0243

Exp.CVE-2017-8619 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Code Execution Vulnerability (CVE-2017-8619). 

22.7.2017

Exp.CVE-2017-8592

Exp.CVE-2017-8618 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Code Execution Vulnerability (CVE-2017-8618). 

22.7.2017

Exp.CVE-2017-8594

Exp.CVE-2017-8617 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Code Execution Vulnerability (CVE-2017-8617). 

22.7.2017

Exp.CVE-2017-8598

Exp.CVE-2017-8605 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8605). 

21.7.2017

Backdoor.Rurtar

Backdoor.Rurtar is a Trojan horse that opens a backdoor on the compromised computer and may perform malicious activities. 

20.7.2017

Exp.CVE-2017-6753

Exp.CVE-2017-6753 is a heuristic detection for files attempting to exploit the Cisco WebEx Browser Extension Remote Code Execution Vulnerability (CVE-2017-6753). 

20.7.2017

Trojan.Tinukebot

Trojan.Tinukebot is a Trojan horse that may perform malicious activities on the compromised computer. 

20.7.2017

SHELLBIND

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

18.7.2017

Ransom.Shifr

Ransom.Shifr is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

17.7.2017

Trojan.Phisherly

Trojan.Phisherly is a Trojan horse that steals user credentials from the compromised computer. 

13.7.2017

Trojan.Emotet

Trojan.Emotet is a Trojan horse that downloads potentially malicious files and may carry out malicious activities on the compromised computer. 

13.7.2017

Infostealer.Lockpos

Infostealer.Lockpos is a Trojan horse that steals information from the compromised computer. 

13.7.2017

Ransom.Karo

Ransom.Karo is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

13.7.2017

Infostealer.Neupos

Infostealer.Neupos is a Trojan horse that steals information from the compromised computer. 

13.7.2017

Backdoor.Goodor

Backdoor.Goodor is a Trojan horse that opens a backdoor on the compromised computer. 

13.7.2017

Backdoor.Dorshel

Backdoor.Dorshel is a Trojan horse that opens a backdoor and may perform malicious activities on the compromised computer.

12.7.2017

Trojan.Listrix

Trojan.Listrix is a Trojan horse that performs malicious activities on the compromised computer. 

11.7.2017

SoftwareBundler:
Win32/FileTour 

We have seen this application install other software on your PC.

11.7.2017

Trojan.Listrix

Trojan.Listrix is a Trojan horse that performs malicious activities on the compromised computer. 

11.7.2017

Ransom:Win32/
Enestaller 

This threat is a scriptable installer engine used to deliver malicious payloads, mostly ransomware, such as Ransom:Win32/Enestedel.

11.7.2017

Ransom:Win32/
Enestedel 

This threat comes in the form of a .DLL file which is dropped and then executed to decrypt and run a malicious payload, typically a ransomware.

6.7.2017

VBS.Vlerli

VBS.Vlerli is a worm that opens a backdoor on the compromised computer and spreads via removable drives and network shares.

6.7.2017

SoftwareBundler:
MSIL/Wizrem 

This threat is usually downloaded by another application to be executed in the background. Most of its samples do not have a standard GUI or window.

6.7.2017

Ransom.Fakecry

Ransom.Fakecry is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

5.7.2017

Ransom.Haknata

Ransom.Haknata is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

4.7.2017

Trojan:JS/Jesapi.A!cl 

This threat has been identified by heuristics as an emerging malware attack.

30.6.2017

Ransom.Beeteeceeware

Ransom.Beeteeceeware is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

30.6.2017

W32.Futurax

W32.Futurax is a worm that spreads via removable drives and network shares. 

29.6.2017

Ransom:Win32/Petya 

We observed telemetry showing that this ransomware can infect computers using the updater process of the legitimate application MEDoc.

28.6.2017

Ransom:Win32/Petya.B 

We observed telemetry showing that this ransomware can infect computers using the updater process of the legitimate application MEDoc.

28.6.2017

Ransom:Win32/Petya 

It steals credentials or re-uses existing active sessions and then use file-shares to transfer malicious files across machines on the same network.

28.6.2017

Ransom:Win32/Petya.A 

This threat may be installed by malicious documents and distributed through email and uses exploits to distribute.

28.6.2017

Win32/Petya 

This ransomware overwrites the Master Boot Record (MBR) with Ransom:DOS/Petya.A and encrypts system drive sectors.

28.6.2017

Trojan:Win32/Petya.G 

This threat may be installed by malicious documents with embedded macro code and distributed via email.

28.6.2017

Ransom:DOS/Petya.B 

This threat may be installed by malicious documents with embedded macro code and distributed via email.

28.6.2017

Ransom:DOS/Petya.A 

Upon execution, this threat overwrites the Master Boot Record (MBR) with Ransom:DOS/Petya.A, and encrypts system drive sectors.

28.6.2017

RANSOM_PETYA.SMA

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

28.6.2017

Ransom:Win32/Petya 

If the machine is vulnerable, it uses smb admin$ method to drop the payload to the system under %systemroot%\perfc.dat and tries to execute via psexc or wmi remoting.

28.6.2017

Ransom:Win32/Petya.B 

If the machine is vulnerable, it uses smb admin$ method to drop the payload to the system under %systemroot%\perfc.dat and tries to execute via psexc or wmi remoting.

27.6.2017

Win32/Diskcoder.Petya.B

Win32/Diskcoder.Petya.B is a trojan that encrypts specific parts of drives.

27.6.2017

Win32/Diskcoder.Petya.D

Win32/Diskcoder.Petya.D is a trojan that encrypts files on fixed, removable and network drives.

27.6.2017

OSX.Macspy

OSX.Macspy is a Trojan horse that opens a backdoor on the compromised computer. 

27.6.2017

Backdoor.Croxbow

Backdoor.Croxbow is a Trojan horse that may perform malicious activities on the compromised computer. 

27.6.2017

Trojan.Gordry

Trojan.Gordry is a Trojan horse that may perform malicious activities on the compromised computer. 

27.6.2017

Backdoor.Pled

Backdoor.Pled is a Trojan horse that opens a backdoor and may perform malicious activities on the compromised computer.

26.6.2017

Ransom:Linux/Erebus.A 

This threat runs on Linux system and drops the following files for instruction to decrypt the files. Files are dropped in the same directory.

23.6.2017

OSX.Salgorea.B

OSX.Salgorea.B is a Trojan horse that opens a backdoor on the compromised computer.

23.6.2017

Trojan:Win32/
CrashOverride.A 

We have seen this threat connect to any of the following remote hosts (C2 server/ToR nodes).

22.6.2017

Trojan.Bleagle

Trojan.Bleagle is a Trojan horse that encrypts files on the compromised computer. 

20.6.2017

Ransom.Sorebrect

Ransom.Sorebrect is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

20.6.2017

Trojan.Bleagle

Trojan.Bleagle is a Trojan horse that encrypts files on the compromised computer. 

17.6.2017

Ransom:Win32/
Sorikrypt.A 

This ransomware is generated by attackers using a free ransomware construction called Xorcist.

16.6.2017

Ransom:Win32/Jaffrans 

This ransomware is downloaded onto target computers by malicious documents in spammed email messages.

16.6.2017

Ransom:Linux/Erebus.A 

 

14.6.2017

BrowserModifier:
Win32/Xiazai 

 

14.6.2017

Trojan.Latentbot

Trojan.Latentbot is a Trojan horse that may perform malicious activities on the compromised computer. 

13.6.2017

Python/Agent.F

Python/Agent.F is a worm that spreads via removable media.

13.6.2017

Win32/Spy.Agent.OXM

Win32/Spy.Agent.OXM serves as a backdoor. It can be controlled remotely.

13.6.2017

Win32/Spy.Delf.QLL

Win32/Spy.Delf.QLL is a trojan that steals sensitive information. The trojan attempts to send gathered information to a remote machine.

13.6.2017

Win32/Filecoder.AESNI.B

Win32/Filecoder.AESNI.B is a trojan that encrypts files on fixed, removable and network drives. To decrypt files, the user is asked to send

13.6.2017

Win32/Spy.Ursnif.AM

Win32/Spy.Ursnif.AM serves as a backdoor. It can be controlled remotely. The trojan collects various sensitive information.

13.6.2017

Ransom.Erebus

Ransom.Erebus is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

13.6.2017

Backdoor.Industroyer

Backdoor.Industroyer is a Trojan horse that opens a backdoor on the compromised computer. 

13.6.2017

Android.WannaLocker

Android.WannaLocker is a Trojan horse for Android devices that encrypts files on the device's external storage and demands a payment to decrypt them. 

9.6.2017

VBS.Heur.SNIC

VBS.Heur.SNIC is a heuristic detection used to detect VBScript threats. 

9.6.2017

JS.Heur.SNIC

JS.Heur.SNIC is a heuristic detection used to detect JavaScript threats. 

9.6.2017

Android.Dvmap

Android.Dvmap is a Trojan horse for Android devices that may perform malicious activities on the compromised device. 

7.6.2017

Infostealer.Bancos.BG

Infostealer.Bancos.BG is a Trojan horse that may perform malicious activities on the compromised computer. 

7.6.2017

Trojan.Rochim

Trojan.Rochim is a Trojan horse that may perform a man-in-the-middle (MitM) attack on the browser installed on the compromised computer. 

6.6.2017

Trojan.Fireball

Trojan.Fireball is a Trojan horse that downloads potentially malicious files onto the compromised computer. 

4.6.2017

BAT/Agent.NEM

BAT/Agent.NEM is a worm which tries to download other malware from the Internet. The worm may create copies of itself on removable drives.

4.6.2017

OSX/OceanLotus.A

The trojan serves as a backdoor. It can be controlled remotely.

4.6.2017

OSX/Filecoder.KeRanger.A

OSX/Filecoder.KeRanger.A is a trojan that encrypts files on local drives.

4.6.2017

OSX/Keydnap.A

The trojan serves as a backdoor. It can be controlled remotely. The trojan collects various sensitive information.

4.6.2017

OSX/FruitFly.A

The trojan serves as a backdoor. It can be controlled remotely.

4.6.2017

OSX/Sednit.B

The trojan serves as a backdoor. It can be controlled remotely.

4.6.2017

Win32/Amitis.143

Win32/Amitis.143.B serves as a backdoor. It can be controlled remotely. The file is run-time compressed using UPX .

4.6.2017

Win32/Amitis

Win32/Amitis serves as a backdoor. It can be controlled remotely.

4.6.2017

JS/Adware.AztecMedia

JS/Adware.AztecMedia is an adware - an application designed for delivery of unsolicited advertisements.

4.6.2017

JS/Adware.Imali

JS/Adware.Imali is an adware - an application designed for delivery of unsolicited advertisements.

4.6.2017

JS/Adware.Serhoxs

JS/Adware.Serhoxs is an adware - an application designed for delivery of unsolicited advertisements.

4.6.2017

Win32/Filecoder.AESNI.A

Win32/Filecoder.AESNI.A is a trojan that encrypts files on fixed, removable and network drives.

4.6.2017

Win32/TrojanDownloader.
Blackmoon.C

Win32/TrojanDownloader.Blackmoon.C is a trojan which tries to download other malware from the Internet.

4.6.2017

Win32/Filecoder.
WannaCryptor.D

Win32/Filecoder.WannaCryptor.D is a trojan that encrypts files on local drives.

4.6.2017

Win32/Kryptik.FRAH

Win32/Kryptik.FRAH is a trojan that installs PowerShell/Spy.Banker.E malware.

4.6.2017

PowerShell/Spy.Banker.E

Powershell/Spy.Banker.E is a trojan which tries to download other malware from the Internet.

4.6.2017

Win32/Coin.Miner.AFR

The trojan serves as a backdoor. It can be controlled remotely.

4.6.2017

Win32/Filecoder.
WannaCryptor.B

Win32/Filecoder.WannaCryptor.B is a trojan that encrypts files on local drives.

4.6.2017

Win32/Turla.CE

Win32/Turla.CE serves as a backdoor. It can be controlled remotely.

4.6.2017

Win32/Rootkit.
BlackEnergy.BH

Win32/Rootkit.BlackEnergy.BH installs a backdoor that can be controlled remotely.

1.6.2017

Trojan.Wimhop

Trojan.Wimhop is a Trojan horse that uses the Windows Management Instrumentation Command-line to start processes remotely on other Windows computers. 

1.6.2017

Linux.Imeij

Linux.Imeij is a Trojan horse that opens a backdoor on the compromised computer.

1.6.2017

Trojan.Wimhop

 

1.6.2017

Linux.Imeij

 

31.5.2017

Backdoor:ASP/
Seasharpee.A 

The presence of this threat indicates that a remote attacker successfully gained unauthorized access and installed this backdoor in the server.

31.5.2017

Backdoor:ASP/
Seasharpee.A 

 

30.5.2017

Backdoor.Felismus

Backdoor.Felismus is a Trojan horse that may perform malicious activities on the compromised computer. 

30.5.2017

Backdoor.Felismus

 

27.5.2017

JS/Adware.Serhoxs

 

26.5.2017

Ransom.GlobeImposter

Ransom.GlobeImposter is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

26.5.2017

Ransom.Jaff

Ransom.Jaff is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

26.5.2017

Ransom.GlobeImposter

 

26.5.2017

Ransom.Jaff

 

25.5.2017

RANSOM_WCRY.SM

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

25.5.2017

W32.Styes

W32.Styes is a worm that opens a backdoor on the compromised computer and spreads through removable drives and open shares.

25.5.2017

RANSOM_WCRY.SM

 

25.5.2017

W32.Styes

 

24.5.2017

Ransom:Win32/
WannaCrypt 

This ransomware can stop you from using your PC or accessing your data. Unlike other ransomware, however, this threat has worm capabilities.

24.5.2017

Ransom:Win32/
Tescrypt.T 

The threat might be dropped by exploit kits such as Exploit:SWF/Axpergle (Angler), Exploit:JS/Neclu (Nuclear), JS/Fiexp (Fiesta), and JS/Anogre (Sweet Orange).

24.5.2017

Ransom:Win32/
WannaCrypt 

 

24.5.2017

Ransom:Win32/
Tescrypt.T 

 

23.5.2017

W32.Eternalrocks

W32.Eternalrocks is a Trojan horse that may perform malicious activities on the compromised computer. 

23.5.2017

Backdoor.Forshare

Backdoor.Forshare is a Trojan horse that opens a backdoor on the compromised computer and downloads potentially malicious files. 

23.5.2017

Trojan.Bravonc

Trojan.Bravonc is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files.

23.5.2017

Trojan.Alphanc

Trojan.Alphanc is a Trojan horse that opens a back door and downloads potentially malicious files onto the compromised computer. 

23.5.2017

W32.Eternalrocks

 

23.5.2017

Backdoor.Forshare

 

23.5.2017

Trojan.Bravonc

 

23.5.2017

Trojan.Alphanc

 

19.5.2017

Trojan:Win32/Adylkuzz.B

It terminates any existing instance of its coin-mining process. This behavior indicates that it can update an existing version of this threat in the infected machine.

19.5.2017

Trojan:Win32/Adylkuzz.B

 

18.5.2017

RANSOM_WANA.A

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

18.5.2017

Ransom.Uiwix

Ransom.Uiwix is a Trojan horse that encrypts files and demands a payment to decrypt them.

18.5.2017

Trojan.Sosopod

Trojan.Sosopod is a Trojan horse that downloads potentially malicious files onto the compromised computer. 

18.5.2017

Ransom:Win32/
Uiwix.A!rsm 

This ransomware can arrive on a machine by leveraging the following vulnerability: 

18.5.2017

Trojan.Adylkuzz

Trojan.Adylkuzz is a Trojan horse that downloads a cryptocurrency miner onto the compromised computer. 

18.5.2017

Hacktool.Seasharpee

This hacking tool is a web shell for ASP servers. 

18.5.2017

MonitoringTool:
Win32/MicTrayDebugger 

This threat is a flaw in an out-of-date Conexant HD Audio Driver installation that is pre-installed on some models of HP PCs.

18.5.2017

RANSOM_WANA.A

 

18.5.2017

Ransom.Uiwix

 

18.5.2017

Trojan.Sosopod

 

18.5.2017

Ransom:Win32/Uiwix.A!rsm 

 

18.5.2017

Trojan.Adylkuzz

 

18.5.2017

Hacktool.Seasharpee

 

18.5.2017

MonitoringTool:
Win32/MicTrayDebugger 

16.5.2017

Ransom:Win32/WannaCrypt 

This ransomware can stop you from using your PC or accessing your data. Unlike other ransomware, however, this threat has worm capabilities.

15.5.2017

RANSOM_WCRY.SM

This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

15.5.2017

Ransom:Win32/WannaCrypt 

This ransomware can stop you from using your PC or accessing your data. Unlike other ransomware, however, this threat has worm capabilities.

15.5.2017

RANSOM_WCRY.SM

 

15.5.2017

Ransom:Win32/WannaCrypt 

 

13.5.2017

RANSOM_WANA.A

This ransomware exploits the MS17-010 vulnerability to spread to other vulnerable computers. 

13.5.2017

Ransom:Win32/WannaCrypt 

This ransomware can stop you from using your PC or accessing your data. Unlike other ransomware, however, this threat has worm capabilities.

13.5.2017

Trojan:Win32/Mulrolu.A!cl 

 

13.5.2017

Program:Win32/Vigram.A 

 

13.5.2017

RANSOM_WANA.A

 

13.5.2017

Ransom:Win32/WannaCrypt 

 

13.5.2017

Trojan:Win32/Mulrolu.A!cl 

 

13.5.2017

Program:Win32/Vigram.A 

 

12.5.2017

Exp.CVE-2017-0262

Exp.CVE-2017-0262 is a heuristic detection for files attempting to exploit the Microsoft Office Remote Code Execution Vulnerability (CVE-2017-0262). 

12.5.2017

Trojan.Boyapki

Trojan.Boyapki is a Trojan horse that opens a backdoor and downloads potentially malicious files onto the compromised computer. 

12.5.2017

Trojan.Halabake

Trojan.Halabake is a Trojan horse that opens a back door on the compromised computer. It may also download potentially malicious files. 

12.5.2017

Win32/Filecoder.
WannaCryptor.D

 

12.5.2017

Exp.CVE-2017-0262

 

12.5.2017

Trojan.Boyapki

 

12.5.2017

Trojan.Halabake

 

10.5.2017

PowerShell/Spy.Banker.E

 

10.5.2017

JS/Adware.Imali

 

9.5.2017

ELF_SHISHIGA.A

This malware was discovered on early May 2017 and is found to be capable of brute-forcing Telnet and SSH logins.

9.5.2017

Trojan.Reblight

Trojan.Reblight is a Trojan horse that may perform malicious activities on the compromised computer. 

9.5.2017

ELF_SHISHIGA.A

 

9.5.2017

Trojan.Reblight

 

8.5.2017

OSX.Proton

OSX.Proton is a Trojan horse that opens a backdoor, steals information, and downloads potentially malicious files onto the compromised computer. 

8.5.2017

JS.Netrepser

JS.Netrepser is a Trojan horse that opens a backdoor, steals information, and downloads potentially malicious files onto the compromised computer. 

8.5.2017

Trojan.Cassowar

Trojan.Cassowar is a Trojan horse that opens a backdoor, steals information, and downloads potentially malicious files onto the compromised computer. 

8.5.2017

OSX.Proton

 

8.5.2017

JS.Netrepser

 

8.5.2017

Trojan.Cassowar

 

5.5.2017

OSX.Turla

OSX.Turla is a Trojan horse that provides backdoor access to the compromised computer. 

5.5.2017

Backdoor.Noknef

Backdoor.Noknef is a Trojan horse that opens a backdoor on the compromised computer. 

5.5.2017

OSX.Turla

 

5.5.2017

Backdoor.Noknef

 

4.5.2017

Trojan:Win32/Fuery.A!cl 

 

4.5.2017

Trojan:Win32/Fuery.B!cl 

 

4.5.2017

Trojan.Atmocash

Trojan.Atmocash is a Trojan horse that allows an attacker to carry out malicious actions on an ATM machine. 

4.5.2017

JS/Adware.AztecMedia

 

4.5.2017

Trojan:Win32/Fuery.A!cl 

 

4.5.2017

Trojan:Win32/Fuery.B!cl 

 

4.5.2017

Trojan.Atmocash

 

2.5.2017

Python.Bellabot

Python.Bellabot is a Trojan horse that opens a backdoor and steals information from the compromised computer. 

2.5.2017

Trojan.Destfallen.B

Trojan.Destfallen.B is a Trojan horse that overwrites the master boot record on the compromised computer. 

2.5.2017

Python.Bellabot

 

2.5.2017

Trojan.Destfallen.B

 

30.4.2017

Trojan:Win32/Msposer.C 

This threat belongs to the Trojan:Win32/Msposer family of trojan which pretends to be Microsoft products.

30.4.2017

Trojan:Win32/Msposer.C 

 

28.4.2017

OSX.Doku

OSX.Doku is a Trojan horse that redirects traffic on the compromised computer. 

28.4.2017

Trojan:PDF/Tetomek.A 

This threat is a PDF file with a hyperlink that links to another malware.

28.4.2017

Trojan:Win32/Emotet.K

This threat is distributed from a .pdf file attachment which contains a link that points to a JS file.

28.4.2017

Win32/Coin.Miner.AFR

 

28.4.2017

OSX.Doku

 

28.4.2017

Trojan:PDF/Tetomek.A 

 

28.4.2017

Trojan:Win32/Emotet.K

 

26.4.2017

Linux.Shishiga

Linux.Shishiga is a worm that opens a backdoor on the compromised computer and downloads potentially malicious files. 

26.4.2017

Linux.Shishiga

 

25.4.2017

Infostealer.Lokibot

Infostealer.Lokibot is a Trojan horse that steals information from the compromised computer. 

25.4.2017

Trojan.Pidief.X

Trojan.Pidief.X is a detection for malicious PDF files that lead to additional malware being downloaded on to the compromised computer. 

25.4.2017

Infostealer.Lokibot

 

25.4.2017

Trojan.Pidief.X

 

24.4.2017

Backdoor.Miskip

Backdoor.Miskip is a Trojan horse that opens a back door on the compromised computer. 

24.4.2017

Backdoor.Miskip

 

22.4.2017

Trojan.Lodarat

Trojan.Lodarat is a Trojan horse that opens a backdoor and steals information from the compromised computer. 

22.4.2017

Backdoor.Doublepulsar

Backdoor.Doublepulsar is a Trojan horse that opens a back door on the compromised computer. 

22.4.2017

Trojan.Lodarat

 

22.4.2017

Backdoor.Doublepulsar

 

21.4.2017

Trojan.Darkpulsar

Trojan.Darkpulsar is a Trojan horse that may perform malicious activities on the compromised computer. 

21.4.2017

Trojan.Darkpulsar

 

18.4.2017

JS.Downloader.H

JS.Downloader.H is a Trojan horse that downloads potentially malicious files and executes them on the compromised computer. 

18.4.2017

Trojan.Spanderditz

Trojan.Spanderditz is a Trojan horse that may perform malicious activities on the compromised computer. 

18.4.2017

Backdoor.Raslup

Backdoor.Raslup is a Trojan horse that may perform malicious activities on the compromised computer. 

18.4.2017

Backdoor.Objod

Backdoor.Objod is a Trojan horse that may perform malicious activities on the compromised computer. 

18.4.2017

Trojan.Symmi

Trojan.Symmi is a Trojan horse that opens a back door on the compromised computer. It may also download potentially malicious files. 

18.4.2017

Ransom.Mole

Ransom.Mole is a Trojan horse that encrypts files on the compromised computer and asks the user to pay in order to decrypt them. 

18.4.2017

VBS.Dropper.A

VBS.Dropper.A is a Trojan horse that executes other malicious files on the compromised computer. 

18.4.2017

Trojan.Crusader

Trojan.Crusader is a Trojan horse that may monitor and modify all Internet traffic and perform malicious actions. 

18.4.2017

Linux.Cheepori

Linux.Cheepori is a Trojan horse that opens a reverse shell on the compromised computer. 

18.4.2017

Trojan.Sathurbot

Trojan.Sathurbot is a Trojan horse that may perform malicious activities on the compromised computer. 

18.4.2017

Linux.Migajick

Linux.Migajick is a Trojan horse that sends and receives encrypted traffic to malware already installed on the compromised computer. 

18.4.2017

Linux.Valsheesy

Linux.Valsheesy is a Trojan horse that downloads potentially malicious files onto the compromised computer. 

18.4.2017

Linux.Amnesiark

Linux.Amnesiark is a Trojan horse that opens a back door on the compromised computer. 

18.4.2017

Backdoor.Cruprox

Backdoor.Cruprox is a Trojan horse that may perform malicious activities on the compromised computer. 

18.4.2017

Trojan.Kasperbogi

Trojan.Kasperbogi is a Trojan horse that may perform malicious activities on the compromised computer. 

18.4.2017

Backdoor.Rokrat

Backdoor.Rokrat is a Trojan horse that opens a back door on the compromised computer. It may also download potentially malicious files and steal information. 

18.4.2017

Backdoor.Lisdazz

Backdoor.Lisdazz is a Trojan horse that opens a back door on the compromised computer. It may also steal information. 

18.4.2017

Trojan.Redleavy

Trojan.Redleavy is a Trojan horse that steals information from the compromised computer. 

18.4.2017

Trojan.Hirsdov

Trojan.Hirsdov is a Trojan horse that opens a back door and steals information from the compromised computer. 

18.4.2017

Backdoor.Khrat

Backdoor.Khrat is a Trojan horse that opens a back door on the compromised computer. It may also steal information. 

18.4.2017

Trojan.Dimnie

Trojan.Dimnie is a Trojan horse that steals information from the compromised computer. 

18.4.2017

Trojan.Aczibo

Trojan.Aczibo is a Trojan horse that opens a back door on the compromised computer. It also installs adware and potentially unwanted applications. 

18.4.2017

Exp.CVE-2017-0010

Exp.CVE-2017-0010 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-0010). 

18.4.2017

Trojan.Cadanif

Trojan.Cadanif is a Trojan horse that opens a back door on the compromised computer and downloads potentially malicious files. 

18.4.2017

Exp.CVE-2017-0015

Exp.CVE-2017-0015 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-0015). 

18.4.2017

Exp.CVE-2017-0018

Exp.CVE-2017-0018 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-0018). 

18.4.2017

Exp.CVE-2017-0154

Exp.CVE-2017-0154 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer CVE-2017-0154 Remote Privilege Escalation Vulnerability (CVE-2017-0154). 

18.4.2017

Exp.CVE-2017-0050

Exp.CVE-2017-0050 is a heuristic detection for files attempting to exploit the Microsoft Windows Kernel Local Privilege Escalation Vulnerability (CVE-2017-0050). 

18.4.2017

Exp.CVE-2017-0149

Exp.CVE-2017-0149 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer CVE-2017-0149 Remote Memory Corruption Vulnerability (CVE-2017-0149). 

18.4.2017

Exp.CVE-2017-0067

Exp.CVE-2017-0067 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-0067). 

18.4.2017

Exp.CVE-2017-0141

Exp.CVE-2017-0141 is a heuristic detection for files attempting to exploit the Microsoft Edge CVE-2017-0141 Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-0141). 

18.4.2017

JS.Downloader.H

 

18.4.2017

Trojan.Spanderditz

 

18.4.2017

Backdoor.Raslup

 

18.4.2017

Backdoor.Objod

 

18.4.2017

Trojan.Symmi

 

18.4.2017

Ransom.Mole

 

18.4.2017

VBS.Dropper.A

 

18.4.2017

Trojan.Crusader

 

18.4.2017

Linux.Cheepori

 

18.4.2017

Trojan.Sathurbot

 

18.4.2017

Linux.Migajick

 

18.4.2017

Linux.Valsheesy

 

18.4.2017

Linux.Amnesiark

 

18.4.2017

Backdoor.Cruprox

 

18.4.2017

Trojan.Kasperbogi

 

18.4.2017

Backdoor.Rokrat

 

18.4.2017

Backdoor.Lisdazz

 

18.4.2017

Trojan.Redleavy

 

18.4.2017

Trojan.Hirsdov

 

18.4.2017

Backdoor.Khrat

 

18.4.2017

Trojan.Dimnie

 

18.4.2017

Trojan.Aczibo

 

18.4.2017

Exp.CVE-2017-0010

 

18.4.2017

Trojan.Cadanif

 

18.4.2017

Exp.CVE-2017-0015

 

18.4.2017

Exp.CVE-2017-0018

 

18.4.2017

Exp.CVE-2017-0154

 

18.4.2017

Exp.CVE-2017-0050

 

18.4.2017

Exp.CVE-2017-0149

 

18.4.2017

Exp.CVE-2017-0067

 

18.4.2017

Exp.CVE-2017-0141

 

13.4.2017

MSIL/TrojanDownloader
.Agent.DFV

 

10.4.2017

Win32/Kryptik.FRAH

 

6.4.2017

Win32/Filecoder.
WannaCryptor.B

 

30.3.2017

JS/Chromex.Submelius

 

28.3.2017

Win32/Turla.CE

 

15.3.2017

JS/Danger.ScriptAttachment

 

14.3.2017

Win32/Spy.Agent.PCS

 

14.3.2017

MSIL/Spy.Agent.AXI

 

13.3.2017

Win32/Agent.YSM

 

10.3.2017

Win32/Glupteba.AV

 

3.3.2017

Win32/Minzen.D

 

28.2.2017

MSIL/Filecoder.OwnHead.A

 

23.2.2017

Win32/Minzen.E

 

22.2.2017

Win32/Kryptik.FOSF

 

22.2.2017

Win32/Injector.DLQI

 

21.2.2017

Win32/Filecoder.Cerber.H

 

15.2.2017

Win32/Cometer.A

 

8.2.2017

Win32/Ibashade.C

 

3.2.2017

MSIL/PSW.Agent.QCD

 

2.2.2017

MSIL/Agent.ARP

 

19.1.2017

OSX/FruitFly.A

 

17.1.2017

Win32/Revokery.A

 

15.1.2017

Win32/Rozena.UF

 

11.1.2017

Win32/Filecoder.Spora.A

 

9.1.2017

Win32/Dande.A