Keyword: bkdr_gspot20.a
300 Total Search   |   Showing Results : 81 - 100
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It requires being executed w...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It requires being executed w...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run ...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It requires being executed w...
This Potentially Unwanted Application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It r...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It requires being executed w...
This latest spam sample comes with a link that tries to encourages the recipient to click the embedded link. Doing so would supposedly provide information about a girl who wants to get married and on what posters are say...
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run ...
This Trojan may be hosted on a website and run when a user accesses the said website.It is a component of other malware.Once a compromised site is visited, the user is redirected to a certain malicious site. It takes advantage of an unknown vulnerab...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages. It may be hosted on a website and run wh...
This Trojan may be unknowingly downloaded by a user while visiting malicious websites. It executes when a user accesses certain websites where it is hosted. It may be hosted on a website and run when a user accesses the said website.This is the Tren...
Microsoft addresses the following vulnerabilities in its April batch of patches: (MS11-018) Cumulative Security Update for Internet Explorer (2497640) Risk Rating: CriticalThis update resolves f...
What do the sites LinkedIn, eHarmony, last.fm, League of Legends, and Yahoo! have in common? All of these websites suffered from major data leaks that exposed millions of user names and passwords online. These incid...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be manually installed by a user.It requires being executed with a specific argument/parameter...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.This is the Trend Micro detect...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It opens a random port to allow a remote user to connect to the affected system. Once a successful connec...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It opens a random port to allow a remote user to connect to the affected system. Once a successful connec...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It opens a random port to allow a remote user to connect to the affected system. Once a successful connec...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It opens a random port to allow a remote user to connect to the affected system. Once a successful connec...