Keyword: OSX_LEAP.A
99632 Total Search   |   Showing Results : 1 - 20
   Next  
Creates a cron job to enable its periodic execution. OSX_LEAP.A : Spreads through iChat . OSX_INQTANA.A : Spreads via Bluetooth. OSX_LOSEGAM.A : Bundled as a gaming application. Apart from attacks that
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any file infection routine. It does
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan Spy arrives on a system
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It does not have any propagation routine. It does
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This OSX malware was used in the targeted attack campaign named Careto. The attack was noted for encoding its configuration data and encrypting its network traffic. To get a one-glance comprehensive
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This adware arrives as a component bundled with malware/grayware packages. It may be manually installed by a user. Arrival Details This adware arrives as a component bundled with malware/grayware
This malware variant is designed to compromise Apple OS X systems. It drops files for its keylogging routine in order to steal information from the affected system. To get a one-glance comprehensive
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
Upon execution, this malware prompts the installation of fake antivirus application. Once installed, it may download and install the fake antivirus/antispyware software, MacShield from a certain URL.
This backdoor enables the attacker to steal a range of information, including screenshots, audio, and keylogs. It can also execute commands and communicate using encrypted data. To get a one-glance