Keyword: browser hijacker
300 Total Search   |   Showing Results : 81 - 100
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This adware may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware.It ...
Windows 98, ME, NT, 2000, XP, Server 2003 Other System ModificationsThis Trojan adds the following registry keys: Other DetailsThis Trojan adds the following lines or registry entries as part of its routine: Step 1Terminate the malw...
This Trojan may arrive as a file dropped by TROJ_TDSS.WIN.Its primary function is to log the Internet browsing activities of the user by keeping a record of keywords entered in search engines. It monitors specific strings in the browser address bar f...
AMBLER variants were first seen in the wild in 2009. It is a family of Trojans, spyware, and worms that are designed to steal sensitive information from users. Some of the information it steals are the following:online banking credentialsaccount info...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it disguises as a mobile web browser Opera Mini. Once the user agreed...
This adware may be dropped by other malware. It arrives as a component bundled with malware/grayware packages.It registers itself as a Browser Helper Object (BHO) to ensure its automatic execution every time Internet Explorer is run. It does this by...
 layout/base/nsCSSFrameConstructor.cpp in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 does not properly handle first-letter frames, which allows remote attackers to cause a denial of serv...
This Trojan displays fake alerts that warn users of infection. It also displays fake scanning results of the affected system. It then asks for users to purchase it once scanning is completed. If users decide to purchase the rogue product, users are d...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.It encrypts files with specific file ex...
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.