Additional File Types Supported by Deep CDR
OPSWAT Deep Content Disarm and Reconstruction (Deep CDR) is an advanced threat prevention technology defeating any file-based attacks used for Advanced Persistent Threats (APT’s), Ransomware, Zero-day attacks, etc. It sanitizes and reconstructs over 200+ file types, ensuring each file is completely usable with safe content. Supported file types include PDF, Microsoft Office, HTML, and many image files. Language/region specific file formats like JTD and HWP files are also supported.
Highlighted malicious files neutralized by Deep CDR
File Type | Deep CDR Feature | Threat Detected | Reference Sample |
---|---|---|---|
DWG | Remove macro | Malicious macro | View |
DWG | Remove malformed content | Trojan.JS.Iframe | View |
3DS | File reconstruction | Potential threat | |
DAE | File reconstruction | Potential threat | |
U3D | File reconstruction | Potential threat | |
DRC | File reconstruction | Potential threat | |
RVM | File reconstruction | Potential threat | |
ICO | Sanitize internal image | HTML/ScrInject.B!exploit | View |
ICO | Sanitize internal image | Trojan:JS/BlacoleRef.NO | View |
ICO | Sanitize internal image | Backdoor.Poisonivy.E | View |
ICO | Sanitize internal image | Dialer:Win32/InstantAccess | View |
ICO | Sanitize internal image | TR/Drop.Wutau.4.A | View |
ICO | Sanitize internal image | Mal_Hifrm | View |
ICO | Sanitize internal image | Troj/Fujif-Gen | View |
ICO | Sanitize internal image | Worm.IRCBo | View |
ICO | Sanitize internal image | Trojan.Qhost | View |
ICO | Sanitize directory entries, remove internal image | Exploit.Win32.IMG-JPG.A | View |
CUR | Sanitize internal image | JS_REDIRECN.SM | View |
VSDM | Sanitize image, remove embedded object | HTML_IFRAME.AZ | View |
VSDM | Remove macro, remove embedded object | WORM_MYDOOM.GEN | View |
VSDX | File reconstruction | XML bomb | View |
VSSX | Sanitize image | Embedded image is infected | View |
VSTX | Sanitize image | Embedded image is infected | View |
VSSM | Sanitize image | Embedded image is infected | View |
VSTM | Sanitize image | Embedded image is infected | View |
AI | File reconstruction | Trojan-Clicker.HTML.IFrame.Apn | View |
AI | Remove macro | JS.Exploit.Pdfka | View |
PST | File reconstruction | Trojan:Win32/Deshack.A | View |
TXT | Remove invalid character | Invalid character | View |
TXT | Remove invalid character | Invalid character | View |
HTA | Remove hyperlink, remove script | JS/Redirector.Q.1 | View |
HTA | Remove script, remove hyperlink | HTML/ScrInject.B | View |
HTA | Remove hyperlink, remove script | Trojan/JS.Phishing.A | View |
HTA | Remove script | Trojan.JS.Chromex | View |
HTA | Remove script | Trojan.JS.Cryxos | View |
HTA | Remove hyperlink, remove script | Trojan.JS.Crypt | View |
XML-DOC | Conversion | Trojan.O97M.Obfuse | View |
XML-DOC | Conversion | TrojDocDl-NNN | View |
XML-DOC | Conversion | JS/DwnLdr-SKY | View |
XML-DOCX | Conversion | TrojanDownloader:JS/Nemucod | View |
XML-DOCX | Conversion | TScope.Trojan.Delf | View |
CYBERSECURITY ATTACKS ARE ON THE RISE