Search
Keyword: paypal
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. It checks for the presence of the following processes which are related to Outpost Personal Firewall an...
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. It checks for the presence of the following processes which are related to Outpost Personal Firewall an...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It uses a user interface (UI). It encrypts files found in specific folders.
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. It checks for the presence of the following processes which are related to Outpost Personal Firewall an...
This spyware also has rootkit capabilities, which enables it to hide its processes and files from the user.
This worm arrives via removable drives. It drops copies of itself in all drives. These dropped copies use the names of the folders located on the said drives for their file names. It drops an AUTORUN.INF file to automatically execute the copies it d...
This worm arrives via removable drives. It drops copies of itself in all drives. These dropped copies use the names of the folders located on the said drives for their file names. It drops an AUTORUN.INF file to automatically execute the copies it d...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It encrypts files with specific file extensions.
This Trojan attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Once users acces...
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This ZBOT variant drops a configuration file that contains a list of its targeted banks and other financial sites. It also steals information from different FTP sites and steals personal certificates from the infected system. It is also related to in...
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to ...
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to ...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies Internet Explorer security settings. This puts the affected computer at greater risk, as it a...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This worm monitors the Internet activities of the infected system to steal user credentials if the user visits websites with certain strings. It attempts to steal user credentials used in the certain websites. It monitors certain browsers. It has bac...
This spyware may be dropped by other malware. It modifies the affected system's HOSTS files. This prevents users from accessing certain websites. It attempts to steal sensitive online banking information, such as user names and passwords. This routi...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded from remote sites by other malware. It connects to certain websites to send and rece...