Malware

Ransomware
Cyber criminals are constantly looking for ways to develop more complex malware. Evolution is the key for survival because antivirus research, analysis, cou...
Fri, Mar 25, 2016 at 7:53 AM
The file tmp.edb detection on iSheriff Endpoint
Issue: The file 'tmp.edb' and other '.edb' files generate an unexpected detection Example File "C:\Windows\security\databa...
Wed, Nov 12, 2014 at 5:22 PM
Generic Detections
A program identified by Generic Detection appears to have characteristics that resemble known malware. This may indicate the presence of a malware inf...
Wed, Nov 12, 2014 at 5:40 PM
Trojans
Summary: Much like the wooden horse of Greek mythology, a trojan horse program (usually called a trojan) appears to be desirable or harmless, but al...
Mon, Feb 9, 2015 at 8:03 AM
Trojan.Cryptolocker
Ransomware such as Cryptolocker has been very active in recent times. With the success of Cryptolocker, we have seen a large number of copycats trying to c...
Fri, Feb 6, 2015 at 5:13 PM
Trojan.crypt.NM:
This is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.  The trojan'...
Wed, Aug 12, 2015 at 9:21 PM
Exploit.Win32.MS04-028.Gen
It is a generic detection for images in JPG format that attempt to exploit the Buffer Overrun in JPEG processing vulnerability.  This vulnerability...
Wed, Aug 12, 2015 at 9:25 PM
PUP.DataMngr Adware
PUP.DataMngr is a specific detection (Potentially Unwanted Program).A potentially unwanted application is a program that contains adware, installs toolbars ...
Wed, Aug 19, 2015 at 10:37 PM
Locky Ransomware
ISheriff detects the Ransomware  as Trojan.Locky.A Locky encryption virus is applied to encrypt users’ personal files. Similar to notorious ...
Fri, Feb 19, 2016 at 1:14 AM
Wanna.cry Ransomware May 12th 2017
On Friday, May 12, countless organizations around the world began fending off attacks from a ransomware strain variously known as WannaCrypt, WanaDecrypt an...
Sun, May 14, 2017 at 9:38 PM