Keyword: osx_leap.a
99290 Total Search   |   Showing Results : 61 - 80
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website to send and receive
This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It connects to a website to send and receive information. It gathers information and reports it to its servers.
through a variety of means. Hackers use different techniques such as spamming users with email messages containing links to rogue antivirus or FAKEAV download pages. Rogue antivirus software also pose as
This spyware executes a Bitcoin miner daemon by running a certain command. It executes the bundled DiabloMiner.jar, detected by Trend Micro as JAVA_COINMINE.A, passing command-line parameters. It
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It requires
This malware was involved in a zero-day Java vulnerability exploit attack in January 2013. Its backdoor routines allow remote attackers to perform commands on the affected system, which may
This Spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Spyware arrives on a system as a
This backdoor may be dropped by other malware. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the computer at
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
WIRELURKER is a malware family that targets both Mac OS and iOS systems. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This malware
This Cracking Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user. It
malware is one of the FAKEAV variants that target Mac OS users. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below. This Trojan arrives via
This malware is the Flashback Mac Trojan Horse that installs itself by exploiting two certain Java vulnerabilities. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the
downloaded or executed on the affected user's system. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below. This backdoor may be dropped by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may arrive bundled with malware packages as a malware component. Arrival Details This
This malware is the Flashback Mac Trojan Horse that installed by exploiting two certain Java vulnerabilities. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the
This backdoor, which runs on Linux and Mac, is designed to steal passwords stored by a number of popular Internet applications. To get a one-glance comprehensive view of the behavior of this