Risk
Threat
Vulnerability
| Name | Type | Protected* | Discovered |
| Trojan.FakeAV!gen121 | Trojan | 04/21/2014 | 04/21/2014 |
| JS.Bondat | Worm | 02/19/2015 | 02/18/2015 |
| Trojan.Shylock!gen12 | Trojan | 04/17/2014 | 04/17/2014 |
| Trojan.Pandex!gen4 | Trojan | 04/16/2014 | 04/16/2014 |
| Trojan.Zbot!gen74 | Trojan | 04/15/2014 | 04/15/2014 |
| Trojan.Shylock!gen10 | Trojan | 04/14/2014 | 04/13/2014 |
| Trojan.Shylock!gen11 | Trojan | 04/14/2014 | 04/13/2014 |
| Downloader.Ponik!gm | Trojan | 05/22/2014 | |
| Packed.Generic.460 | Trojan | 04/12/2014 | 04/11/2014 |

Trojan.Cryptowall is a Trojan horse that encrypts files on the compromised computer. It then asks the user to pay to have the files decrypted.
The threat typically arrives on the affected computer through spam emails, exploit kits hosted through malicious ads or compromised sites, or other malware.
Once the Trojan is executed on the compromised computer, it creates a number of registry entries to store the path of the encrypted files and run every time the computer restarts. It encrypts files with particular extensions on the computer and creates additional files with instructions on how to obtain the decryption key.
This threat family attempts to convince the user to pay money in order to get the key to unlock their files. It uses a variety of different techniques in order to encourage the user to pay the ransom.
More information on Trojan.Cryptowall is available in the threat family writeup.
With the rapid rise in the number of malware attacks it’s harder than ever to prevent machines from getting infected. But have you done everything you can do? Have you done the things you must do to stay protected? Following some simple best practices can make a tremendous difference in improving your protection. Symantec has assembled a set of best practices for today’s threat landscape.
The Dridex financial Trojan has emerged as one of the most serious online threats facing consumers and businesses. The attackers operating the Dridex botnet have continually refined the Trojan, which is now capable of harvesting banking credentials from customers of approximately 300 banks and other financial institutions in over 40 countries.
