Keyword: browser hijacker
300 Total Search   |   Showing Results : 61 - 80
The malware family CIMUZ is used to install a Browser Helper Object (BHO) in order to steal passwords, login credentials and financial information.This Trojan registers itself as a Browser Helper Object (BHO) to ensure its automatic execution every ...
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It arrives as a component bundled with malware/grayware packages.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This spyware may be dropped by other malware.It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits.
This Trojan may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.It registers itself as a Browser Helper Object (BHO) to ensure its automatic execution every time Internet Explorer is run. It ...
This spyware may be dropped by other malware.It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan Spy arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It does not have any file infection routine.It does not have any propagation routine.It does not have a...
This malware uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it disguises as a mobile web browser Opera Mini. Once the user agreed...
This Trojan may be dropped by other malware.
This adware may be manually installed by a user.
AMBLER variants were first seen in the wild in 2009. It is a family of Trojans, spyware, and worms that are designed to steal sensitive information from users. Some of the information it steals are the following:online banking credentialsaccount info...
AMBLER variants were first seen in the wild in 2009. It is a family of Trojans, spyware, and worms that are designed to steal sensitive information from users. Some of the information it steals are the following:online banking credentialsaccount info...
AMBLER variants were first seen in the wild in 2009. It is a family of Trojans, spyware, and worms that are designed to steal sensitive information from users. Some of the information it steals are the following:online banking credentialsaccount info...
Click fraud is but one of the cybercriminal’s more insidious ways of earning ill-gotten revenue. But what is it, really? And how does MIUREF, a malware family that recentl...
This Adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Multiple vendors' web browsers are prone a cross-site scripting vulnerability that arises because the software fails to handle specially crafted files served using the FTP prot...
This is the malware associated with the fake WhatsApp notification. Once users click on the Play button in the said email, they are lead to a multi-platform malware that can execute on Windows, iOS, and Android devices. To get a one-glance comprehen...