Keyword: OSX_LEAP.A
98666 Total Search   |   Showing Results : 1 - 20
   Next  
Creates a cron job to enable its periodic execution. OSX_LEAP.A : Spreads through iChat . OSX_INQTANA.A : Spreads via Bluetooth. OSX_LOSEGAM.A : Bundled as a gaming application. Apart from attacks that
This potentially unwanted application arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This
This OSX malware was used in the targeted attack campaign named Careto. The attack was noted for encoding its configuration data and encrypting its network traffic. To get a one-glance comprehensive
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
This adware arrives as a component bundled with malware/grayware packages. It may be manually installed by a user. Arrival Details This adware arrives as a component bundled with malware/grayware
This malware variant is designed to compromise Apple OS X systems. It drops files for its keylogging routine in order to steal information from the affected system. To get a one-glance comprehensive
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
Upon execution, this malware prompts the installation of fake antivirus application. Once installed, it may download and install the fake antivirus/antispyware software, MacShield from a certain URL.
This backdoor enables the attacker to steal a range of information, including screenshots, audio, and keylogs. It can also execute commands and communicate using encrypted data. To get a one-glance
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following file(s)/component(s):
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It executes
This backdoor joins an Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be
This Mac malware disguises itself as a harmless document by dropping and executing a non-malicious .PDF file onto the affected system. To get a one-glance comprehensive view of the behavior of this
This malicious file disguises itself as an image file in order for users to install and execute its backdoor component. To get a one-glance comprehensive view of the behavior of this Trojan, refer to
This is the Trend Micro detection for Trojanized apps that belong to the Wirelurker malware family. This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system
This Trojan is a fake installer for Mac OS X. It asks for the user's mobile number. As such, users are charged for the bogus program through their mobile accounts. To get a one-glance comprehensive