Microsoft Malware Protection Center

Threat Research & Response Blog

Browse by Tags

  • Blog Post: Extracting the fare

    When malware is found lurking on a system, quite often it isn't acting alone. Once malware distributors have control of a system, they will do everything they can to compromise the machine and the user for maximum gain -- for instance, hijacking a browser's search results, or using rogue security software...
  • Blog Post: Trojan downloader Chepvil on the UPSwing

    A new spam campaign using UPS (United Parcel Service) as a social-engineering draw was initiated this week. The spammed message contains an attachment, detected as TrojanDownloader:Win32/Chepvil.I . The spam campaign actually started around March 16th 2011. The threat was originally detected as Backdoor...