Since 2016, the NJCCIC has gathered cyber threat intelligence information to develop specific threat profiles on Android malware, ATM malware, botnets, cryptocurrency-mining malware, exploit kits, industrial control systems (ICS) malware, iOS malware, macOS malware, point-of-sale malware, ransomware, and trojans. Under each threat profile, we provide lists of the most prevalent malware variants impacting US victims. We are currently tracking over 500 malware variants and update them as new information becomes available.
For a list of known android malware variants, click here.
Learn More About How Android Malware Works +
For a list of known iOS malware variants, click here.
Learn More About How iOS Malware Works +
To view a complete list of all known ransomware variants, click here.
Learn More About How Ransomware Works +
For a list of known cryptocurrency-mining malware, click here.
Learn More About How Cryptocurrency-Mining Malware Works +
For a list of known exploit kit variants, click here.
Learn More About How Exploit Kits Work +
For a list of known industrial control system malware variants, click here.
Learn More About How ICS Malware Works +
For a list of known macOS malware variants, click here.
Learn More About macOS Malware +
For a list of known POS malware variants, click here.
Learn More About PoS Malware+