Macro-based malware uses macros embedded in Microsoft Office files to sneak in further infection. This report includes the following sections:
Rootkits provide stealth capabilities to malware. This report examines how attackers use rootkits, and how rootkits function on affected computers.
This report examines the prevalent EyeStye family of malware.
This report provides an overview of the Win32/Poison (Poison Ivy) family of malware.
This special edition of the SIR provides an overview of the Win32/Rustock family of rootkit-enabled backdoor trojans.
This report provides an overview of the Win32/Qakbot (Qakbot) family of malware.
This document provides an overview of the Win32/Zbot family of password-stealing trojans.
I want to...