Keyword: usoj_fakeav.bbk
3729 Total Search   |   Showing Results : 1 - 20
   Next  
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
The LizaMoon SQL injection attack inserted malicious .PHP scripts into several legitimate websites. As of this writing, the said attack leads to the download of one of two malware. TROJ_FAKEAV.BBK, a
far from over. On the contrary, cybercriminals behind the attack succeeded in accessing databases of ASP and ASP.net websites and in proliferating malicious URLs that point to FAKEAV and WORID malware
This URL is related to a mass compromise. When a user accesses a compromised website, the user is redirected to this URL, which hosts the malware TROJ_FAKEAV.BBK. Other URLs that are related to the
TROJ_FAKEAV.BBK may be downloaded from this URL.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Trojans or Trojan horse programs refer to a family of malware that carry payloads or other malicious actions that can range from the mildly annoying to the irreparably destructive. They can also
This spyware attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This spyware may be unknowingly
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
TSPY_ZBOT.BBK may be unknowingly downloaded by a user while visiting this malicious website.
TSPY_ZBOT.BBK connects to this URL to download its configuration file.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This spyware may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites. It creates folders where it drops its files. It may be injected into
This spyware creates folders where it drops its files. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites.