Search
Keyword: usoj_cve20146352.e
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes registry entries, causing some applications and programs to not function properly.It drops f...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note. It avoids encrypting files with the following file extensions.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Directory Server LDAP1010321* - OpenLDAP slapd Nested Filter Stack Overflow Vulnerability (CVE-2020-12243)Docker Daemon1010326 - Identified Docker Daemon...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Apache Solr RMI1010116 - Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409)DCERPC Services - Client1010106* - Identify Downloading Of Pow...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:Oracle E-Business Suite Web Interface1011019* - Oracle E-Business Suite Denial Of Service Vulnerability (CVE-2021-2190)Pulsar Binary Protocol1010998 - Ap...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:HP Intelligent Management Center (IMC)1010954 - Apache OFBiz Insecure Deserialization Vulnerability (CVE-2021-29200)1010951 - Apache OFBiz Insecure Deseri...
* indicates a new version of an existing ruleDeep Packet Inspection Rules:DNS Client1010766* - Identified Non Existing DNS Resource Record (RR) Types In DNS TrafficDNS Server1010863* - Microsoft Windows DNS Server Remote Code ...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system. It conne...
This Trojan e said files contain data it writes into the MBR (Master Boot Record). It does the said action to enable it to start even before the operating system is loaded.
This worm drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system.It connects to a website to send and receive information.
DISTTRACK, also known as Shamoon, is known for infecting the Master Boot Record (MBR) and overwriting files. Accordingly, once these files are overwritten, users cannot open or restore thir access. This malware family of worms propagate via network s...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It drops files as ransom note.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.