Search
Keyword: bkdr_gspot20.a
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This backdoor, which runs on Linux and Mac, is designed to steal passwords stored by a number of popular Internet applications. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.This Back...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It executes commands from a remote malicious user, effectively c...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.As of this writing, the said s...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It executes commands from a ...
This is a Fast SYN Scanner that uses libnet and libpcap, which require root level access. It scans a given netblock on a specified port, using the specified interface with some type of speed setting value.A certain command may be used in this tool.Th...
Microsoft addresses the following vulnerabilities in its August batch of patches:
(MS11-057) Cumulative Security Update for Internet Explorer (2559049)
Risk Rating: Critical
This security up...
Microsoft addresses the following vulnerabilities in its August batch of
patches:
(MS10-046) Vulnerability in Windows Shell Could Allow Remote Code
Execution (2286198) Risk Rating: Critical
...
This Hacking Tool arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.Once a user visits an affected...
Microsoft addresses the following vulnerabilities in its February batch of patches:
(MS11-003) Cumulative Security Update for Internet Explorer (2482017)
Risk Rating: Critical
This security update a...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It opens random ports. It executes commands from a remote malicious user, effectively compromising the af...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It deletes itself after execution.
This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It deletes registry entries, causing some applications ...
On June 25, 2013, South Korea was hit with a cyber attack that affected several local government and news sites. We managed to track some of the attacks that made up this event: (1) the co...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It requires being executed w...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.It requires being executed w...
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes commands from a remote malicious user, effectively compromising the affected system.
Microsoft addresses the following vulnerabilities in its December batch of patches:
(MS11-087) Vulnerability in Windows Kernel-Mode Drivers Could Allow Remote Code Execution (2639417)
Risk Ra...
Once executed, it will pose as a legitimate Flash game. However, upon clicking, this joke program displays a video of a male ghost.This joke program arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users ...