Security Response

Our security research centers around the world provide unparalleled analysis of and protection from IT security threats that include malware, security risks, vulnerabilities, and spam.

Threats

Accurate and up-to-date information on the latest threats. A Threat is an application with the potential to cause harm to a system in the form of destruction, disclosure, data modification, and/or Denial of Service (DoS).
Subscribe
SeverityNameTypeProtected*
Backdoor.MinzenTrojan09/26/2016
SONAR.Poweliks!gen2Trojan09/17/2016
SONAR.Heur.RGC!g224Trojan, Virus, Worm09/17/2016
SONAR.JSDownloader!g9Trojan, Virus, Worm09/21/2016
SONAR.SuspLaunch!g14Trojan, Virus, Worm09/21/2016
SONAR.BC.CryptDrop!g6Trojan, Virus, Worm09/21/2016
SONAR.BC.Cryptlk!g4Trojan, Virus, Worm09/21/2016
SONAR.Cryptlocker!g93Trojan, Virus, Worm09/21/2016
SONAR.Cryptlk.NCod!g1Trojan, Virus, Worm09/21/2016
SONAR.WMPlayer!gen1Trojan, Virus, Worm09/21/2016
SONAR.Heur.RGC!g313Trojan, Virus, Worm09/21/2016
SONAR.Cryptlocker!g61Trojan, Virus, Worm09/21/2016
SONAR.Cryptlocker!g94Trojan, Virus, Worm09/21/2016
SONAR.Cryptlocker!g98Trojan, Virus, Worm09/21/2016
SONAR.Cryptlk.AF!g2Trojan, Virus, Worm09/21/2016
SONAR.Heur.RGC!g317Trojan, Virus, Worm09/21/2016
W32.OldigorkWorm09/22/2016
Trojan.ElibokofTrojan09/22/2016
Trojan.Bayrob!g13Trojan09/22/2016
SONAR.Kwampirs!g1Trojan, Virus, Worm09/21/2016
Trojan.Bayrob!g12Trojan09/20/2016
Ransom.Locky!g19Trojan09/20/2016
Backdoor.BatelTrojan09/20/2016
Trojan.Mdropper!gen5Trojan09/20/2016
Trojan.Kotver!lnkTrojan09/20/2016
Ransom.HDDCryptorTrojan09/17/2016
Linux.TrojanTrojan09/17/2016
Ransom.Locky!g17Trojan09/14/2016
SONAR.Heur.RGC!g214Trojan, Virus, Worm09/17/2016
SONAR.Heur.RGC!g244Trojan, Virus, Worm09/17/2016
Trojan.Odinaff!gmTrojan09/14/2016
Ransom.Cry!gmTrojan09/14/2016
Trojan.DualtoyTrojan09/14/2016
Ransom.KawaiiTrojan09/12/2016
Trojan.RiccietexTrojan09/12/2016
Linux.LuabotTrojan09/10/2016
Ransom.PhiladelphiaTrojan09/17/2016
SONAR.Cryptlocker!g79Trojan, Virus, Worm
SONAR.Cryptlocker!g65Trojan, Virus, Worm
SONAR.Heur.RGC!g328Trojan, Virus, Worm
SONAR.BC.CryptDrop!g5Trojan, Virus, Worm
SONAR.Cryptlocker!g63Trojan, Virus, Worm
SONAR.Heur.RGC!g241Trojan, Virus, Worm
SONAR.Heur.RGC!g250Trojan, Virus, Worm
SONAR.Heur.RGC!g270Trojan, Virus, Worm
SONAR.Heur.RGC!g209Trojan, Virus, Worm
SONAR.JSDownloader!g5Trojan, Virus, Worm
SONAR.Heur.RGC!g293Trojan, Virus, Worm
SONAR.MultiExt!gen4Trojan, Virus, Worm
SONAR.MSWord!g17Trojan, Virus, Worm
SONAR.ProcHijack!gen8Trojan, Virus, Worm
SONAR.Shellcode!gen1Trojan, Virus, Worm
SONAR.SuspBeh!gen62Trojan, Virus, Worm
SONAR.SuspBeh!gen64Trojan, Virus, Worm
SONAR.SusTraffic!gen4Trojan, Virus, Worm
SONAR.SusTraffic!gen5Trojan, Virus, Worm
SONAR.Heur.C!g19Trojan, Virus, Worm
SONAR.Heuristic.152Trojan, Virus, Worm
SONAR.Heuristic.154Trojan, Virus, Worm
Trojan.Bayrob!g11Trojan09/08/2016
Ransom.CryTrojan09/07/2016
Trojan.Pandemiya!g1Trojan09/05/2016
Linux.UmreonTrojan09/05/2016
Exp.CVE-2016-3294Trojan09/15/2016
Bloodhound.Exploit.57409/02/2016
Ransom.FsocietyTrojan09/03/2016
Exp.CVE-2016-3375Trojan09/15/2016
Exp.CVE-2016-3247Trojan09/15/2016
Exp.CVE-2016-3351Trojan09/15/2016
Exp.CVE-2016-3377Trojan09/15/2016
Exp.CVE-2016-3324Trojan09/15/2016
Exp.CVE-2016-3297Trojan09/15/2016
Ransom.SerpicoTrojan09/02/2016
Exp.CVE-2016-3295Trojan09/15/2016
Trojan.Odinaff!g1Trojan08/31/2016
Trojan.Sysridge!gen1Trojan08/31/2016
Ransom.Locky!g12Trojan08/30/2016
Ransom.DominoTrojan08/30/2016
Trojan.AtmoripperTrojan08/30/2016
Trojan.OdinaffTrojan08/30/2016
Infostealer.AteslaTrojan, Worm08/29/2016
Infostealer.Atesla!gmTrojan, Worm08/29/2016
*For continued protection, make sure that your Symantec subscription and/or license are up to date.

Threat Intelligence

Subscribe
Follow the Threat Intelligence Twitter feed
Internet Security Threat Report, Vol 21
STAR Antimalware Protection Technologies