Trends:Ø It will attack by being bundled with free software files.
Ø It will occur as attached macros to the files.
Ø Use of Custom encryption to communicate with C&C servers.
Ø condition of multi-platform capabilities
Ø use of obscurity network
Ø Lack-of multi layered security system