Note: The information provided in these malware breakdowns is based on publicly available threat intelligence, observed behaviors, and independent research. Data is presented as an aggregate overview for educational and awareness purposes only.
Emotet is a modular banking trojan turned malware delivery platform that originated in 2014. Once focused on credential theft, it evolved into one of the most prolific
initial access threats, responsible for distributing TrickBot, QakBot, and Ryuk ransomware. Its polymorphic nature and adaptability made it a persistent global threat.
Aliases: Geodo, Heodo
First Observed: 2014
Active Years: 2014–2021 (takedown), resurfaced briefly 2021–2023
EternalBlue is a Windows exploit developed by the NSA and leaked by the Shadow Brokers hacking group in 2017. It exploits a vulnerability in Microsoft’s SMBv1
protocol (MS17-010) to enable remote code execution. Although patched prior to the leak, many systems remained vulnerable for months and years after, making EternalBlue
a powerful tool for widespread attacks like WannaCry and NotPetya.
Aliases: MS17-010 Exploit
First Observed: April 2017 (leaked)
Targeted Platform: Windows (XP through Server 2016)
Log4Shell (CVE-2021-44228) is a critical zero-day vulnerability discovered in the Apache Log4j 2 logging library. It allows remote code execution by injecting a specially
crafted JNDI lookup string into log messages. Due to Log4j's widespread use in enterprise applications, the vulnerability had global implications and was dubbed one of the
most severe software vulnerabilities of the decade.
Aliases: Log4j Vulnerability, CVE-2021-44228
First Public Disclosure: December 9, 2021
Affected Components: Apache Log4j 2.x (versions 2.0 to 2.14.1)
log4j2.formatMsgNoLookups=true).
QakBot is a modular banking trojan that evolved into a versatile malware delivery platform. First detected in 2007, it was initially used to steal banking credentials but
grew into a full-service botnet capable of delivering ransomware, performing credential harvesting, and enabling lateral movement. Known for its adaptive phishing tactics,
QakBot was often deployed via Emotet and TrickBot infrastructure.
Aliases: QBot, Pinkslipbot
First Observed: 2007
Primary Functions: Credential theft, C2 communication, malware delivery
rundll32.exe) or MSI installers (T1218.011).
Sandworm is the name of both an advanced persistent threat (APT) group and the malware/toolset associated with them. Widely attributed to Russia’s GRU military intelligence
unit (Unit 74455), Sandworm is responsible for some of the most disruptive cyberattacks in history, including the 2015 and 2016 Ukrainian power grid attacks and the global NotPetya
outbreak in 2017. The group employs a wide range of malware, from custom backdoors to destructive wipers and ransomware-like payloads.
Aliases: Voodoo Bear, BlackEnergy Group, TeleBots, Iron Viking
Stuxnet is one of the most sophisticated pieces of malware ever discovered. Designed as a cyber-weapon, it specifically targeted industrial control systems (ICS), particularly
Siemens PLCs, with the goal of sabotaging Iran’s nuclear enrichment program. Widely attributed to a joint operation between the U.S. and Israel, Stuxnet marked a turning point in
cyberwarfare — showing how code could cause physical destruction in the real world.
Aliases: W32.Stuxnet, Olympic Games
First Observed: 2010 (discovered), believed to be active since 2007
Primary Target: Siemens Step7 systems on Windows machines connected to centrifuges
TrickBot is a modular banking trojan that evolved into a multi-functional malware platform capable of credential theft, lateral movement, and malware delivery. Originally
developed as a successor to Dyre, TrickBot became a key player in the cybercrime ecosystem, often working in tandem with Emotet and Ryuk. It was operated as a
malware-as-a-service (MaaS) and widely used by both criminal syndicates and ransomware operators.
Aliases: TrickLoader, Totbrick
First Observed: 2016
Initial Purpose: Banking credential theft and account takeover
rundll32.exe or PowerShell (T1218.011, T1059.001).
WannaCry is a ransomware worm that caused a global cyber incident in May 2017. It exploited the EternalBlue vulnerability in Microsoft’s SMBv1 protocol to spread rapidly
across networks without human interaction. The ransomware encrypted files and demanded payment in Bitcoin, displaying a red warning screen to victims. Although a kill switch
temporarily halted its spread, WannaCry infected over 200,000 machines in more than 150 countries — including hospitals, transportation systems, and businesses.
Aliases: WCry, WannaCrypt, Wanna Decryptor
First Observed: May 12, 2017
Primary Impact: Mass disruption and file encryption across critical infrastructure and businesses
vssadmin and wbadmin.