<?xml version="1.0" encoding="utf-8" standalone="no"?><rss xmlns:a10="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Trend Micro - Newest Malware Advisories</title><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/rss/malware</link><description></description><copyright>Copyright (c) 1989-2020 Trend Micro Incorporated, All Rights Reserved</copyright><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.spoosh.thgagbc</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.spoosh.thgagbc</link><title>Ransom.Win32.SPOOSH.THGAGBC</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Generic.Ransom.DCRTR.7E80656D (BITDEFENDER)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: High&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It connects to certain websites to send and receive information.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Thu, 27 Jul 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/androidos_spynote.gclx</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/androidos_spynote.gclx</link><title>AndroidOS_SpyNote.GCLX</title><description>&lt;p&gt;Threat type: Backdoor&lt;/p&gt;&lt;p&gt; Aliases: &lt;/p&gt;&lt;p&gt; Platforms: Android&lt;/p&gt;&lt;p&gt; Overall Risk Rating: High&lt;/p&gt;&lt;p&gt; Damage Potential: Low&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: High&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;/p&gt; </description><pubDate>Tue, 13 Jun 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.noko.thdabbc</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.noko.thdabbc</link><title>Ransom.Win32.NOKO.THDABBC</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Ransom:Win32/Nokonoko.PB!MTB (MICROSOFT); Win32:Nokoyawa-A [Trj] (AVAST)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 05 Jun 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.noko.ypdfa</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.noko.ypdfa</link><title>Ransom.Win32.NOKO.YPDFA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: &lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 05 Jun 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.egogen.thebbbc</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.egogen.thebbbc</link><title>Ransom.MSIL.EGOGEN.THEBBBC</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Trojan:MSIL/XWormRAT.A!MTB (MICROSOFT)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: High&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It adds certain registry entries to disable the Task Manager. This action prevents users from terminating the malware process, which can usually be done via the Task Manager.&lt;/p&gt;&lt;p&gt;It terminates itself if it detects it is being run in a virtual environment.&lt;/p&gt;&lt;p&gt;It encrypts files with specific file extensions. It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 05 Jun 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.ps1.lockbit.aa</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.ps1.lockbit.aa</link><title>Ransom.PS1.LOCKBIT.AA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Trojan:Win32/Leonem (MICROSOFT); Win32/Filecoder.Lockbit.M trojan (NOD32)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Thu, 11 May 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.lockbit.eod</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.lockbit.eod</link><title>Ransom.Win32.LOCKBIT.EOD</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: &lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Thu, 11 May 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.cryptolock.e</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.cryptolock.e</link><title>Ransom.Win32.CRYPTOLOCK.E</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Trojan-Ransom.FileCrypter (IKARUS)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It terminates itself if it detects it is being run in a virtual environment.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Wed, 26 Apr 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.w97m.emotet.smi</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.w97m.emotet.smi</link><title>Trojan.W97M.EMOTET.SMI</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: HEUR:Trojan.Script.Generic (KASPERSKY); TrojanDownloader:O97M/Emotet.S!MTB (MICROSOFT)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This is a generic detection for all cases and instances of Emotet.&lt;/p&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 25 Apr 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win64.conti.aa</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win64.conti.aa</link><title>Ransom.Win64.CONTI.AA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Gen:Variant.Lazy.326686 (BITDEFENDER)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 25 Apr 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.rtmcommand.thkbfbd</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.rtmcommand.thkbfbd</link><title>Ransom.Win32.RTMCOMMAND.THKBFBD</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Ransom:Win32/RTMLocker.AA!MTB&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This ransomware encrypts all drives except the CD-ROM.&lt;/p&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 25 Apr 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win64.donotrun.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win64.donotrun.a</link><title>Ransom.Win64.DONOTRUN.A</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Python/Filecoder.EK trojan, Python/Filecoder.EK trojan (NAI)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This ransomware locks the user out of their devices by locking the screen.&lt;/p&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 25 Apr 2023 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.lockbit.yxcgd</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.lockbit.yxcgd</link><title>Ransom.Win32.LOCKBIT.YXCGD</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Trojan-Ransom.BlackMatter(IKARUS), Ransom:Win32/Lockbit.STB(MICROSOFT)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 04 Jul 2022 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm.win32.hermwiz.yecca</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/worm.win32.hermwiz.yecca</link><title>Worm.Win32.HERMWIZ.YECCA</title><description>&lt;p&gt;Threat type: Worm&lt;/p&gt;&lt;p&gt; Aliases: DoS:Win32/FoxBlade.A!dha (MICROSOFT); Win32/Agent.OJC worm (NOD32)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: High&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Worm  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 01 Mar 2022 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.killmbr.yecca</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.killmbr.yecca</link><title>Trojan.Win32.KILLMBR.YECCA</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: Win32/KillMBR.NHQ trojan (NOD32)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 01 Mar 2022 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.whispergate.yxcax</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.whispergate.yxcax</link><title>Trojan.Win32.WHISPERGATE.YXCAX</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: DoS:Win32/WhisperGate.M (MICROSOFT)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It executes then deletes itself afterward.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 24 Jan 2022 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.msil.whispergate.yxcaq</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.msil.whispergate.yxcaq</link><title>Trojan.MSIL.WHISPERGATE.YXCAQ</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: DoS:Win32/WhisperGate.I!dha (MICROSOFT)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 18 Jan 2022 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.w97m.cve202140444.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.w97m.cve202140444.a</link><title>Trojan.W97M.CVE202140444.A</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: HEUR:Exploit.MSOffice.Agent.gen (KASPERSKY)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It takes advantage of certain vulnerabilities.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Thu, 09 Sep 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.lockbit.yebgw</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.lockbit.yebgw</link><title>Ransom.Win32.LOCKBIT.YEBGW</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Ransom:Win32/Lockbit.AA!MTB (MICROSOFT); W32/Lockbit.C2F8!tr.ransom (FORTINET)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 16 Aug 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.chaos.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.chaos.a</link><title>Ransom.MSIL.CHAOS.A</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: HEUR:Trojan.MSIL.Fsysna.gen (Kaspersky);&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It encrypts files found in specific folders.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 09 Aug 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.blackmatter.thgocba</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.blackmatter.thgocba</link><title>Ransom.Win32.BLACKMATTER.THGOCBA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Trojan-Ransom.BlackMatter (IKARUS)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Medium&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Wed, 04 Aug 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.sodinokibi.yabgc</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.sodinokibi.yabgc</link><title>Ransom.Win32.SODINOKIBI.YABGC</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: N/A&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Medium&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Sat, 03 Jul 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.cve20190808.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.cve20190808.a</link><title>Trojan.Win32.CVE20190808.A</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: Win32:CVE-2019-0808-K [Expl] (AVAST)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It takes advantage of certain vulnerabilities.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Thu, 01 Jul 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.cve20188120.e</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.cve20188120.e</link><title>Trojan.Win32.CVE20188120.E</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: Exploit:Win32/CVE-2018-8120.A (MICROSOFT)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It takes advantage of certain vulnerabilities.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Thu, 01 Jul 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.x97m.pandasteal.thdabba</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.x97m.pandasteal.thdabba</link><title>Trojan.X97M.PANDASTEAL.THDABBA</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: HEUR:Trojan-Downloader.MSOffice.Agent.gen (KASPERSKY)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This is the Trend Micro detection for macros that drop the cryptocurrency wallet stealer known as Panda stealer. &lt;/p&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Wed, 28 Apr 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojanspy.msil.redlinestealer.yxbdn</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojanspy.msil.redlinestealer.yxbdn</link><title>TrojanSpy.MSIL.REDLINESTEALER.YXBDN</title><description>&lt;p&gt;Threat type: Trojan Spy&lt;/p&gt;&lt;p&gt; Aliases: a variant of MSIL/Kryptik.AAHN trojan(NOD32); PWS-FCXD!F291EAD13EAD(NAI)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: High&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan Spy  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Fri, 09 Apr 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojanspy.msil.redlinestealer.yxbdm</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojanspy.msil.redlinestealer.yxbdm</link><title>TrojanSpy.MSIL.REDLINESTEALER.YXBDM</title><description>&lt;p&gt;Threat type: Trojan Spy&lt;/p&gt;&lt;p&gt; Aliases: MSIL/Kryptik.AAHQ!tr(FORTINET); Trj/GdSda.A(PANDA)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: High&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan Spy  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Fri, 09 Apr 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.astrolocker.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.astrolocker.a</link><title>Ransom.Win32.ASTROLOCKER.A</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: BScope.TrojanRansom.Encoder (VBA32)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It executes then deletes itself afterward.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Wed, 31 Mar 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win64.astrolocker.thcbdba</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win64.astrolocker.thcbdba</link><title>Ransom.Win64.ASTROLOCKER.THCBDBA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Win64/Filecoder.CI trojan (Nod32), Trojan-Ransom.FileCrypter (Ikarus)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It executes then deletes itself afterward.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Wed, 31 Mar 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.dearcry.thcabba</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.dearcry.thcabba</link><title>Ransom.Win32.DEARCRY.THCABBA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Ransom:Win32/DoejoCrypt.A (MICROSOFT)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 15 Mar 2021 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win64.hafnium.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win64.hafnium.a</link><title>Trojan.Win64.HAFNIUM.A</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: &lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Thu, 11 Mar 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.ps1.boxter.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.ps1.boxter.a</link><title>Trojan.PS1.BOXTER.A</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: &lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Medium&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Wed, 10 Mar 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.macos.slisp.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.macos.slisp.a</link><title>Trojan.MacOS.SLISP.A</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: Trojan.OSX.SilverSparrow (IKARUS)&lt;/p&gt;&lt;p&gt; Platforms: OSX&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: High&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  may be unknowingly downloaded by a user while visiting malicious websites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 23 Feb 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.povlsom.thbaoba</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.povlsom.thbaoba</link><title>Ransom.MSIL.POVLSOM.THBAOBA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Ransom:MSIL/Filecoder.EY!MTB (MICROSOFT), Trojan-Ransom.FileCrypter (IKARUS)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Sat, 06 Feb 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.thanos.thabgba</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.thanos.thabgba</link><title>Ransom.MSIL.THANOS.THABGBA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Trojan-Ransom.Thanos (Ikarus), HEUR:Trojan-Ransom.MSIL.Encoder.gen	(Kaspersky)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.&lt;/p&gt;&lt;p&gt;It creates certain registry entries to disable applications related to security.&lt;/p&gt;&lt;p&gt;It encrypts files with specific file extensions. It drops files as ransom note.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Wed, 03 Feb 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/pua.win64.prochack.ac</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/pua.win64.prochack.ac</link><title>PUA.Win64.ProcHack.AC</title><description>&lt;p&gt;Threat type: Potentially Unwanted Application&lt;/p&gt;&lt;p&gt; Aliases: HEUR:RiskTool.Win32.ProcHack.gen (KASPERSKY)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Low&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Potentially Unwanted Application  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Wed, 27 Jan 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win64.combacker.yaba-a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win64.combacker.yaba-a</link><title>Trojan.Win64.COMBACKER.YABA-A</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: Trojan.Win64.Agent (IKARUS), Trojan:Win64/Comebacker.A!dha (MICROSOFT)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 26 Jan 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.babuk.yeba-thaaeba</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.babuk.yeba-thaaeba</link><title>Ransom.Win32.BABUK.YEBA-THAAEBA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Ransom:Win32/BabukLocker.MK!MTB (MICROSOFT); Trojan-Ransom.FileCrypter (IKARUS)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 26 Jan 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.maoloa.thaahba</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.maoloa.thaahba</link><title>Ransom.Win32.MAOLOA.THAAHBA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: HEUR:Backdoor.Win32.Remcos.gen(KASPERSKY); W32/Remcos!tr.bdr(FORTINET)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It drops files as ransom note. It avoids encrypting files with the following file extensions.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Wed, 20 Jan 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.cobralocker.aa</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.msil.cobralocker.aa</link><title>Ransom.MSIL.COBRALOCKER.AA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Trojan-Ransom.FileCrypter (IKARUS), W32/Encoder.AFA!tr (FORTINET)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  may be dropped by other malware.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 11 Jan 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.inf.hiddentear.thaogba</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.inf.hiddentear.thaogba</link><title>Trojan.INF.HIDDENTEAR.THAOGBA</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: INF/Agent.J trojan (NOD32)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Low&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It automatically executes files when a user opens a drive.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Fri, 08 Jan 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.babuk.thaodba</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/ransom.win32.babuk.thaodba</link><title>Ransom.Win32.BABUK.THAODBA</title><description>&lt;p&gt;Threat type: Ransomware&lt;/p&gt;&lt;p&gt; Aliases: Trojan.Win32.Udochka.kb (KASPERSKY); Trojan-Ransom.FileCrypter (IKARUS)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Ransomware  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Tue, 05 Jan 2021 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.msil.supernova.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.msil.supernova.a</link><title>Trojan.MSIL.SUPERNOVA.A</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: MSIL/Agent.5676!tr (FORTINET)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.&lt;/p&gt;&lt;p&gt;It executes commands from a remote malicious user, effectively compromising the affected system.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 14 Dec 2020 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.msil.sunburst.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.msil.sunburst.a</link><title>Backdoor.MSIL.SUNBURST.A</title><description>&lt;p&gt;Threat type: Backdoor&lt;/p&gt;&lt;p&gt; Aliases: Trojan:MSIL/Solorigate.B!dha	(Microsoft); Trj/Solorigate.A (Panda)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Medium&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This Backdoor  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It executes commands from a remote malicious user, effectively compromising the affected system.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 14 Dec 2020 07:00:00 -0800</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.msil.bladabindi.tha</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.msil.bladabindi.tha</link><title>Backdoor.MSIL.BLADABINDI.THA</title><description>&lt;p&gt;Threat type: Backdoor&lt;/p&gt;&lt;p&gt; Aliases: Backdoor:MSIL/Bladabindi.SBR!MSR (Microsoft), MSIL:Bladabindi-JK [Trj](AVAST)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: High&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;Cybercriminals used this malware bundled with legitimate installation copies of the VPN software known as Windscribe. Note that these copies are hosted from fraudulent sources.&lt;/p&gt;&lt;p&gt;This Backdoor  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It executes commands from a remote malicious user, effectively compromising the affected system.&lt;/p&gt;&lt;p&gt;It gathers certain information on the affected computer. It logs a user&amp;#39;s keystrokes to steal information.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 21 Sep 2020 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/iot.linux.mirai.vwisi</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/iot.linux.mirai.vwisi</link><title>IoT.Linux.MIRAI.VWISI</title><description>&lt;p&gt;Threat type: Backdoor&lt;/p&gt;&lt;p&gt; Aliases: &lt;/p&gt;&lt;p&gt; Platforms: Unix&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This new Mirai variant exploits CVE-2020-10173, a vulnerability in Comtrend VR-3033 routers. Similar to earlier variants, this Mirai variant uses telnet and SSH brute-forcing techniques to attack vulnerable devices.&lt;/p&gt;&lt;p&gt;This Backdoor  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Wed, 08 Jul 2020 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.win32.devilshadow.theaabo</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/backdoor.win32.devilshadow.theaabo</link><title>Backdoor.Win32.DEVILSHADOW.THEAABO</title><description>&lt;p&gt;Threat type: Backdoor&lt;/p&gt;&lt;p&gt; Aliases: Trojan.Win32.Scar.sydj (KASPERSKY)&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: High&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: High&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;Cybercriminals take advantage of the popularity of the Zoom messaging app. This backdoor is found in a fake Zoom installer. This is probably hosted on malicious or suspicious sites.&lt;/p&gt;&lt;p&gt;This Backdoor  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive information.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Thu, 21 May 2020 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.js.managex.a</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.js.managex.a</link><title>Trojan.JS.MANAGEX.A</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: &lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Low&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Medium&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This MANAGEX variant is a modular adware that is able to gather important information as a browser extension.&lt;/p&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;p&gt;It connects to certain websites to send and receive information. However, as of this writing, the said sites are inaccessible.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Thu, 16 Apr 2020 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.mooz.thccabo</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.win32.mooz.thccabo</link><title>Trojan.Win32.MOOZ.THCCABO</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: &lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Medium&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This AutoIt-compiled malware downloads a coinminer in affected systems. This malware is distributed by cybercriminals by bundling it with a legitimate installer of the Zoom communication app. &lt;/p&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Fri, 03 Apr 2020 07:00:00 -0700</pubDate></item><item><guid isPermaLink="true">https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.ps1.powload.jkp</guid><link>https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/trojan.ps1.powload.jkp</link><title>Trojan.PS1.POWLOAD.JKP</title><description>&lt;p&gt;Threat type: Trojan&lt;/p&gt;&lt;p&gt; Aliases: N/A&lt;/p&gt;&lt;p&gt; Platforms: Windows&lt;/p&gt;&lt;p&gt; Overall Risk Rating: Low&lt;/p&gt;&lt;p&gt; Damage Potential: Medium&lt;/p&gt;&lt;p&gt; Distribution Potential: Low&lt;/p&gt;&lt;p&gt; Reported Infection: Low&lt;/p&gt;&lt;p&gt; Information Exposure: Low&lt;/p&gt;&lt;p&gt; Overview: &lt;br&gt;&lt;p&gt;This POWLOAD variant is seen distributed via spam. The spam campaign is in Italian and lures users to click by using COVID-19 in its subject.&lt;/p&gt;&lt;p&gt;This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.&lt;/p&gt;&lt;/p&gt; </description><pubDate>Mon, 16 Mar 2020 07:00:00 -0700</pubDate></item></channel></rss>