Keyword: zlob variants
893 Total Search   |   Showing Results : 1 - 20
   Next  
In effect, money is indirectly stolen by cybercriminals as the traffic intended for legitimate sites are redirected to other sites. Some ZLOB variants are known to monitor browsing activities. Others
In effect, money is indirectly stolen by cybercriminals as the traffic intended for legitimate sites are redirected to other sites. Some ZLOB variants are known to monitor browsing activities. Others
seen in the family’s increasing number of variants over time. These worms are known for taking advantage of the Windows OS s’ AutoRun feature in order to spread via removable drives. These are also known
How do users’ systems get infected? Users may unknowingly download WORM_DORKBOT variants when visiting malicious sites. These may also arrive onto systems via removable drives. WORM_DORKBOT variants
This is the Trend Micro detection for .LNK files used by BKDR_KATSLO variants as an autostart component. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the
This is the Trend Micro detection for .LNK files used by WORM_JORIK variants as an autostart component. This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by the
This is the Trend Micro detection for .LNK files used by WORM_JORIK variants as an autostart component. b This Trojan may be dropped by other malware. Arrival Details This Trojan may be dropped by
Description Name: Possible BIFROSE - TCP . BIFROSE malware are backdoors that often arrive on systems either downloaded by unsuspecting users when visiting malicious sites or downloaded by other malware/spyware from remote sites. They may also be dro...
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/0992011112239.png Variants of the AMBLER malware family steal information from affected systems. Trend Micro detected variants of this malware as
This is the Trend Micro detection for Damaged variants of the X97M_EXTRASJ malware family. NOTES: This is the Trend Micro detection for Damaged variants of the X97M_EXTRASJ malware family. Files
Description Name: APT - ZAPCHAST - HTTP (Request) . ZAPCHAST variants often arrive as an attachment to spammed messages. Once the malware has been executed, it creates a backdoor which gives an attacker access to the infected computer. It can also do...
This is the Trend Micro detection for damaged variants of the TDSS malware family. Files detected as TROJ_TDSS.DAM are not capable of executing and cannot perform any malicious routines. NOTES:
2012. Since then, XPAJ variants have infected users’ systems in different countries including Australia, India, Japan, Italy, and the US. It has since spread to other countries in North America and
NOTES: This Android malware is a joke malware that locks user's device screen and restricts any kind of user activity. When the code is sold in underground forums, more than 1200 variants emerged.
Description Name: HUPIGON - HTTP (Request) - Variant 2 . The HUPIGON malware family consists of backdoors. These are usually dropped by other malware onto a system or are downloaded unknowingly by users when visiting malicious sites. HUPIGON variants...
Description Name: ZLOB - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an...
Description Name: ZLOB - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators of an...
YAKES variants arrive on a system as a file dropped by other malware or downloaded unknowingly by users when visiting malicious sites. They may also arrive as attachments to spammed messages. YAKES
YAKES variants arrive on a system as a file dropped by other malware or downloaded unknowingly by users when visiting malicious sites. They may also arrive as attachments to spammed messages. YAKES
YAKES variants arrive on a system as a file dropped by other malware or downloaded unknowingly by users when visiting malicious sites. They may also arrive as attachments to spammed messages. YAKES