Threats H THREATS THREATS LIST - H Alert Attacks Bugtraq CERT Exploit GHDB IDS/IPS Malware Operation Phishing Ransom Vulnerebility
H BOTNET CRYPTOMINER MALWARE FAMILIES MALWARE COMPUTER ATTACK MOBIL BANKING MALWARE MOBIL MALWARE MOBIL RANSOMWARE RAT MALWARE OSX MALWARE macOS MALWARE IoT MALWARE RANSOMWARE Stalkerware APT MALWARE APT Group ATM MALWARE BANKING MALWARE ANDROID MALWARE POS Malware
macOS MALWRE
A | ||
backdoor | ||
keylogger | ||
backdoor | ||
B | ||
keylogger | ||
worm (poc) | ||
cryptominer | ||
backdoor | ||
adware | ||
C | ||
backdoor | ||
backdoor | ||
backdoor | ||
adware | ||
virus (poc) | ||
adware | ||
bitcoin stealer | ||
backdoor | ||
adware | ||
cryptominer, backdoor | ||
adware (poc) | ||
backdoor | ||
cryptominer | ||
cryptominer | ||
backdoor | ||
backdoor | ||
D | ||
backdoor | ||
miner | ||
spyware/miner | ||
backdoor | ||
spyware (proxy) | ||
backdoor | ||
E | ||
backdoor | ||
backdoor | ||
keylogger | ||
dropper | ||
backdoor | ||
backdoor | ||
spyware | ||
F | ||
adware | ||
adware | ||
ransomware | ||
ransomware | ||
backdoor | ||
adware | ||
backdoor | ||
backdoor | ||
backdoor | ||
G | ||
adware | ||
backdoor | ||
ransomware | ||
backdoor | ||
ransomware (poc) | ||
adware/pup | ||
backdroor | ||
H | ||
backdoor | ||
backdoor |
| |
backdoor | ||
I | ||
backdoor | ||
worm (poc) | ||
adware | ||
adware | ||
botnet | ||
backdoor | ||
backdoor | ||
J | ||
backdoor | ||
backdoor | ||
K | ||
ransomware | ||
keylogger | ||
backdoor | ||
keylogger | ||
backdoor | ||
backdoor | ||
worm | ||
L | ||
backdoor | ||
backdoor | ||
backdoor | ||
backdoor | ||
backdoor | ||
file destroyer (poc) | ||
M | ||
ransomware (poc) | ||
virus (poc) | ||
adware | ||
backdoor | ||
adware | ||
backdoor | ||
ransomware | ||
adware/pup | ||
backdoor | ||
adware | ||
adware | ||
adware | ||
password stealer | ||
backdoor | ||
adware | ||
O | ||
backdoor | ||
worm | ||
adware/backdoor | ||
cryptominer | ||
P | ||
keyloggger | ||
backdoor | ||
backdoor | ||
| ||
| ||
backdoor | ||
adware | ||
miner | ||
Q | ||
adware | ||
R | ||
backdoor | ||
backdoor | ||
worm | ||
rootkit (poc) | ||
S | ||
adware | ||
backdoor | ||
adware | ||
backdoor | ||
backdoor | ||
adware | ||
backdoor | ||
T | ||
backdoor | ||
bot (poc) | ||
IRC bot | ||
V | ||
backdoor | ||
adware | ||
W | ||
backdoor | ||
rootkit (poc) | ||
backdoor | ||
backdoor | ||
backdoor | ||
X | ||
backdoor | ||
adware | ||
virus | ||
virus | ||
backdoor | ||
Y | ||
adware | ||
backdoor |
Trojan-Downloader.OSX.Shlayer.a
AdWare.OSX.Pirrit.j
AdWare.OSX.Cimpli.k
AdWare.OSX.Ketin.h
AdWare.OSX.Pirrit.aa
AdWare.OSX.Pirrit.o
AdWare.OSX.Pirrit.x
AdWare.OSX.Spc.a
AdWare.OSX.Cimpli.f
AdWare.OSX.Bnodlero.t
AdWare.OSX.Bnodlero.x
Hoax.OSX.SuperClean.gen
AdWare.OSX.Cimpli.h
AdWare.OSX.Pirrit.v
AdWare.OSX.Amc.c
AdWare.OSX.MacSearch.d
RiskTool.OSX.Spigot.a
AdWare.OSX.Pirrit.s
AdWare.OSX.Ketin.d
AdWare.OSX.Bnodlero.aq
Shlayer Trojan
not-a-virus:HEUR:AdWare.OSX.Bnodlero.q
not-a-virus:HEUR:AdWare.OSX.Spc.a
not-a-virus:HEUR:AdWare.OSX.Geonei.as
not-a-virus:HEUR:AdWare.OSX.Pirrit.j
not-a-virus:HEUR:AdWare.OSX.Pirrit.o
not-a-virus:HEUR:AdWare.OSX.MacSearch.a