Search
Keyword: browser hijacker
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware may arrive bundled with malware packages as a malware component. It may be manually installed by a user.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes then deletes itself afterward.
This adware arrives as a component bundled with malware/grayware packages. It may be manually installed by a user.
This malware makes use of <i>Facebook</i> links and blackhat search engine optimization (BHSEO) to lure users into malicious sites hosting this FAKEAV variant.
This malware is one of the FAKEAV variants that target Mac OS...
This backdoor queries the default web browser by accessing a registry entry. It then launches a hidden Web browser process (e.g. iexplore.exe) where this malware injects its code for its backdoor routines.This backdoor arrives as an attachment to em...
It opens the non-malicious URL http://www.irs.gov/pub/irs-pdf/f941.pdf to hide its malicious routines from the user.It registers the downloaded .DLL file as a Browser Helper Object (BHO) by executing a specific command-line.It starts the service Appl...
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits.
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
This adware may arrive bundled with malware packages as a malware component. It may be manually installed by a user.It acts as a Browser Helper Object (BHO) that monitors a user's Internet-browsing habits.It requires its main component to successful...
It may be dropped by TROJ_DROPPER.ZBB.It injects itself into specific processes as part of its memory residency routine. It connects to the following possibly malicious URLThis Trojan may be dropped by other malware. It may be dropped by other malwa...
This spyware may arrive in a system as dd800s.exe. It searches and installs a component file. It does not continue with its routine if it does not exists.This spyware may be downloaded by other malware/grayware/spyware from remote sites. It may be d...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the...
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the...
This joke program may be hosted on a website and run when a user accesses the said website.
Cross-domain vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted H...
Buffer overflow in the IEToolbar.IEContextMenu.1 ActiveX control in LinkedInIEToolbar.dll in the LinkedIn Toolbar 3.0.2.1098 allows remote attackers to execute arbitrary cod...