Search
Keyword: default5.asp
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any propagation routine.It executes commands from a remote malicious user, effectively c...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware/spyware from remote sites.It encrypts files with specif...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This {malware/spyware type} has received attention from independent media sources and/or other security firms.To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.This Trojan may be downloade...
It may be dropped by other malware.It may be unknowingly downloaded by a user while visiting malicious websites.It adds registry entries to enable its automatic execution at every system startup.It attempts to steal information, such as user names an...
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It creates folders where it drops its files. It may be injected into processes running in memory.It modifies the Internet Expl...
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions. It drops files as ransom note.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.
This spyware attempts to steal sensitive online banking information, such as user names and passwords. This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Once users acce...
This Trojan attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It connects to certain websites to send and receive information. However, as of this writing, the said ...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It attempts to access certain websites. However, the websites are inaccessible as of this writing.It en...
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It encrypts files with specific file extensions. It encrypts files found in specific folders. It drops ...
This ransomware appears to be a testing program.This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.However, due to errors in its code, it fails to perform...
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
A recent SQL injection attack affecting hundreds of thousands of sites, however, proves that the days of mass compromise attacks are far from over. On the contrary, cybercriminals behind the attack...