These threats work together to infect your PC, steal your credit card information, and give access to a remote malicious hacker.
A breakdown of the geographic distribution of Escad is represented in the pie chart on the right.
We have recently seen NukeSped variants installed during targeted attacks against machines compromised by Escad.
See the Win32/Escad and Win32/NukeSped descriptions for information on how the threats work.
You can read more about the Escad and NukeSped families, and how the Malicious Software Removal Tool works, by reading our blog MSRT February: Escad and NukeSped.