Follow:

Malware Encyclopedia

Win32/Escad and Win32/NukeSped
Featured families

These threats work together to infect your PC, steal your credit card information, and give access to a remote malicious hacker.

A breakdown of the geographic distribution of Escad is represented in the pie chart on the right.

We have recently seen NukeSped variants installed during targeted attacks against machines compromised by Escad.

See the Win32/Escad and Win32/NukeSped descriptions for information on how the threats work.

You can read more about the Escad and NukeSped families, and how the Malicious Software Removal Tool works, by reading our blog MSRT February: Escad and NukeSped.

Prevalent threats

The following are the top 10 most-detected threats in each category for the past week, April 13 to April 20, 2015.