Keyword: OSX_LEAP.A
99164 Total Search   |   Showing Results : 21 - 40
This backdoor joins an Internet Relay Chat (IRC) channel. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be
This Mac malware disguises itself as a harmless document by dropping and executing a non-malicious .PDF file onto the affected system. To get a one-glance comprehensive view of the behavior of this
This malicious file disguises itself as an image file in order for users to install and execute its backdoor component. To get a one-glance comprehensive view of the behavior of this Trojan, refer to
This is the Trend Micro detection for Trojanized apps that belong to the Wirelurker malware family. This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan is a fake installer for Mac OS X. It asks for the user's mobile number. As such, users are charged for the bogus program through their mobile accounts. To get a one-glance comprehensive
This Backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be dropped by other malware. It steals certain
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan poses as a Flash Player installer. It requires an administrator password before it continues the installation. It connects to a link to download additional installation and configuration
Trend Micro has received multiple samples of this MAC OSX malware from multiple, independent sources, including customer reports and internal sources. These indicate that this malware poses a high
This adware arrives as a component bundled with malware/grayware packages. Arrival Details This adware arrives as a component bundled with malware/grayware packages. NOTES: This is the Trend Micro
This adware may be manually installed by a user. Arrival Details This adware may be manually installed by a user. Installation This adware drops the following component file(s):
This backdoor connects to specific IRC server and joins a particular IRC channel. It is capable of receiving and executing specific commands from the IRC server. This backdoor arrives on a system as
removes the system AppStore and opens a fake OSX update screen. NOTES: It displays the following fake system update application: HEUR:Trojan-Spy.OSX.Aptordoc.b (Kaspersky) MacOS:Dok-D [Trj] (Avast)
This malware is noteworthy due to its involvement in targeted attacks against organizations. To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown
This backdoor may be dropped by other malware. It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the computer at
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This proof of concept attempts to exploit a vulnerability known as Spectre. If successful, it allows exploitation of said vulnerability in Mac OS systems. Exploitation of said vulnerability is