Search
Keyword: paypal
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It uses a user interface (UI).It encrypts files found in specific folders.
This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be unknowingly downloaded by a user while visiting malicious websites.It also has rootkit capabilities, which enables it to hide its processes and files from ...
This spyware may be dropped by other malware.It connects to certain websites to send and receive information.
This worm arrives via removable drives.It drops copies of itself in all drives. These dropped copies use the names of the folders located on the said drives for their file names. It drops an AUTORUN.INF file to automatically execute the copies it dr...
This spyware also has rootkit capabilities, which enables it to hide its processes and files from the user.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions.
This worm arrives via removable drives.It drops copies of itself in all drives. These dropped copies use the names of the folders located on the said drives for their file names. It drops an AUTORUN.INF file to automatically execute the copies it dr...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other malware.It connects to certain websites to send and recei...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.This worm may be downloaded by other malware/gra...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes the initially executed copy of itself.