- ¿ Coinhive - Crypto-Miner designed to perform online mining of Monero cryptocurrency when a user visits a web page without the user's approval.
- ¿ Rig ek - Rig delivers Exploits for Flash, Java, Silverlight and Internet Explorer
- ¿Cryptoloot - Crypto-Miner, using the victim's CPU or GPU power and existing resources for crypto mining - adding transactions to the blockchain and releasing new currency.
December's Top 3 'Most Wanted' mobile malware:
- Triada - Modular Backdoor for Android which grants superuser privileges to downloaded malware.
- Lokibot - Android banking Trojan and info-stealer, which can also turn into a ransomware that locks the phone.
- Lotoor- Hack tool that exploits vulnerabilities on Android operating system in order to gain root privileges.