Keyword: zyklon.3232
41 Total Search   |   Showing Results : 1 - 20
   Next  
following: Your files are locked / encrypted by Zyklon Locker You can unlock your files by paying ~$/€250 All your important files are encrypted using an unique 32 characters AES-256 password. (it will take a
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It logs a user's keystrokes to steal information.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It steals certain information from the system and/or
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It lowers the security setting of Internet Explorer.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Adware arrives on a system as a
BKDR_TENGO.A connects to this website to send and receive information. It uses the legitimate analysis tool Aheadlib to pass itself off as a legitimate system DLL file.
CVE-2010-3230,CVE-2010-3231,CVE-2010-3232,CVE-2010-3233,CVE-2010-3234,CVE-2010-3235,CVE-2010-3236,CVE-2010-3237,CVE-2010-3238,CVE-2010-3239,CVE-2010-3240,CVE-2010-3241,CVE-2010-3242 This security
-s 1540 %System%\WerFault.exe -u -p 3928 -s 212 %System%\WerFault.exe -u -p 3944 -s 196 %System%\WerFault.exe -u -p 3944 -s 188 %System%\WerFault.exe -u -p 3944 -s 192 %System%\WerFault.exe -u -p 3232
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Worm arrives on a system as a file
This Trojan Spy arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be downloaded by other malware/grayware/spyware from remote sites. It connects
As of this writing, the said sites are inaccessible. Arrival Details This malware arrives via the following means: Sundown-Pirate Exploit Kit Installation This Trojan drops a copy of itself in the
This information stealing malware arrives as spam spoofing an invoice or payment notification. If the user clicks the URL in the email, it executes a PowerShell command that downloads EMOTET. It then
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It employs registry shell spawning by adding certain