Malware - Úvod 2019 2018 2017 2016 2015 2014 Bankovní Databáze Mobil Ransom Znalosti Programy Virus Calendar
2017 | ||
Datum | Název | Info |
31.12.2017 | Trojan.Zezin is a Trojan horse that downloads potentially malicious files onto the compromised computer. | |
27.12.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
27.12.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
21.12.2017 | Ransom.HC7 is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
21.12.2017 | Android.Anubisspy is a Trojan horse for Android devices that opens a backdoor, steals information, and downloads potentially malicious files. | |
15.12.2017 | Exp.CVE-2017-11886 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11886). | |
15.12.2017 | Trojan.Trisis is a Trojan horse that may perform malicious activities on the compromised computer. | |
15.12.2017 | Exp.CVE-2017-11890 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11890) | |
15.12.2017 | Exp.CVE-2017-11889 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11889). | |
15.12.2017 | Exp.CVE-2017-11893 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11893). | |
15.12.2017 | Exp.CVE-2017-11894 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer and Edge Remote Memory Corruption Vulnerability (CVE-2017-11894). | |
15.12.2017 | Exp.CVE-2017-11895 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer and Edge Remote Memory Corruption Vulnerability (CVE-2017-11895). | |
15.12.2017 | Exp.CVE-2017-11901 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11901). | |
15.12.2017 | Exp.CVE-2017-11907 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11907). | |
15.12.2017 | Exp.CVE-2017-11913 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11913). | |
7.12.2017 | Win32/KillAV.NTD is a trojan which tries to download other malware from the Internet. | |
7.12.2017 | Trojan.Bankice is a Trojan horse that steals information from the compromised computer. It may also download potentially malicious files. | |
7.12.2017 | Trojan.Finsev is a Trojan horse that may perform malicious activities on the compromised computer. | |
7.12.2017 | Exp.CVE-2017-16408 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16408). | |
30.11.2017 | MSIL/Filecoder.Fantom.A is a trojan that encrypts files on local drives. To decrypt files, the user is asked to send information/certain amount of money via the Bitcoin payment service. | |
30.11.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
30.11.2017 | Win32/Filecoder.Fantom.A is a trojan that encrypts files on local drives. To decrypt files, the user is asked to send information/certain amount of money via the Bitcoin payment service. | |
30.11.2017 | The trojan has a simple payload. | |
30.11.2017 | Win32/Patpoopy.D serves as a backdoor. It can be controlled remotely. | |
29.11.2017 | Exp.CVE-2017-16415 is a heuristic detection for files attempting to exploit the Adobe Reader and Acrobat Multiple Remote Code Execution Vulnerabilities (CVE-2017-16415). | |
29.11.2017 | Exp.CVE-2017-16392 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16392). | |
29.11.2017 | Exp.CVE-2017-16375 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16375). | |
29.11.2017 | Exp.CVE-2017-16389 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader Multiple Remote Code Execution Vulnerabilities (CVE-2017-16389). | |
29.11.2017 | Exp.CVE-2017-16390 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader Multiple Remote Code Execution Vulnerabilities (CVE-2017-16390). | |
29.11.2017 | Exp.CVE-2017-16373 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16373). | |
29.11.2017 | This Ransomware arrives as an attachment to email messages spammed by other malware/grayware or malicious users. | |
28.11.2017 | Exp.CVE-2017-16393 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader Multiple Remote Code Execution Vulnerabilities (CVE-2017-16393). | |
23.11.2017 | Exp.CVE-2017-16383 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader Remote Code Execution Vulnerability (CVE-2017-16383). | |
23.11.2017 | Exp.CVE-2017-16381 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16381). | |
23.11.2017 | Exp.CVE-2017-16384 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader Multiple Buffer Overflow Vulnerabilities (CVE-2017-16384). | |
23.11.2017 | Exp.CVE-2017-11882 is a heuristic detection for files attempting to exploit the Microsoft Office Memory Corruption Vulnerability (CVE-2017-11882). | |
23.11.2017 | Win32/Agent.NDM is a polymorphic and metamorphic file infector. | |
23.11.2017 | Android.Doublehidden is a Trojan horse for Android devices that displays advertisements and steals information from the compromised device. | |
22.11.2017 | Win32/TrojanDownloader.Tovkater.HB is a trojan which tries to download other malware from the Internet. | |
22.11.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
22.11.2017 | MSH.Pushbank is a PowerShell script that targets banking and ecommerce sites to steal information. | |
21.11.2017 | JS.Kraacha is a detection for a JavaScript exploit development framework. | |
21.11.2017 | Android.Fakeyouwon is a Trojan horse for Android devices that displays web pages promoting fake offer scams. | |
18.11.2017 | Android.Rootnik.B is a Trojan horse for Android devices that roots the device and downloads potentially malicious files. | |
18.11.2017 | Exp.CVE-2017-16396 is a heuristic detection for files attempting to exploit the Adobe Acrobat and Reader APSB17-36 Multiple Remote Code Execution Vulnerabilities (CVE-2017-16396). | |
18.11.2017 | Exp.CVE-2017-16410 is a heuristic detection for files attempting to exploit the Adobe Reader and Acrobat Multiple Remote Code Execution Vulnerabilities (CVE-2017-16410). | |
14.11.2017 | Trojan.Reaver is a Trojan horse that may perform malicious activities on the compromised computer. | |
14.11.2017 | Win32/StoneDrill.A is a trojan that deletes all files on the local and removable drives. The trojan can overwrite the entire contents of the drives with random data. | |
14.11.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
14.11.2017 | Win32/Delf.TUA is a trojan which tries to download other malware from the Internet. | |
13.11.2017 | Win32/Filecoder.Hermes.D is a trojan that encrypts files on fixed, removable and network drives. | |
10.11.2017 | Linux.Badbee is a Trojan horse that may perform malicious activities on the compromised computer. | |
10.11.2017 | Backdoor.Badbee is a Trojan horse that may perform malicious activities on the compromised computer. | |
9.11.2017 | Downloader.Dydoxic is a Trojan horse that downloads potentially malicious files onto the compromised computer. | |
7.11.2017 | This ransomware known as Bad Rabbit infected systems belonging to several high profile companies in Ukraine and Russia. It arrives via watering hole attack on compromised websites. | |
7.11.2017 | This ransomware, also known as Bad Rabbit, reportedly spread to networks of some high profile companies located in Ukraine and Russia. It spreads via network shares. | |
2.11.2017 | Win32/Filecoder.DilmaLocker.A is a trojan that encrypts files on local drives. | |
2.11.2017 | Win32/Filecoder.ArmaLocky.A is a trojan that encrypts files on fixed, removable and network drives. | |
1.11.2017 | W97M.Downloader.P is a Trojan horse that may perform malicious activities on the compromised computer. | |
27.10.2017 | This ransomware, also known as Bad Rabbit, reportedly spread to networks of some high profile companies located in Ukraine and Russia. It spreads via network shares. | |
25.10.2017 | This malware is one of the variants/components of RETADUP malware discovered on September 2017 to be hitting users in South America for purposes of cryptocurrency mining. | |
25.10.2017 | This malware is associated with attacks involving malicious attachments for Hangul Word Processor (HWP). In the attack, PostScript is used to gain access to a victim's machine. | |
25.10.2017 | This malware is associated with the attacks against the word processing application Hangul Word Processor (HWP), which is able to run PostScript code. | |
25.10.2017 | This malware is associated with the attacks against the word processing application Hangul Word Processor (HWP), which is able to run PostScript code. | |
25.10.2017 | This information stealing malware arrives as spam spoofing an invoice or payment notification. | |
25.10.2017 | This information stealing malware arrives as spam spoofing an invoice or payment notification. | |
25.10.2017 | VBS.Downloader.C is a Trojan horse that downloads potentially malicious files onto the compromised computer. | |
25.10.2017 | Ransom.BadRabbit is a Trojan horse that encrypts files on the compromised computer. It then asks the user to pay to have their files decrypted. | |
24.10.2017 | Exp.CVE-2017-11826 is a heuristic detection for files attempting to exploit the Microsoft Office Memory Corruption Vulnerability (CVE-2017-11826). | |
24.10.2017 | Trojan.Turla.B is a Trojan horse that may perform malicious activities on the compromised computer. | |
24.10.2017 | Linux.Iotreaper is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files. | |
21.10.2017 | Trojan.Esaprof is a Trojan horse that may perform malicious activities on the compromised computer. | |
17.10.2017 | Ransom.Hermes.B is a Trojan horse that encrypts files on the compromised computer. | |
17.10.2017 | Exp.CVE-2017-11292 is a heuristic detection for files attempting to exploit the Adobe Flash Player Type Confusion Remote Code Execution Vulnerability (CVE-2017-11292). | |
17.10.2017 | Android.Sockbot is a Trojan horse for Android devices that creates a SOCKS proxy on the compromised device. | |
17.10.2017 | Exp.CVE-2017-11762 is a heuristic detection for files attempting to exploit the Microsoft Windows Graphics Component Remote Code Execution Vulnerability (CVE-2017-11762). | |
17.10.2017 | Exp.CVE-2017-8727 is a heuristic detection for files attempting to exploit the Microsoft Windows Shell Remote Code Execution Vulnerability (CVE-2017-8727). | |
17.10.2017 | Exp.CVE-2017-11793 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11793). | |
17.10.2017 | Exp.CVE-2017-11798 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11798). | |
17.10.2017 | Exp.CVE-2017-11800 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-11800). | |
17.10.2017 | Exp.CVE-2017-11810 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11810). | |
17.10.2017 | Exp.CVE-2017-11822 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-11822). | |
7.10.2017 | Win32/Filecoder.FS is a trojan that encrypts files on fixed, removable and network drives. | |
7.10.2017 | Win32/Ceatrg.A is a trojan that installs Win32/Delf.OGV malware. | |
7.10.2017 | MSIL/Filecoder.FF is a trojan that encrypts files on local drives. To decrypt files the user is requested to comply with given conditions in exchange for a password/instructions. | |
7.10.2017 | Win32/Delf.TSU is a trojan that installs Win32/TrojanProxy.Hioles.AD malware. | |
7.10.2017 | The trojan collects various sensitive information. The trojan attempts to send gathered information to a remote machine. | |
6.10.2017 | Backdoor.Korplug.E is a Trojan horse that opens a backdoor and steals information from the compromised computer. | |
5.10.2017 | is a Trojan horse that may perform malicious activities on the compromised computer. | |
5.10.2017 | Trojan.Flusihoc is a Trojan horse that uses the compromised computer to carry out distributed denial of service (DDoS) attacks | |
5.10.2017 | Ransom.Arena is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
29.9.2017 | Trojan.Starloader is a Trojan horse that may perform malicious activities on the compromised computer. | |
28.9.2017 | MSIL/Spy.Netpune.A is a trojan that steals sensitive information. The trojan attempts to send gathered information to a remote machine. | |
28.9.2017 | MSIL/Spy.RinLog.A is a trojan that steals passwords and other sensitive information. The trojan attempts to send gathered information to a remote machine. | |
28.9.2017 | The trojan serves as a proxy server. It can be controlled remotely. | |
28.9.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
28.9.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
27.9.2017 | Ransom.Redboot is a Trojan horse that encrypts files on the compromised computer. It also overwrites the master boot record (MBR). | |
25.9.2017 | Win32/FinSpy.AA is a trojan that steals sensitive information. | |
25.9.2017 | Win32/FinSpy.AB is a trojan that steals sensitive information. | |
25.9.2017 | Linux.Proxym is a Trojan horse that may perform malicious activities on the compromised computer. | |
21.9.2017 | Trojan.Famberp is a Trojan horse that may perform malicious activities on the compromised computer. | |
21.9.2017 | The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations. | |
21.9.2017 | The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations. | |
21.9.2017 | The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations. | |
21.9.2017 | The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations. | |
21.9.2017 | Exp.CVE-2017-8734 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Memory Corruption Vulnerability (CVE-2017-8734). | |
21.9.2017 | Exp.CVE-2017-8738 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8738). | |
21.9.2017 | Exp.CVE-2017-8747 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-8747). | |
21.9.2017 | The energy sector in Europe and North America is being targeted by a new wave of cyber attacks that could provide attackers with the means to severely disrupt affected operations. | |
19.9.2017 | Python.Fakelib is a Trojan horse that steals information from the compromised computer. | |
18.9.2017 | JS.Dosdeming is a detection for a JavaScript used to conduct denial of service attacks. | |
18.9.2017 | Trojan.Sibakdi is a Trojan horse that may perform malicious activities on the compromised computer. | |
16.9.2017 |
MSIL/Filecoder. | MSIL/Filecoder.Serpent.A is a trojan that encrypts files on fixed, removable and network drives. |
14.9.2017 | Android.Wirex is a Trojan horse for Android devices that opens a backdoor on the compromised device | |
14.9.2017 | Exp.CVE-2017-8759 is a heuristic detection for files attempting to exploit the Microsoft Windows .NET Framework Remote Code Execution Vulnerability (CVE-2017-8759). | |
9.9.2017 | MSIL/Kryptik.FOA is a trojan that installs MSIL/Bladabindi.AH malware. | |
9.9.2017 | MSIL/TrojanDropper.Agent.DDT is a trojan that installs MSIL/Kryptik.FOA malware. | |
9.9.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
9.9.2017 | MSIL/Bladabindi.AH is a worm that spreads via removable media. The worm serves as a backdoor. It can be controlled remotely. | |
9.9.2017 | Win32/Filecoder.Erebus.A is a trojan that encrypts files on fixed, removable and network drives. | |
9.9.2017 | Win32/Filecoder.CryptoDefense.A is a trojan that encrypts files on fixed, removable and network drives. | |
8.9.2017 | VBS.Forbiks is a worm that spreads via removable drives and network shares. It also downloads potentially malicious files. | |
3.9.2017 | This malware is involved in the filelessly-installed backdoor malware attack discovered early August 2017. | |
3.9.2017 | This malware is involved in the filelessly-installed backdoor malware attack discovered early August 2017. | |
3.9.2017 | This malware is involved in the filelessly-installed backdoor malware attack discovered early August 2017. | |
3.9.2017 | This malware is the filelessly-installed backdoor malware discovered on early August 2017. | |
3.9.2017 | This malware is linked to the discovery of fileless crytocurrency miner TROJ64_COINMINER.QO late August 2017. | |
3.9.2017 | This malware is a cryptocurrency mining malware discovered late August 2017 and found to be sporting fileless routines. | |
3.9.2017 | This malware was discovered on August 2017 to have been delivered by the Disdain exploit kit. | |
3.9.2017 | This malware opens a command shell on the targeted system. It mainly targets IoT devices, particularly Network Attached Storage (NAS) devices. | |
3.9.2017 | This information stealing malware was one of the IoCs found in recent attacks targeting hospitals in Israel. This malware is also notable for its stealth. | |
31.8.2017 | Backdoor.Gazer is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files. | |
31.8.2017 | Backdoor.Vodiboti is a Trojan horse that opens a backdoor on the compromised computer. | |
31.8.2017 | Ransom.Lukitus is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
31.8.2017 | Trojan.Turbear is a Trojan horse that may perform malicious activities on the compromised computer. | |
30.8.2017 | Trojan.Downblocker is a Trojan horse that downloads potentially malicious files onto the compromised computer. | |
30.8.2017 | OSX.Demsty is a Trojan horse that opens a backdoor on the compromised computer. | |
30.8.2017 | Ransom.Defray is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
30.8.2017 | ||
29.8.2017 | Win32/Kryptik.FRWV is a trojan that installs Win32/Agent.YIJ malware. | |
29.8.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
29.8.2017 | Win32/Joao is a trojan which tries to download other malware from the Internet. | |
29.8.2017 | Win32/AutoRun.Agent.AQX is a worm that spreads via removable media. | |
29.8.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
29.8.2017 | The trojan has a simple payload. | |
29.8.2017 | Win32/Agent.YWQ is a trojan which tries to download other malware from the Internet. | |
29.8.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
29.8.2017 | MSIL/Agent.AZM serves as a backdoor. It can be controlled remotely. | |
29.8.2017 | Win32/Filecoder.FV is a trojan that encrypts files on local drives. | |
29.8.2017 | Win32/Agent.SLM serves as a backdoor. It can be controlled remotely. | |
29.8.2017 | Win32/Agent.YIJ is a trojan that steals passwords and other sensitive information. | |
29.8.2017 | JS/Adware.BNXAds is an adware - an application designed for delivery of unsolicited advertisements. | |
29.8.2017 | Win32/CoinMiner.YB is a trojan that uses the hardware resources of the infected computer for mining the Monero digital currency. | |
29.8.2017 | Win32/AutoRun.Agent.ARE is a worm that spreads via shared folders and removable media. | |
29.8.2017 | Win32/Equdrug.I is a trojan that steals sensitive information. | |
29.8.2017 | Win32/Spy.Banker.ADYV is a trojan that steals passwords and other sensitive information. | |
29.8.2017 | Win32/Filecoder.ThunderCrypt.A is a trojan that encrypts files on fixed, removable and network drives. | |
29.8.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
17.8.2017 | Backdoor.Shadowpad is a Trojan horse that opens a backdoor on the compromised computer. | |
15.8.2017 | ||
8.8.2017 | Backdoor.Weasel is a Trojan horse that opens a backdoor on the compromised computer and uses it to conduct distributed denial of service attacks. | |
31.7.2017 | Trojan.Heriplor is a Trojan horse that opens a backdoor on the compromised computer. | |
31.7.2017 | Trojan.Karagany.B is a Trojan horse that downloads potentially malicious files onto the compromised computer. | |
31.7.2017 | Trojan.Ismagent is a Trojan horse that opens a backdoor on the compromised computer. | |
27.7.2017 | Ransom.Reyptson is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
27.7.2017 | Backdoor.Krad is a Trojan horse that may perform malicious activities on the compromised computer. | |
26.7.2017 | Trojan.Ismdoor.B is a Trojan horse that may open a backdoor and steals information from the compromised computer. | |
22.7.2017 | Exp.CVE-2017-3099 is a heuristic detection for files attempting to exploit the Adobe Flash Player Remote Memory Corruption Vulnerability (CVE-2017-3099). | |
22.7.2017 | Exp.CVE-2017-3100 is a heuristic detection for files attempting to exploit the Adobe Flash Player Information Disclosure Vulnerability (CVE-2017-3100). | |
22.7.2017 | Exp.CVE-2017-8601 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8601). | |
22.7.2017 | Exp.CVE-2017-8598 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8598). | |
22.7.2017 | Exp.CVE-2017-8594 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-8594). | |
22.7.2017 | Exp.CVE-2017-8592 is a heuristic detection for files attempting to exploit the Microsoft Edge and Internet Explorer Security Bypass Vulnerability (CVE-2017-8592). | |
22.7.2017 | Exp.CVE-2017-0243 is a heuristic detection for files attempting to exploit the Microsoft Office Remote Code Execution Vulnerability (CVE-2017-0243). | |
22.7.2017 | Exp.CVE-2017-8619 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Code Execution Vulnerability (CVE-2017-8619). | |
22.7.2017 | Exp.CVE-2017-8618 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Code Execution Vulnerability (CVE-2017-8618). | |
22.7.2017 | Exp.CVE-2017-8617 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Code Execution Vulnerability (CVE-2017-8617). | |
22.7.2017 | Exp.CVE-2017-8605 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-8605). | |
21.7.2017 | Backdoor.Rurtar is a Trojan horse that opens a backdoor on the compromised computer and may perform malicious activities. | |
20.7.2017 | Exp.CVE-2017-6753 is a heuristic detection for files attempting to exploit the Cisco WebEx Browser Extension Remote Code Execution Vulnerability (CVE-2017-6753). | |
20.7.2017 | Trojan.Tinukebot is a Trojan horse that may perform malicious activities on the compromised computer. | |
20.7.2017 | This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
18.7.2017 | Ransom.Shifr is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
17.7.2017 | Trojan.Phisherly is a Trojan horse that steals user credentials from the compromised computer. | |
13.7.2017 | Trojan.Emotet is a Trojan horse that downloads potentially malicious files and may carry out malicious activities on the compromised computer. | |
13.7.2017 | Infostealer.Lockpos is a Trojan horse that steals information from the compromised computer. | |
13.7.2017 | Ransom.Karo is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
13.7.2017 | Infostealer.Neupos is a Trojan horse that steals information from the compromised computer. | |
13.7.2017 | Backdoor.Goodor is a Trojan horse that opens a backdoor on the compromised computer. | |
13.7.2017 | Backdoor.Dorshel is a Trojan horse that opens a backdoor and may perform malicious activities on the compromised computer. | |
12.7.2017 | Trojan.Listrix is a Trojan horse that performs malicious activities on the compromised computer. | |
11.7.2017 | We have seen this application install other software on your PC. | |
11.7.2017 | Trojan.Listrix is a Trojan horse that performs malicious activities on the compromised computer. | |
11.7.2017 | This threat is a scriptable installer engine used to deliver malicious payloads, mostly ransomware, such as Ransom:Win32/Enestedel. | |
11.7.2017 | This threat comes in the form of a .DLL file which is dropped and then executed to decrypt and run a malicious payload, typically a ransomware. | |
6.7.2017 | VBS.Vlerli is a worm that opens a backdoor on the compromised computer and spreads via removable drives and network shares. | |
6.7.2017 | This threat is usually downloaded by another application to be executed in the background. Most of its samples do not have a standard GUI or window. | |
6.7.2017 | Ransom.Fakecry is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
5.7.2017 | Ransom.Haknata is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
4.7.2017 | This threat has been identified by heuristics as an emerging malware attack. | |
30.6.2017 | Ransom.Beeteeceeware is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
30.6.2017 | W32.Futurax is a worm that spreads via removable drives and network shares. | |
29.6.2017 | We observed telemetry showing that this ransomware can infect computers using the updater process of the legitimate application MEDoc. | |
28.6.2017 | We observed telemetry showing that this ransomware can infect computers using the updater process of the legitimate application MEDoc. | |
28.6.2017 | It steals credentials or re-uses existing active sessions and then use file-shares to transfer malicious files across machines on the same network. | |
28.6.2017 | This threat may be installed by malicious documents and distributed through email and uses exploits to distribute. | |
28.6.2017 | This ransomware overwrites the Master Boot Record (MBR) with Ransom:DOS/Petya.A and encrypts system drive sectors. | |
28.6.2017 | This threat may be installed by malicious documents with embedded macro code and distributed via email. | |
28.6.2017 | This threat may be installed by malicious documents with embedded macro code and distributed via email. | |
28.6.2017 | Upon execution, this threat overwrites the Master Boot Record (MBR) with Ransom:DOS/Petya.A, and encrypts system drive sectors. | |
28.6.2017 | This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
28.6.2017 | If the machine is vulnerable, it uses smb admin$ method to drop the payload to the system under %systemroot%\perfc.dat and tries to execute via psexc or wmi remoting. | |
28.6.2017 | If the machine is vulnerable, it uses smb admin$ method to drop the payload to the system under %systemroot%\perfc.dat and tries to execute via psexc or wmi remoting. | |
27.6.2017 | Win32/Diskcoder.Petya.B is a trojan that encrypts specific parts of drives. | |
27.6.2017 | Win32/Diskcoder.Petya.D is a trojan that encrypts files on fixed, removable and network drives. | |
27.6.2017 | OSX.Macspy is a Trojan horse that opens a backdoor on the compromised computer. | |
27.6.2017 | Backdoor.Croxbow is a Trojan horse that may perform malicious activities on the compromised computer. | |
27.6.2017 | Trojan.Gordry is a Trojan horse that may perform malicious activities on the compromised computer. | |
27.6.2017 | Backdoor.Pled is a Trojan horse that opens a backdoor and may perform malicious activities on the compromised computer. | |
26.6.2017 | This threat runs on Linux system and drops the following files for instruction to decrypt the files. Files are dropped in the same directory. | |
23.6.2017 | OSX.Salgorea.B is a Trojan horse that opens a backdoor on the compromised computer. | |
23.6.2017 | We have seen this threat connect to any of the following remote hosts (C2 server/ToR nodes). | |
22.6.2017 | Trojan.Bleagle is a Trojan horse that encrypts files on the compromised computer. | |
20.6.2017 | Ransom.Sorebrect is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
20.6.2017 | Trojan.Bleagle is a Trojan horse that encrypts files on the compromised computer. | |
17.6.2017 | This ransomware is generated by attackers using a free ransomware construction called Xorcist. | |
16.6.2017 | This ransomware is downloaded onto target computers by malicious documents in spammed email messages. | |
16.6.2017 | ||
14.6.2017 | ||
14.6.2017 | Trojan.Latentbot is a Trojan horse that may perform malicious activities on the compromised computer. | |
13.6.2017 | Python/Agent.F is a worm that spreads via removable media. | |
13.6.2017 | Win32/Spy.Agent.OXM serves as a backdoor. It can be controlled remotely. | |
13.6.2017 | Win32/Spy.Delf.QLL is a trojan that steals sensitive information. The trojan attempts to send gathered information to a remote machine. | |
13.6.2017 | Win32/Filecoder.AESNI.B is a trojan that encrypts files on fixed, removable and network drives. To decrypt files, the user is asked to send | |
13.6.2017 | Win32/Spy.Ursnif.AM serves as a backdoor. It can be controlled remotely. The trojan collects various sensitive information. | |
13.6.2017 | Ransom.Erebus is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
13.6.2017 | Backdoor.Industroyer is a Trojan horse that opens a backdoor on the compromised computer. | |
13.6.2017 | Android.WannaLocker is a Trojan horse for Android devices that encrypts files on the device's external storage and demands a payment to decrypt them. | |
9.6.2017 | VBS.Heur.SNIC is a heuristic detection used to detect VBScript threats. | |
9.6.2017 | JS.Heur.SNIC is a heuristic detection used to detect JavaScript threats. | |
9.6.2017 | Android.Dvmap is a Trojan horse for Android devices that may perform malicious activities on the compromised device. | |
7.6.2017 | Infostealer.Bancos.BG is a Trojan horse that may perform malicious activities on the compromised computer. | |
7.6.2017 | Trojan.Rochim is a Trojan horse that may perform a man-in-the-middle (MitM) attack on the browser installed on the compromised computer. | |
6.6.2017 | Trojan.Fireball is a Trojan horse that downloads potentially malicious files onto the compromised computer. | |
4.6.2017 | BAT/Agent.NEM is a worm which tries to download other malware from the Internet. The worm may create copies of itself on removable drives. | |
4.6.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
4.6.2017 | OSX/Filecoder.KeRanger.A is a trojan that encrypts files on local drives. | |
4.6.2017 | The trojan serves as a backdoor. It can be controlled remotely. The trojan collects various sensitive information. | |
4.6.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
4.6.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
4.6.2017 | Win32/Amitis.143.B serves as a backdoor. It can be controlled remotely. The file is run-time compressed using UPX . | |
4.6.2017 | Win32/Amitis serves as a backdoor. It can be controlled remotely. | |
4.6.2017 | JS/Adware.AztecMedia is an adware - an application designed for delivery of unsolicited advertisements. | |
4.6.2017 | JS/Adware.Imali is an adware - an application designed for delivery of unsolicited advertisements. | |
4.6.2017 | JS/Adware.Serhoxs is an adware - an application designed for delivery of unsolicited advertisements. | |
4.6.2017 | Win32/Filecoder.AESNI.A is a trojan that encrypts files on fixed, removable and network drives. | |
4.6.2017 | Win32/TrojanDownloader.Blackmoon.C is a trojan which tries to download other malware from the Internet. | |
4.6.2017 | Win32/Filecoder.WannaCryptor.D is a trojan that encrypts files on local drives. | |
4.6.2017 | Win32/Kryptik.FRAH is a trojan that installs PowerShell/Spy.Banker.E malware. | |
4.6.2017 | Powershell/Spy.Banker.E is a trojan which tries to download other malware from the Internet. | |
4.6.2017 | The trojan serves as a backdoor. It can be controlled remotely. | |
4.6.2017 | Win32/Filecoder.WannaCryptor.B is a trojan that encrypts files on local drives. | |
4.6.2017 | Win32/Turla.CE serves as a backdoor. It can be controlled remotely. | |
4.6.2017 | Win32/Rootkit.BlackEnergy.BH installs a backdoor that can be controlled remotely. | |
1.6.2017 | Trojan.Wimhop is a Trojan horse that uses the Windows Management Instrumentation Command-line to start processes remotely on other Windows computers. | |
1.6.2017 | Linux.Imeij is a Trojan horse that opens a backdoor on the compromised computer. | |
1.6.2017 | ||
1.6.2017 | ||
31.5.2017 | The presence of this threat indicates that a remote attacker successfully gained unauthorized access and installed this backdoor in the server. | |
31.5.2017 | ||
30.5.2017 | Backdoor.Felismus is a Trojan horse that may perform malicious activities on the compromised computer. | |
30.5.2017 | ||
27.5.2017 | ||
26.5.2017 | Ransom.GlobeImposter is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
26.5.2017 | Ransom.Jaff is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. | |
26.5.2017 | ||
26.5.2017 | ||
25.5.2017 | This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
25.5.2017 | W32.Styes is a worm that opens a backdoor on the compromised computer and spreads through removable drives and open shares. | |
25.5.2017 | ||
25.5.2017 | ||
24.5.2017 | This ransomware can stop you from using your PC or accessing your data. Unlike other ransomware, however, this threat has worm capabilities. | |
24.5.2017 | The threat might be dropped by exploit kits such as Exploit:SWF/Axpergle (Angler), Exploit:JS/Neclu (Nuclear), JS/Fiexp (Fiesta), and JS/Anogre (Sweet Orange). | |
24.5.2017 | ||
24.5.2017 | ||
23.5.2017 | W32.Eternalrocks is a Trojan horse that may perform malicious activities on the compromised computer. | |
23.5.2017 | Backdoor.Forshare is a Trojan horse that opens a backdoor on the compromised computer and downloads potentially malicious files. | |
23.5.2017 | Trojan.Bravonc is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files. | |
23.5.2017 | Trojan.Alphanc is a Trojan horse that opens a back door and downloads potentially malicious files onto the compromised computer. | |
23.5.2017 | ||
23.5.2017 | ||
23.5.2017 | ||
23.5.2017 | ||
19.5.2017 | It terminates any existing instance of its coin-mining process. This behavior indicates that it can update an existing version of this threat in the infected machine. | |
19.5.2017 | ||
18.5.2017 | This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
18.5.2017 | Ransom.Uiwix is a Trojan horse that encrypts files and demands a payment to decrypt them. | |
18.5.2017 | Trojan.Sosopod is a Trojan horse that downloads potentially malicious files onto the compromised computer. | |
18.5.2017 | This ransomware can arrive on a machine by leveraging the following vulnerability: | |
18.5.2017 | Trojan.Adylkuzz is a Trojan horse that downloads a cryptocurrency miner onto the compromised computer. | |
18.5.2017 | This hacking tool is a web shell for ASP servers. | |
18.5.2017 |
MonitoringTool: | This threat is a flaw in an out-of-date Conexant HD Audio Driver installation that is pre-installed on some models of HP PCs. |
18.5.2017 | ||
18.5.2017 | ||
18.5.2017 | ||
18.5.2017 | ||
18.5.2017 | ||
18.5.2017 | ||
18.5.2017 |
MonitoringTool: | |
16.5.2017 | This ransomware can stop you from using your PC or accessing your data. Unlike other ransomware, however, this threat has worm capabilities. | |
15.5.2017 | This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. | |
15.5.2017 | This ransomware can stop you from using your PC or accessing your data. Unlike other ransomware, however, this threat has worm capabilities. | |
15.5.2017 | ||
15.5.2017 | ||
13.5.2017 | This ransomware exploits the MS17-010 vulnerability to spread to other vulnerable computers. | |
13.5.2017 | This ransomware can stop you from using your PC or accessing your data. Unlike other ransomware, however, this threat has worm capabilities. | |
13.5.2017 | ||
13.5.2017 | ||
13.5.2017 | ||
13.5.2017 | ||
13.5.2017 | ||
13.5.2017 | ||
12.5.2017 | Exp.CVE-2017-0262 is a heuristic detection for files attempting to exploit the Microsoft Office Remote Code Execution Vulnerability (CVE-2017-0262). | |
12.5.2017 | Trojan.Boyapki is a Trojan horse that opens a backdoor and downloads potentially malicious files onto the compromised computer. | |
12.5.2017 | Trojan.Halabake is a Trojan horse that opens a back door on the compromised computer. It may also download potentially malicious files. | |
12.5.2017 | ||
12.5.2017 | ||
12.5.2017 | ||
12.5.2017 | ||
10.5.2017 | ||
10.5.2017 | ||
9.5.2017 | This malware was discovered on early May 2017 and is found to be capable of brute-forcing Telnet and SSH logins. | |
9.5.2017 | Trojan.Reblight is a Trojan horse that may perform malicious activities on the compromised computer. | |
9.5.2017 | ||
9.5.2017 | ||
8.5.2017 | OSX.Proton is a Trojan horse that opens a backdoor, steals information, and downloads potentially malicious files onto the compromised computer. | |
8.5.2017 | JS.Netrepser is a Trojan horse that opens a backdoor, steals information, and downloads potentially malicious files onto the compromised computer. | |
8.5.2017 | Trojan.Cassowar is a Trojan horse that opens a backdoor, steals information, and downloads potentially malicious files onto the compromised computer. | |
8.5.2017 | ||
8.5.2017 | ||
8.5.2017 | ||
5.5.2017 | OSX.Turla is a Trojan horse that provides backdoor access to the compromised computer. | |
5.5.2017 | Backdoor.Noknef is a Trojan horse that opens a backdoor on the compromised computer. | |
5.5.2017 | ||
5.5.2017 | ||
4.5.2017 | ||
4.5.2017 | ||
4.5.2017 | Trojan.Atmocash is a Trojan horse that allows an attacker to carry out malicious actions on an ATM machine. | |
4.5.2017 | ||
4.5.2017 | ||
4.5.2017 | ||
4.5.2017 | ||
2.5.2017 | Python.Bellabot is a Trojan horse that opens a backdoor and steals information from the compromised computer. | |
2.5.2017 | Trojan.Destfallen.B is a Trojan horse that overwrites the master boot record on the compromised computer. | |
2.5.2017 | ||
2.5.2017 | ||
30.4.2017 | This threat belongs to the Trojan:Win32/Msposer family of trojan which pretends to be Microsoft products. | |
30.4.2017 | ||
28.4.2017 | OSX.Doku is a Trojan horse that redirects traffic on the compromised computer. | |
28.4.2017 | This threat is a PDF file with a hyperlink that links to another malware. | |
28.4.2017 | This threat is distributed from a .pdf file attachment which contains a link that points to a JS file. | |
28.4.2017 | ||
28.4.2017 | ||
28.4.2017 | ||
28.4.2017 | ||
26.4.2017 | Linux.Shishiga is a worm that opens a backdoor on the compromised computer and downloads potentially malicious files. | |
26.4.2017 | ||
25.4.2017 | Infostealer.Lokibot is a Trojan horse that steals information from the compromised computer. | |
25.4.2017 | Trojan.Pidief.X is a detection for malicious PDF files that lead to additional malware being downloaded on to the compromised computer. | |
25.4.2017 | ||
25.4.2017 | ||
24.4.2017 | Backdoor.Miskip is a Trojan horse that opens a back door on the compromised computer. | |
24.4.2017 | ||
22.4.2017 | Trojan.Lodarat is a Trojan horse that opens a backdoor and steals information from the compromised computer. | |
22.4.2017 | Backdoor.Doublepulsar is a Trojan horse that opens a back door on the compromised computer. | |
22.4.2017 | ||
22.4.2017 | ||
21.4.2017 | Trojan.Darkpulsar is a Trojan horse that may perform malicious activities on the compromised computer. | |
21.4.2017 | ||
18.4.2017 | JS.Downloader.H is a Trojan horse that downloads potentially malicious files and executes them on the compromised computer. | |
18.4.2017 | Trojan.Spanderditz is a Trojan horse that may perform malicious activities on the compromised computer. | |
18.4.2017 | Backdoor.Raslup is a Trojan horse that may perform malicious activities on the compromised computer. | |
18.4.2017 | Backdoor.Objod is a Trojan horse that may perform malicious activities on the compromised computer. | |
18.4.2017 | Trojan.Symmi is a Trojan horse that opens a back door on the compromised computer. It may also download potentially malicious files. | |
18.4.2017 | Ransom.Mole is a Trojan horse that encrypts files on the compromised computer and asks the user to pay in order to decrypt them. | |
18.4.2017 | VBS.Dropper.A is a Trojan horse that executes other malicious files on the compromised computer. | |
18.4.2017 | Trojan.Crusader is a Trojan horse that may monitor and modify all Internet traffic and perform malicious actions. | |
18.4.2017 | Linux.Cheepori is a Trojan horse that opens a reverse shell on the compromised computer. | |
18.4.2017 | Trojan.Sathurbot is a Trojan horse that may perform malicious activities on the compromised computer. | |
18.4.2017 | Linux.Migajick is a Trojan horse that sends and receives encrypted traffic to malware already installed on the compromised computer. | |
18.4.2017 | Linux.Valsheesy is a Trojan horse that downloads potentially malicious files onto the compromised computer. | |
18.4.2017 | Linux.Amnesiark is a Trojan horse that opens a back door on the compromised computer. | |
18.4.2017 | Backdoor.Cruprox is a Trojan horse that may perform malicious activities on the compromised computer. | |
18.4.2017 | Trojan.Kasperbogi is a Trojan horse that may perform malicious activities on the compromised computer. | |
18.4.2017 | Backdoor.Rokrat is a Trojan horse that opens a back door on the compromised computer. It may also download potentially malicious files and steal information. | |
18.4.2017 | Backdoor.Lisdazz is a Trojan horse that opens a back door on the compromised computer. It may also steal information. | |
18.4.2017 | Trojan.Redleavy is a Trojan horse that steals information from the compromised computer. | |
18.4.2017 | Trojan.Hirsdov is a Trojan horse that opens a back door and steals information from the compromised computer. | |
18.4.2017 | Backdoor.Khrat is a Trojan horse that opens a back door on the compromised computer. It may also steal information. | |
18.4.2017 | Trojan.Dimnie is a Trojan horse that steals information from the compromised computer. | |
18.4.2017 | Trojan.Aczibo is a Trojan horse that opens a back door on the compromised computer. It also installs adware and potentially unwanted applications. | |
18.4.2017 | Exp.CVE-2017-0010 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-0010). | |
18.4.2017 | Trojan.Cadanif is a Trojan horse that opens a back door on the compromised computer and downloads potentially malicious files. | |
18.4.2017 | Exp.CVE-2017-0015 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-0015). | |
18.4.2017 | Exp.CVE-2017-0018 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2017-0018). | |
18.4.2017 | Exp.CVE-2017-0154 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer CVE-2017-0154 Remote Privilege Escalation Vulnerability (CVE-2017-0154). | |
18.4.2017 | Exp.CVE-2017-0050 is a heuristic detection for files attempting to exploit the Microsoft Windows Kernel Local Privilege Escalation Vulnerability (CVE-2017-0050). | |
18.4.2017 | Exp.CVE-2017-0149 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer CVE-2017-0149 Remote Memory Corruption Vulnerability (CVE-2017-0149). | |
18.4.2017 | Exp.CVE-2017-0067 is a heuristic detection for files attempting to exploit the Microsoft Edge Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-0067). | |
18.4.2017 | Exp.CVE-2017-0141 is a heuristic detection for files attempting to exploit the Microsoft Edge CVE-2017-0141 Scripting Engine Remote Memory Corruption Vulnerability (CVE-2017-0141). | |
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
18.4.2017 | ||
13.4.2017 | ||
10.4.2017 | ||
6.4.2017 | ||
30.3.2017 | ||
28.3.2017 | ||
15.3.2017 | ||
14.3.2017 | ||
14.3.2017 | ||
13.3.2017 | ||
10.3.2017 | ||
3.3.2017 | ||
28.2.2017 | ||
23.2.2017 | ||
22.2.2017 | ||
22.2.2017 | ||
21.2.2017 | ||
15.2.2017 | ||
8.2.2017 | ||
3.2.2017 | ||
2.2.2017 | ||
19.1.2017 | ||
17.1.2017 | ||
15.1.2017 | ||
11.1.2017 | ||
9.1.2017 |