Keyword: usoj_ransom.ntw
6288 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan may be downloaded by other malware/grayware from remote sites. It connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to
This malware is related to the Whitehole Exploit Kit attacks during February 2012. It takes advantage of certain vulnerabilities in Java to download and execute backdoor malware onto the affected
This spyware is downloaded and executed by JAVA_DLOADER.NTW. This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
JAVA_EXPLOYT.NTW connects to this site to download malicious files detected as TROJ_RANSOM.NTW and BKDR_ZACCESS.NTW.
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This malware is related to Neutrino, an exploit kit sold in underground cybercrime. This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run
This malware claims to be an update installer for Java. Once installed, it downloads malicious files onto the affected system and executes them, causing routines to be exhibited. This may result in
This backdoor may be downloaded from remote sites by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes itself after execution. Arrival Details This
This Trojan may arrive bundled with malware packages as a malware component. It may be hosted on a website and run when a user accesses the said website. It takes advantage of software
This malware is reported to be involved with a malicious campaign concerning the 2012 US Presidential Election. Users affected by this malware may find their online banking credentials stolen. To get
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This worm arrives on a system as a file
JAVA_EXPLOYT.NTW may be downloaded from this site. This malware takes advantage of certain vulnerabilities in Java to download and execute backdoor malware onto the affected system. This malware is
JAVA_EXPLOYT.NTW may be downloaded from this site. This malware takes advantage of certain vulnerabilities in Java to download and execute backdoor malware onto the affected system. This malware is
JAVA_EXPLOYT.NTW may be downloaded from this site. This malware takes advantage of certain vulnerabilities in Java to download and execute backdoor malware onto the affected system. This malware is